#!/bin/bash # # pimpmykali.sh - now with pimpmyupgrade! # Author: Dewalt # # Usage: sudo ./pimpmykali.sh ( defaults to the menu system ) command line arguements are valid, only catching 1 arguement # # Revision 0.5d - bugfix Thank you to AES for finding the bug, nmap wget script was pulling the wrong page # - correct page has been added new version git pushd # - correct http-shellshock.nse nmap script added - Thank you Alek and Blob! # # Revision 0.5c - fix_upgrade removed from fix_missing # - fix_upgrade removed from fix_missing and is no longer 'forced' as a part of fix_missing # - fix_upgrade will now only be called as a part of fix_all (menu 0) fix_upgrade (menu 9) # or command line switches --upgrade -upgrade or upgrade # # Revision 0.5b - Blindpentesters Essential Collection added # - added blindpentesters 'The Essential' tools and utilies collection # - menu option 'BPT' for blindpentesters tools collection, installs, runs the_essentials.sh and exists # # Revision 0.5a - cosmetic fixes # - minor cosmetic fixes to pimpmyupgrade functions # # Revision 0.5 - pimpmyupgrade added!! Fixes broken apt upgrade # - deb-src is not enabled -- fixed function : fix_sources # - linux-headers-(uname -r) not installed - fixed # - new functions check_vm, virt_what, run_update are what comprise pimpmyupgrade # # Revision 0.4b : minor updates # - reworked fix_section wasnt happy with how the boolean was working out, works much better # - added slient 'mode' variable, uncomment silent= line to turn output on and off from apt etc # - misc cleanup in the script # # Revision 0.4a : 2nd warning screen added for --borked impacket removal system # - If you cant have a little fun with your own scripts your doing something wrong.... # - last chance warning screen ( mostly novelty ), random launch code generation on each run of --borked # - list of target selection, targets locked, etc # - 10 second wait timer added to last chance launch screen before operations are preformed # - if no ctrl+c is entered to cancel the operation, fix_sead is run, followed by fix_impacket # - added apt -y reinstall python3-impacket impacket-scripts to fix error with smbmap after impacket removal # # Revision 0.4 : Major Update for impacket # - added flameshot as a part of the missing group to be installed # - added clamav-exec.nse wget to fix clamav-exec.nse failed during nmap --script vuln scans # - new commandline switch of --borked has been implemented for removal of impacket across various locations # - added --borked notice to menu system, help system # - added warning screen for --borked, only input of Y will proceed anything else exits # - fix_sead_warning, fix_sead_run, fix_impacket_array, fix_impacket all executed in order with --borked # - fix_sead_run removes any and all directories named impacket* in the following locations: # /opt /usr/bin /usr/local/lib /usr/lib /home/$finduser/.local/bin /home/$finduser/.local/lib ~/.local/lib ~/.local/bin # - fix_sead_run, also removes via fix_impacket_array any .py or .pyc related to impacket in the following: # /usr/bin/$impacket_file /usr/local/bin/$impacket_file # (root)~/.local/bin/$impacket_file # (user)/home/$finduser/.local/bin/$impacket_file # # Revision 0.3c: # - per request kali-root-login enabling prompt has been reworked and reworded to be less confusing and # to give the user a better explaniation of what the script is doing at that stage # - added to note that if you dont understand what this part of the script is doing hit N # - added colors for syntax highlighting in the onscreen messages of the script in places # - added fix_nmap function for fixing /usr/share/nmap/scripts/clamav-exec.nse (commented out at this time # clamav-exec.nse was an issue at one time but unknown if it is still relevent) # # Revision 0.3c: # - emergency fix to --force everything should be functioning properly now # # Revision 0.3b: # - bug fix ( Thanks Shadowboss! ) for impacket installation, cd /opt/impacket-0.9.19 was missing # - feature request added : Gedit installation menu option 7, is included in fix_missing, all and force # - remove clear from exit screen # # Revision 0.3a: # - the extraction of the impacket-0.9.19.tar.gz was leaving /opt/impacket-0.9.19 with 700 perms # and an ownership of 503:root, this has been changed to ownership root:root and all files inside # /opt/impacket-0.9.19 have had their permissions set to 755 after extraction of impacket-0.9.19.tar.gz # - ascii art added to the menu # - added exit screen # # Revision 0.3: # - Added checks for already installed installations, added --force command ( --force will run all fixes/reinstalls ) # - fix_impacket : added both .py and .pyc files to impacket removal array # - added on screen notification of files being removed by the array # - fix_missing : has been reworked new vars check section force type # - added fix_section : fix_section is the workhorse for fix_missing # # - 09.25.2020 - OffSec has removed python-pip from the kali repo # - reworked python-pip installation to its own function python-pip-curl and installs python-pip via curl # # Revision 0.2: # - Added colorized notifications, help system, command line arguements, case based menu system # - valid command line arguements are: help, all, go, grub, impacket, missing, menu, smb, grub, root # - anything other than --all or -all or all , will only run that function and then exit. # - command line arguements can be used with -- or - or just the word itself to try can catch for all possible cases # example command line var: --help or -help or help will catch help and works for all valid command line arguements # anything other the command line arugement catch exits and displays help # # Standard Disclaimer: Author assumes no liability for any damange # # revision var revision="0.5e" # unicorn puke: red=$'\e[1;31m' green=$'\e[1;32m' blue=$'\e[1;34m' magenta=$'\e[1;35m' cyan=$'\e[1;36m' yellow=$'\e[1;93m' white=$'\e[0m' bold=$'\e[1m' norm=$'\e[21m' # launch_codes - for a little fun in the --borked scripts launch_codes_alpha=$(echo $((1 + RANDOM % 9999))) launch_codes_beta=$(echo $((1 + RANDOM % 9999))) launch_codes_charlie=$(echo $((1 + RANDOM % 9999))) # status indicators greenplus='\e[1;33m[++]\e[0m' greenminus='\e[1;33m[--]\e[0m' redminus='\e[1;31m[--]\e[0m' redexclaim='\e[1;31m[!!]\e[0m' redstar='\e[1;31m[**]\e[0m' blinkexclaim='\e[1;31m[\e[5;31m!!\e[0m\e[1;31m]\e[0m' fourblinkexclaim='\e[1;31m[\e[5;31m!!!!\e[0m\e[1;31m]\e[0m' # variables needed in the script force=0 check="" section="" type="" # silent mode silent='' # uncomment to see all output # silent='>/dev/null 2>&1' # uncomment to hide all output check_distro() { distro=$(uname -a | grep -i -c "kali") # distro check if [ $distro -ne 1 ] then echo -e "\n $blinkexclaim Sorry I only work on Kali Linux $blinkexclaim \n"; exit # false fi } check_for_root () { if [ "$EUID" -ne 0 ] then echo -e "\n\n Script must be run with sudo ./pimpmykali.sh or as root \n" exit fi } fix_section () { if [ $check -ne 1 ] then # force=0 check=0 or force=1 check=0 echo -e "\n $greenplus install : $section" eval apt -y install $section $silent elif [ $force = 1 ] then # force=1 check=1 echo -e "\n $redstar reinstall : $section" eval apt -y reinstall $section $silent else # force=0 check=1 echo -e "\n $greenminus $section already installed" echo -e " use --force to reinstall" fi check="" type="" section="" } fix_missing () { # update and autoremove eval apt -y update $silent && eval apt -y autoremove $silent # remove kali-undercover eval apt -y remove kali-undercover $silent echo -e "\n $greenplus apt updated " python-pip-curl python3_pip $force seclists $force fix_golang $force fix_gedit $force # added per sheeps request - still debating this 'request' fix_flameshot $force fix_nmap # fix_upgrade - removed from fix_missing and moved to only menu option 0 (all) and individually menu option 9 } fix_all () { fix_sources fix_missing $force fix_grub fix_smbconf fix_impacket make_rootgreatagain $force fix_upgrade # ID10T REMINDER: DONT CALL THESE HERE THEY ARE IN FIX_MISSING! # python-pip-cul python3_pip seclists fix_golang fix_gedit fix_flameshot fix_nmap # # fix_upgrade is not a part of fix_missing and only called as sub-function call of fix_all } python-pip-curl () { check_pip=$(pip --version | grep -i -c "/usr/local/lib/python2.7/dist-packages/pip") if [ $check_pip -ne 1 ] then echo -e "\n $greenplus installing pip" eval curl https://bootstrap.pypa.io/get-pip.py -o /tmp/get-pip.py $silent eval python /tmp/get-pip.py $silent rm -f /tmp/get-pip.py echo -e "\n $greenplus python-pip installed" else echo -e "\n $greenminus python-pip already installed" fi } # section= must be exact name of package in kali repo ( apt-cache search itemname ) # check= custom check for that particular item # type= set in fix_section based on eval of $check and $force # force= to override force / set force var # fix_section $section $check $force locate () { section="locate" check=$(whereis locate | grep -i -c "locate: /usr/bin/locate") fix_section $section $check $force } python3_pip () { section="python3-pip" check=$(python3 -m pip --version | grep -i -c "/usr/lib/python3/dist-packages/pip") fix_section $section $check $force } seclists () { section="seclists" check=$(whereis seclists | grep -i -c "seclists: /usr/bin/seclists /usr/share/seclists") fix_section $section $check $force } fix_nmap () { # not checking for it just doing it rm -f /usr/share/nmap/scripts/clamav-exec.nse echo -e "\n $redminus /usr/share/nmap/scripts/clamav-exec.nse removed " eval wget https://raw.githubusercontent.com/nmap/nmap/master/scripts/clamav-exec.nse -O /usr/share/nmap/scripts/clamav-exec.nse $silent eval wget https://raw.githubusercontent.com/onomastus/pentest-tools/master/fixed-http-shellshock.nse -O /usr/share/nmap/scripts/http-shellshock.nse $silent echo -e "\n $greenplus /usr/share/nmap/scripts/clamav-exec.nse replaced with working version " } fix_flameshot () { section="flameshot" check=$(whereis flameshot | grep -i -c "/usr/bin/flameshot") fix_section $section $check $force } # added per sheeps request - still debating this 'request' fix_gedit () { section="gedit" check=$(whereis gedit | grep -i -c "gedit: /usr/bin/gedit") fix_section $section $check $force } fix_golang () { section="golang" check=$(whereis go | grep -i -c "/usr/bin/go") fix_section $section $check $force } fix_smbconf () { check_min=$(cat /etc/samba/smb.conf | grep -c -i "client min protocol") check_max=$(cat /etc/samba/smb.conf | grep -c -i "client max protocol") # changeed to || OR from && check for either line, not both if [ $check_min -ne 0 ] || [ $check_max -ne 0 ] then echo -e "\n $green /etc/samba/smb.conf " echo -e "\n $redminus client min protocol is already set not changing\n $redminus client max protocol is already set not changing" else cat /etc/samba/smb.conf | sed 's/\[global\]/\[global\]\n client min protocol = CORE\n client max protocol = SMB3\n''/' > /tmp/fix_smbconf.tmp cat /tmp/fix_smbconf.tmp > /etc/samba/smb.conf rm -f /tmp/fix_smbconf.tmp echo -e "\n $greenplus /etc/samba/smb.conf updated" echo -e "\n $greenplus added : client min protocol = CORE\n $greenplus added : client max protocol = SMB3" fi } fix_grub () { check_grub=$(cat /etc/default/grub | grep -i -c "GRUB_CMDLINE_LINUX_DEFAULT=\"quiet\"" ) if [ $check_grub -ne 1 ] then echo -e "\n $redexclaim Error: /etc/default/grub is not the default config - not changing" else cat /etc/default/grub | sed 's/GRUB_CMDLINE_LINUX_DEFAULT="quiet"/GRUB_CMDLINE_LINUX_DEFAULT="quiet mitigations=off"/' > /tmp/fix_grub.tmp cat /tmp/fix_grub.tmp > /etc/default/grub rm -f /tmp/fix_grub.tmp update-grub echo -e "\n $greenplus Added mitigations=off to GRUB_CMDLINE_LINUX_DEFAULT" echo -e "\n $redexclaim Reboot for changes to take effect \n" fi } make_rootgreatagain () { echo -e "\n KALI-ROOT-LOGIN INSTALLATION: "$red"*** READ CAREFULLY! ***"$white" \n" echo -e " On Kali 2019.x and prior the default user was root" echo -e " On Kali 2020.1 and newer this was changed, the default user was changed to be " echo -e " an" $yellow$bold"actual user"$norm$white" on the system and not "$red$bold"root"$norm$white", this user is : kali (by default) " echo -e " \n Your existing user configurations will not be affected or altered. " echo -e " This will "$red"ONLY"$white" reenable the ability to login as root at boot and does "$red"NOT"$white" replace" echo -e " any existing user, remove any user files or user configurations." echo -e "\n If you wish to re-enable the ability to login to kali as root at the login screen " echo -e " and be root all the time, press Y " echo -e "\n If not, press N and the script will skip this section " echo -e "\n "$bold$red"If you are confused or dont understand what"$norm$white echo -e " "$bold$red"this part of the script is doing, press N"$norm$white echo -e "\n Do you want to re-enable the ability to login as root in kali?" read -n1 -p " Please type Y or N : " userinput case $userinput in y|Y) enable_rootlogin $force;; n|N) echo -e "\n $redexclaim skipping root login setup" ;; *) echo -e "\n invalid key try again Y or N"; make_rootgreatagain;; esac } enable_rootlogin () { section="kali-root-login" check=$(whereis kali-root-login | grep -i -c "kali-root-login: /usr/share/kali-root-login") fix_section $section $check $force echo -e "\n\nEnabling Root Login Give root a password" passwd root echo -e "\n $greenplus root login enabled \n" } fix_sead_warning () { finduser=$(logname) clear echo -e " "$bold$redexclaim$red" WARNING "$redexclaim$bold$red" PIMPMYKALI IMPACKET REMOVAL FUNCTION "$redexclaim$bold$red" WARNING "$redexclaim$white$norm" *** READ FULLY BEFORE PRESSING ANY KEY *** "$red"DISCLAIMER:"$white" This is a last resort effort to remove impacket from the system and install a clean working install of impacket-0.9.19 and should be only used as such. This is for only if you screwed up your impacket as bad as Bobloblaw (Blob) did!! (thank you blob! you are the wind beneath my impacket removal scripts!) This function of pimpmykali is reserved for the most severe cases of broken impacket installs, multiple impacket installs, etc, and will attempt to clean the system of impacket and any related files that may be preventing a clean and working install of impacket-0.9.19 It is not possible to forsee every possible scenario but this makes a best attempt of the most common dirs and files to clean your system to remove anything impacket related only from the areas listed below. This WILL RECURSIVLY DELETE ANY DIR NAMED impacket* from the following: /opt /usr/bin /usr/local/lib /usr/lib /home/$finduser/.local/bin /home/$finduser/.local/lib /root/.local/lib /root/.local/bin AND ANY related .py and .pyc files from impacket in the following: /usr/bin /local/local/bin /root/.local/bin /home/$finduser/.local/bin After this function completes the following will be run automatically sudo ./pimpmykali.sh --impacket Answering only Y to the following prompt will preform the above actions, pressing ANY OTHER KEY WILL EXIT " read -n1 -p " Press Y to execute or any other key to exit: " fixsead_userinput case $fixsead_userinput in y|Y) fix_sead_run ;; *) exit ;; esac } fix_sead_run () { # run update just in case eval apt update $silent # install pip and pip3 - pip3 is gonna get installed twice here know all about it python-pip-curl python3_pip # gracefully attempt to remove impacket via pip and pip3 eval pip uninstall impacket -y $silent eval pip3 uninstall impacket -y $silent # used to get the username running this script as sudo to check /home/$finduser/.local/lib and /home/$finduser/.local/bin finduser=$(logname) # Not playin here... anything impacket* in the following find statement goes BYE BYE and not ask about it.. its gone SEAD=$(find /opt /usr/bin /usr/local/lib /usr/lib /home/$finduser/.local/bin /home/$finduser/.local/lib ~/.local/lib ~/.local/bin -name impacket* 2> /dev/null) # added Last Chance Launch Sequence ** WARNING SCREEN ** and 10 second time out clear echo -e " If you've made it this far you're having a really bad day with impacket... " echo -e " Enjoy the last chance launch sequence!\n" echo -e " Preparing to nuke Impacket...\n" echo -e " $green[....]$white aquiring targets\n" echo -e " $green[$red+$green..$red+$green]$white targets selected\n$SEAD\n" echo -e " $green[-$red++$green-]$white targets locked\n" echo -e " $green[++++]$white systems ready\n" echo -e " $green[<$red@@$green>]$white taking aim\n" echo -e " $green[$red####$green]$white requesting launch code\n" echo -e " $green[$red$launch_codes_alpha-$launch_codes_beta-$launch_codes_charlie$green]$white launch code confirmed\n" wait_time=10 # seconds echo -e " Are you sure you meant to run this script?\n" temp_cnt=${wait_time} while [[ ${temp_cnt} -gt 0 ]]; do printf "\r You have %2d second(s) remaining to hit Ctrl+C to cancel this operation!" ${temp_cnt} sleep 1 ((temp_cnt--)) done echo -e "\n\n No user input detected... Executing!!" echo -e "\n $fourblinkexclaim *** FIRE!! *** $fourblinkexclaim\n" echo -e " $redstar function running removing :\n$SEAD\n" rm -rf $SEAD fix_impacket_array fix_impacket exit_screen } fix_impacket_array () { finduser=$(logname) arr=('addcomputer.py' 'atexec.py' 'dcomexec.py' 'dpapi.py' 'esentutl.py' 'findDelegation.py' 'GetADUsers.py' 'getArch.py' 'GetNPUsers.py' 'getPac.py' 'getST.py' 'getTGT.py' 'GetUserSPNs.py' 'goldenPac.py' 'karmaSMB.py' 'kintercept.py' 'lookupsid.py' 'mimikatz.py' 'mqtt_check.py' 'mssqlclient.py' 'mssqlinstance.py' 'netview.py' 'nmapAnswerMachine.py' 'ntfs-read.py' 'ntlmrelayx.py' 'ping6.py' 'ping.py' 'psexec.py' 'raiseChild.py' 'rdp_check.py' 'registry-read.py' 'reg.py' 'rpcdump.py' 'rpcmap.py' 'sambaPipe.py' 'samrdump.py' 'secretsdump.py' 'services.py' 'smbclient.py' 'smbexec.py' 'smbrelayx.py' 'smbserver.py' 'sniffer.py' 'sniff.py' 'split.py' 'ticketConverter.py' 'ticketer.py' 'wmiexec.py' 'wmipersist.py' 'wmiquery.py' 'addcomputer.pyc' 'atexec.pyc' 'dcomexec.pyc' 'dpapi.pyc' 'esentutl.pyc' 'findDelegation.pyc' 'GetADUsers.pyc' 'getArch.pyc' 'GetNPUsers.pyc' 'getPac.pyc' 'getST.pyc' 'getTGT.pyc' 'GetUserSPNs.pyc' 'goldenPac.pyc' 'karmaSMB.pyc' 'kintercept.pyc' 'lookupsid.pyc' 'mimikatz.pyc' 'mqtt_check.pyc' 'mssqlclient.pyc' 'mssqlinstance.pyc' 'netview.pyc' 'nmapAnswerMachine.pyc' 'ntfs-read.pyc' 'ntlmrelayx.pyc' 'ping6.pyc' 'ping.pyc' 'psexec.pyc' 'raiseChild.pyc' 'rdp_check.pyc' 'registry-read.pyc' 'reg.pyc' 'rpcdump.pyc' 'rpcmap.pyc' 'sambaPipe.pyc' 'samrdump.pyc' 'secretsdump.pyc' 'services.pyc' 'smbclient.pyc' 'smbexec.pyc' 'smbrelayx.pyc' 'smbserver.pyc' 'sniffer.pyc' 'sniff.pyc' 'split.pyc' 'ticketConverter.pyc' 'ticketer.pyc' 'wmiexec.pyc' 'wmipersist.pyc' 'wmiquery.pyc' ) for impacket_file in ${arr[@]}; do rm -f /usr/bin/$impacket_file /usr/local/bin/$impacket_file ~/.local/bin/$impacket_file /home/$finduser/.local/bin/$impacket_file # removed status of whats being removed from screen, too much screen garbage # echo -e "\n $greenplus $impacket_file removed" done } fix_impacket () { step 3 finduser=$(logname) # 2020.3 - package: impacket no longer exists in repo will throw error eval apt -y remove impacket $silent ## do not remove : python3-impacket impacket-scripts # make sure pip and pip3 are there before we attempt to uninstall gracefully python-pip-curl python3_pip # remove impacket gracefully eval pip uninstall impacket -y $silent eval pip3 uninstall impacket -y $silent # call fix_impacket_arrary for .py and .pyc removal fix_impacket_array # get and install new impacket-0.9.19 eval wget https://github.com/SecureAuthCorp/impacket/releases/download/impacket_0_9_19/impacket-0.9.19.tar.gz -O /tmp/impacket-0.9.19.tar.gz $silent eval tar xfz /tmp/impacket-0.9.19.tar.gz -C /opt $silent cd /opt chown -R root:root impacket-0.9.19 chmod -R 755 impacket-0.9.19 cd /opt/impacket-0.9.19 eval pip3 install lsassy $silent eval pip install flask $silent eval pip install pyasn1 $silent eval pip install pycryptodomex $silent eval pip install pyOpenSSL $silent eval pip install ldap3 $silent eval pip install ldapdomaindump $silent eval pip install wheel $silent eval pip install . $silent rm -f /tmp/impacket-0.9.19.tar.gz # added as a result of blobs removal of impacket and problem with smbmap after eval apt -y reinstall python3-impacket impacket-scripts $silent echo -e "\n $greenplus installed: impacket-0.9.19 python-pip wheel impacket flask pyasn1" echo -e "\n $greenplus installed: pycryptodomes pyOpenSSL ldap3 ldapdomaindump" echo -e "\n $greenplus installed: python3-pip python3-impacket impacket-scripts" } fix_upgrade () { virt_what run_update check_vm } bpt () { rm -rf /opt/the-essentials git clone https://github.com/blindpentester/the-essentials /opt/the-essentials cd /opt/the-essentials sh -c '/opt/the-essentials/the_essentials.sh --skip' exit_screen } pimpmywifi_main () { # - RTL8188AU FIX LIBC6 BREAKS LIBGCC-9-DEV # -----begin fix----- # apt -y update # apt -y remove realtek-88xxau-dkms && apt -y purge realtek-88xxau-dkms # apt -y install gcc-9-base # libc6 breaks libgcc-9-dev fix # apt -y install linux-headers-amd64 # apt -y install realtek-88xxau-dkms # apt -y upgrade # reboot # iwconfig # -----end fix------ # detect wifi chipset # install proper dkms driver based upon detection # or just give a menu for a selection of drivers? # -- status: idea stage - pre-alpha development # realtek-rtl8188eus-dkms - Realtek RTL8188EUS driver in DKMS format # realtek-rtl88xxau-dkms - Realtek RTL88xxAU driver in DKMS format # add function to check for linux-headers in /lib/modules vs unname -r # find_linux_headers=$(find /lib/modules -name $(uname -r) 2> /dev/null) # running_kernel=$(uname -r) if [ $running_kenrel = $find_linux_headers ] then echo SAME else echo DIFFERENT fi } virt_what() { # DISPLAY POWER MANAGEMENT -- ISSUE # if the vm's display goes 'dark' or 'power saving mode' for whatever reason virt-what is not # detecting which hypervisor this is suspect its looking at the video driver or the display itself # maybe implement something here to read the power management settings and drop inplace some that # are not set to dim / turn off display... echo -e "\n $greenplus installing virt-what \n" eval apt -y update $silent && apt -y install virt-what $silent } vbox_fix_shared_folder_permission_denied () { finduser=$(logname) groups=$(groups $finduser | grep -i -c "vboxsf") if [ $groups = 1 ] then # TRUE - user is already in vboxsf group echo -e "\n $greenminus : user is already a member of vboxsf group\n" else # FALSE - user is not in vboxsf group apply fix eval adduser $USER vboxsf echo -e "\n $greenplus fix applied : virtualbox permission denied on shared folder" echo -e " user added to vboxsf group " fi } check_vm () { echo -e "\n $greenplus detecting hypervisor type \n" vbox_check=$(virt-what | grep -i -c "virtualbox") # virtualbox check # if virt-what disappears from the repo # alternate detection to virt-what : vbox_check=$(cat /proc/kallsyms | grep -i -c "vbox") # alternate detection to virt-what : vbox_check=$(lsmod | grep -i -c "vbox") # change if statement to accomodate a $vbox_check -ne 0 detection vmware_check=$(virt-what | grep -i -c "vmware") # vmware check # if virt-what disappears from the repo # alternate detection to virt-what : vmware_check=$(cat /proc/kallsyms | grep -i -c "vmware") # alternate detection to virt-what : vmware_check=$(lsmod | grep -i -c "vmware") # change if statement to accomodate a $vmware_check -ne 0 detection # if $vmware_check = 0 && $vmware_check =0 then bare_metal_installation=1 # add double if $vbox_check && $vmware_check = 0 detection if [ $vbox_check = 1 ] then echo -e "\n $greenplus *** VIRTUALBOX DETECTED *** \n" echo -e "\n $greenplus installing virtualbox-dkms virtualbox-guest-x11" eval apt -y reinstall virtualbox-dkms virtualbox-guest-x11 $silent # Additional Fixes for virtualbox since were already here and detected virtualbox #----------------------- additional virtualbox fixes vbox_fix_shared_folder_permission_denied #----------------------- end of virtualbox additional fixes exit_screen elif [ $vmware_check = 1 ] then echo -e "\n $greenplus *** VMWARE DETECTED *** \n" echo -e "\n $greenplus installing open-vm-tools-desktop fuse" eval apt -y reinstall open-vm-tools-desktop fuse $silent # Additional Fixes for Vmware since were already here and detected vmware #----------------------- additional vmware fixes # fixes go here #----------------------- end of vmware additional fixes exit_screen else echo -e "\n $redstar Hypervisor not detected, Possible bare-metal installation not updating" fi } fix_sources () { echo "deb http://http.kali.org/kali kali-rolling main contrib non-free" > /etc/apt/sources.list echo "deb-src http://http.kali.org/kali kali-rolling main contrib non-free" >>/etc/apt/sources.list echo -e "\n $greenplus fixed sources /etc/apt/sources.list" } run_update () { fix_sources echo -e "\n $greenplus starting pimpmyupgrade \n" eval apt -y update $silent && apt -y upgrade $silent kernel_check=$(ls /lib/modules | sort -n | tail -n 1) echo -e "\n $greenplus installing linux-headers-$kernel_check \n" # Works well, tested multiple systems but keep an eye out for issues eval apt -y install linux-headers-amd64 $silent # generic meta package for correct linux-headers #apt -y install linux-headers-$kernel_check #apt install -y linux-headers-5.8.0-kali2-amd64 } # ascii art asciiart=$(base64 -d <<< "H4sIAAAAAAAAA31QQQrCQAy89xVz9NR8QHoQH+BVCATBvQmC CEXI480kXdteTJfdzGQy2S3wi9EM/2MnSDm3oUoMuJlX3hmsMMSjA4uAtUTsSQ9NUkkKVgKKBX p1lEC0auURW3owsQlTZtf4QtGZgjXYKT4inPtI23oEK7wXlyPnd8arKdKE0EPdUnhIf0v+iE2o 7BgVFVyec3u1OxFw+uRxbvPt8R6+MOpGq5cBAAA=" | gunzip ) pimpmykali_menu () { clear echo -e "$asciiart" echo -e "\n Select a option from menu: Rev:$revision" echo -e "\n Options are 0 thru 9 and BPT :" echo -e "\n 1 - Fix Missing (pip pip3 seclist gedit flameshot)" # fix_missing echo -e " 2 - Fix /etc/samba/smb.conf (adds the 2 missing lines)" # fix_smbconf echo -e " 3 - Fix Golang (installs golang)" # fix_golang echo -e " 4 - Fix Grub (adds mitigations=off)" # fix_grub echo -e " 5 - Fix Impacket (installs impacket)" # fix_impacket echo -e " 6 - Enable Root Login (installs kali-root-login)" # make_rootgreatagain echo -e " 7 - Install Gedit (installs gedit)" # fix_gedit echo -e " 8 - Fix nmap scripts (clamav-exec.nse and http-shellshock.nse)" # fix_nmap echo -e " 9 - Pimpmyupgrade (apt upgrade with vbox/vmware detection)" # fix_upgrade echo -e " (sources.list, linux-headers, vm-video)" echo -e " ! - Nuke Impacket (Type ! character for this menu item)\n" # fix_sead_warning echo -e " B - BlindPentesters 'The Essentials' tools & utilies collection\n" # bpt function - the essentials echo -e " 0 - Fix ALL (runs only 1 thru 9) \n" # fix_all echo -e " Now with Pimpmyupgrade\n - when prompted Yes or No select Yes to auto restart services \n" echo -e " use the --borked command line switch as a last resort to" echo -e " remove/reinstall impacket only!! \n" read -n1 -p " Enter 0 thru 9 or B press X to exit: " menuinput case $menuinput in 1) fix_missing ;; 2) fix_smbconf ;; 3) fix_golang ;; 4) fix_grub ;; 5) fix_impacket ;; 6) make_rootgreatagain ;; 7) fix_gedit ;; # added per sheeps request - still debating this 'request' 8) fix_nmap ;; 9) fix_upgrade ;; 0) fix_all ;; !) forced=1; fix_sead_warning;; b|B) bpt ;; # x|X) exit_screen ;; x|X) echo -e "\n\n Exiting pimpmykali.sh - Happy Hacking! \n" ;; *) pimpmykali_menu ;; esac } pimpmykali_help () { # do not edit this echo statement, spacing has been fixed and is correct for display in the terminal echo -e "\n valid command line arguements are : \n \n --all run all operations \n"\ "--smb only run smb.conf fix \n --go only fix/install golang"\ "\n --impacket only fix/install impacket \n --grub only add mitigations=off"\ "\n --root only enable root login \n --missing install all common missing packages" \ "\n --menu its the menu \n --gedit only install gedit\n --flameshot only fix/install flameshot" \ "\n --borked only to be used as last resort to remove-reinstall impacket" \ "\n --upgrade fix apt upgrade with detection for virtualbox or vmware\n --help your looking at it" exit } check_arg () { # honesly im going to remove 2/3'rds of these switches, just use -- or - and be done with it if [ "$1" == "" ] then pimpmykali_menu else case $1 in --menu) pimpmykali_menu ;; -menu) pimpmykali_menu ;; menu) pimpmykali_menu ;; --all) fix_all ;; -all) fix_all ;; all) fix_all ;; --smb) fix_smbconf ;; -smb) fix_smbconf ;; smb) fix_smbconf ;; --go) fix_golang ;; -go) fix_golang ;; go) fix_golang ;; --gedit) fix_gedit ;; -gedit) fix_gedit ;; gedit) fix_gedit ;; # added per sheeps request - still debating this 'request' --impacket) fix_impacket ;; -impacket) fix_impacket ;; impacket) fix_impacket ;; --grub) fix_grub ;; -grub) fix_grub ;; grub) fix_grub ;; --root) make_rootgreatagain ;; -root) make_rootgreatagain ;; root) make_rootgreatagain ;; --missing) fix_missing ;; -missing) fix_missing ;; missing) fix_missing ;; --help) pimpmykali_help ;; -help) pimpmykali_help ;; help) pimpmykali_help ;; --flameshot) fix_flameshot ;; -flameshot) fix_flameshot ;; flameshot) fix_flameshot ;; --force) force=1; fix_all $force ;; -force) force=1; fix_all $force ;; force) force=1; fix_all $force ;; --borked) force=1; fix_sead_warning;; -borked) force=1; fix_sead_warning; ;; borked) force=1; fix_sead_warning; ;; --nmap) fix_nmap ;; -nmap) fix_nmap ;; nmap) fix_nmap ;; --bpt) bpt ;; -bpt) bpt ;; bpt) bpt;; --upgrade) fix_upgrade ;; *) pimpmykali_help ; exit 0 ;; esac fi } exit_screen () { echo -e "$asciiart" echo -e "\n\n All Done! Happy Hacking! \n" exit } check_for_root check_distro check_arg "$1" exit_screen