Exploit_loop is a project mainly written in Ruby, based on the MIT license.
simple exploit loop for standard CTF contests
== DESCRIPTION Iterate all exploits from a specified directory over all hosts within a ctf.
Exploits should:
== SYNOPSIS
% exploit_loop [options]
Specific options:
-h, --help Display this help.
-V, --version Print version.
--minimum <i> Minimum iteration time in seconds.
--exploit_dir <dir> Directory that contains exploits.
--flag_dir <dir> Directory in which flags are written to.
--timeout <sec> Timeout in seconds for blocking calls.
--without <host> Without this host
--target_network <network> network like 10.0.x.y , where "x" will be changed according to --target_range and "y" will be changed according to --target_host.
--target_host <y> Host address, the "y" within --target_network.
--target_range <x> Network range, the "x" within --target_network. Example: 5,23 will be a Range 5..23
== REQUIREMENTS
Ruby 1.8.7
== INSTALL
% git clone <url>
% cd exploit_loop
% rake gem
% sudo gem install pkg/*.gem
== TODO
== Bug reports
== AUTHORS
Sandor Szücs, [email protected]
== LICENSE
See LICENSE file.