AutoSploit v3.0 release: Automated Mass Exploiter


As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the API. The program allows the user to enter their platform specific search query such as; Apache, IIS, etc, upon which a list of candidates will be retrieved.

After this operation has been completed the ‘Exploit’ component of the program will go about the business of attempting to exploit these targets by running a series of Metasploit modules against them. Which Metasploit modules will be employed in this manner is determined by programmatically comparing the name of the module to the initial search query. However, I have added functionality to run all available modules against the targets in a ‘Hail Mary’ type of attack as well.

The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, localhost and local port for MSF facilitated back connections are configured through the dialog that comes up before the ‘Exploit’ component is started.

Operational Security Consideration

Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available.

Changelog v3.0


  • New Terminal. Now also supports;
    • Custom Commands
    • Command Histor
    • Native binary execution (/bin & /sbin)
  • Host file backup support
  • Options to renew or reset API tokens

Bug Fixes

The following issues are now resolved. Click on their number ID for more information.


Clone the repo. Or deploy via Docker. Details for which can be found here Special thanks to Khast3x for their contribution in this regard.

git clone

After which it can be started from the terminal with python

As of version 2.0, AutoSploit can be started with a number of command line arguments/flags as well. Type python -h to display all the options available to you.

|     Option       |                   Summary                          |
|1. Usage          | Display this informational message.                |
|2. Gather Hosts   | Query Shodan for a list of platform specific IPs.  |
|3. View Hosts     | Print gathered IPs/RHOSTS.                         |
|4. Exploit        | Configure MSF and Start exploiting gathered targets|
|5. Quit           | Exits AutoSploit.                                  |

Copyright (C) 2018 NullArray