Click to viewLearning materials】
Viper is a graphical Intranet penetration tool that modularizes and weaponizes common tactics and techniques used in Intranet penetration.
- Viper has integrated software bypass, Intranet tunnel, file management, enhanced command line and other basic functions.
- Viper implements common techniques in MITRE ATT&CK via modules. Currently, 55 modules have been integrated, covering initial access, persistence, permission promotion, bypass defense, credential access, information collection, horizontal movement and other categories.
- Viper helps you use Metasploit-Framework in an intuitive/visual way.
- Project address :github.com/FunnyWolf/V…
- Provides a graphical interface for users to infiltrate the Intranet using a browser.
Integrated software bypass, Intranet tunnel, file management, command line and other basic functions.
Built-in 70+ modules, covering initial access/persistence/permission promotion/bypass defense/credential access/information collection/horizontal movement and other categories
Visualized Intranet network topology display
Msfconsole command line, support color display,Tab prompt
Multi-user collaboration
Installation environment:
Kali Linux2021 latest release
Python3.9.2
Viper version: V2.0-RC11
Installation steps
1. Install the pre-installation files
sudo apt-get install git gcc python3-dev python3-pip
Install viper from PIP
Install Viper directly from PIP3 (best)
pip3 install viper-framework
You can also install Viper by pulling the source code
Git clone github.com/viper-frame…
Cd viper
Pip3 install
This demonstrates the installation directly from PIp3. If the following error occurs during the installation, install the libfuzzy-dev library.
Repeat the installation steps pip3 install Viper-Framework
Adding environment variables
export PATH=HOME/.local/bin:HOME/.local/bin:PATH
Checking the PATH directory
echo $PATH | grep “/.local/bin”
Instead of adding environment variables, check the PATH directory as shown.
Then directly enter the “viper” command in the terminal.
The Ubuntu installation steps are also shown above.
Private I check [Network security learning materials · Walkthrough】