-
Notifications
You must be signed in to change notification settings - Fork 0
/
config.py.example
32 lines (27 loc) · 1.31 KB
/
config.py.example
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
import os
USERNAME = os.popen("whoami").read()[:-1]
APPNAME = "PWNServer"
WEBSERVERPORT = 80
LPORT = 9000
SERVERPATH = f"/tmp/{APPNAME}"
SCPCMD = 'scp -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no"'
WGETCMD = "wget"
WGETOUTPUTOPTION = "-O"
SSHKEYGEN = "ssh-keygen -t ed25519 -C dev@protovision.com -f {SSHKEYFILEPATH} -N \"\""
SSHADD = "ssh-add"
SSHKEYFILE = "sshkey"
linux_web_files = [
"https://raw.githubusercontent.com/sleventyeleven/linuxprivchecker/master/linuxprivchecker.py",
"https://raw.githubusercontent.com/jondonas/linux-exploit-suggester-2/master/linux-exploit-suggester-2.pl",
"https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh",
"https://raw.githubusercontent.com/rebootuser/LinEnum/master/LinEnum.sh",
"https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh",
"https://github.com/DominicBreuker/pspy/releases/download/v1.2.0/pspy64",
"https://github.com/DominicBreuker/pspy/releases/download/v1.2.0/pspy32",
"https://raw.githubusercontent.com/offensive-security/exploit-database/master/files_exploits.csv",
"https://github.com/liamg/traitor/releases/download/v0.0.14/traitor-386",
"https://github.com/liamg/traitor/releases/download/v0.0.14/traitor-amd64"
]
non_exe_extensions = [
".csv"
]