========
Examples
========

The following example playbooks require an installed `Metasploitable2 <https://docs.rapid7.com/metasploit/metasploitable-2/>`_ virtual machine and
a `Kali Linux <https://www.kali.org/>`_ with some packages installed:

* AttackMate
* NMap
* THC Hydra
* Metasploit
* nikto
* curl

.. note::

   It is advised to copy the example playbooks to the directory "./playbooks"

Prepare Kali-Linux:

::

  $ sudo apt install nikto nmap curl seclists hydra
  $ cp -r examples playbooks

Playbooks
---------

* `HTTP-client example <https://github.com/ait-aecid/attackmate/blob/main/examples/http-put_example.yml>`_
* `Include command example <https://github.com/ait-aecid/attackmate/blob/main/examples/include.yml>`_
* `Only If example <https://github.com/ait-aecid/attackmate/blob/main/examples/only_if.yml>`_
* `SSH/SFTP example <https://github.com/ait-aecid/attackmate/blob/main/examples/ssh_example.yml>`_
* `Upgrade meterpreter shell <https://github.com/ait-aecid/attackmate/blob/main/examples/upgrade_to_meterpreter.yml>`_
* `Fileshare via webserv example <https://github.com/ait-aecid/attackmate/blob/main/examples/webserv.yml>`_
* `Command injection and MSF multi handler example <https://github.com/ait-aecid/attackmate/blob/main/examples/webdemo.yml>`_