RapidRepoPull : Quickly Pull & Install Repos from its List

RapidRepoPull goal is to quickly pull and install repos from its list. This program uses Python to clone/maintain multiple security related repos using threading and multiprocessing.

Use cases

  • Quickly install your favorite Security repos on a new system
  • Kick off multiple concurrent git clone tasks utilizing Python
  • Add remove repos to the worker_data list as needed in order to address indivudual use case/project needs

Requirements

  • This program was tested with Python version 3.7.2 64-bit
  • Ensure the Python3 virtual environment package is installed (Ubuntu)

sudo apt-get install python3-venv

  • Ensure git is installed (Ubuntu)

sudo apt-get install git

Also Read – Remot3d : A Simple Tool Created for Large Pentesters

Usage Option 1 Automatic (Docker)

  • Clone code repo

git clone https://github.com/tbalz2319/RapidRepoPull.git

  • Change directory into RapidRepoPull

cd RapidRepoPull

  • The script will run in a minimal Alpine Docker container (126 MB) and extract the dirs in the current working dir

docker-compose up –build

Usage Option 2 Local Install

  • Clone code repo

git clone https://github.com/tbalz2319/RapidRepoPull.git

  • Change directory into RapidRepoPull

cd RapidRepoPull

  • Execute the script below

./install.sh

Usage Option 3 Manual

  • Clone code repo

git clone https://github.com/tbalz2319/RapidRepoPull.git

  • Change directory into RapidRepoPull

cd RapidRepoPull

  • Create a virtual Python3 environment to run this code

python3 -m venv venv

  • Activate the virual enivornment

source venv/bin/activate

  • Install requirements

pip install -r requirements.txt

  • Run program

python3 rapid.py

Update Program

  • Run the following script

./update.sh

Mass Update all existing repos

  • Run the command to maintain all existing repos by attempting to pull latest version

./update_repos.sh

To do

  • Add error handling

Clean up code

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

8 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago