Skip to content

tikket1/KaliForgeII

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

KaliForge II

Bootstrap a security-focused Kali Linux VM with profiled tool sets, parallel GitHub downloads, and system hardening.

KaliForge II

Quick Start

Interactive (recommended) — launches a TUI wizard for configuration:

git clone https://github.com/tikket1/KaliForgeII.git
cd KaliForgeII
sudo -E python3 kaliforge2.py

Headless / scripted — run the bootstrap directly with environment variables:

export USER_NAME=myuser PROFILE=standard SSH_PORT=2222
sudo -E bash kaliforge2.sh

Security Profiles

Profile Use Case Includes
minimal Lightweight recon, small VPS nmap, netcat, curl, wget, jq
webapp Web app testing, bug bounty gobuster, ffuf, sqlmap, burpsuite, nikto, nuclei
internal Internal/AD pentesting crackmapexec, impacket, bloodhound, responder, smbclient
cloud Cloud infra security awscli, azure-cli, gcloud, kubectl, terraform
standard General pentesting (default) Balanced mix of web, network, and system tools
heavy Full arsenal Everything above + metasploit, hashcat, john, volatility3, C2

Tool Directory Structure

~/PentestTools/
├── Recon/{DNS,Web,Network,OSINT,Subdomain}
├── WebApp/{Scanners,Proxies,Fuzzing,SQLi,XSS}
├── Network/{Scanning,Exploitation,MITM,Wireless}
├── PrivEsc/{Linux,Windows/{PrintSpoofer,GodPotato}}
├── ActiveDirectory/{Enumeration,BloodHound,Kerberos,SharpHound}
├── Pivoting/{Linux,Windows}
├── Shells/{Reverse,WebShells,Generators}
├── C2/{Cobalt,Empire,Sliver}
├── Cloud/{AWS,Azure,GCP}
├── PostExploit/{Persistence,Lateral,Exfiltration}
├── Reports/{Templates,Screenshots,Evidence}
├── Wordlists/{Passwords,Usernames,Directories}
└── Binaries/{Windows,Linux}

Security Hardening

The bootstrap script applies the following hardening automatically:

  • SSH: Key-only auth, PAM disabled, custom port, AllowUsers restricted
  • Firewall: UFW deny-incoming by default, optional CIDR allowlists for SSH
  • Fail2ban: 2-hour bans, 5 max retries, systemd backend
  • Sysctl: rp_filter, syncookies, kptr_restrict, dmesg_restrict, optional IPv6 disable
  • Account lockdown: Root and default kali accounts locked
  • Sudo: 5-minute timeout, 3 password tries, input/output logging
  • Services disabled: avahi, cups, rpcbind, neo4j
  • Unattended upgrades: Kali rolling origin, auto-security-patches

Security Modes (TUI)

After initial setup, the TUI provides runtime mode switching:

  • Hardened -- Deny all incoming+outgoing except DNS/HTTP/HTTPS/NTP
  • Honeypot -- Allow all traffic, permissive firewall for threat research
  • Stealth -- Deny incoming, reduced logging
  • Pentest -- IP forwarding enabled for pivoting

Configuration

All settings are driven by environment variables (or set via the TUI):

Variable Default Description
USER_NAME tikket Non-root user to create
SSH_PORT 2222 SSH listen port
PROFILE standard Tool profile (see above)
PUBKEY (empty) SSH public key; SSH disabled if empty
INSTALL_KDE true Install KDE desktop + SDDM
GITHUB_TOKEN (empty) GitHub PAT for higher API rate limits
ALLOWLIST_CIDR (empty) Comma-separated CIDRs for SSH access
DISABLE_IPV6 false Disable IPv6 via sysctl
MAX_PARALLEL_DOWNLOADS 4 Concurrent GitHub release downloads
VERBOSE false Enable shell trace logging (set -x)
DRY_RUN false Print config summary and exit without changes

Files

File Purpose
kaliforge2.py Interactive TUI — configure and launch the setup
kaliforge2.sh Bootstrap script — does the actual provisioning
kaliforge2_ascii_terminal.txt ASCII art header for TUI
assets/KaliForgeIILogo.png Logo

Legal Disclaimer

This tool is for authorized security testing and education only. Users are responsible for compliance with all applicable laws. Use only on systems you own or have explicit written permission to test.

License

MIT License. See LICENSE.

About

Kali Bootstrapper+ For Pentesters Setting up fresh VM or Machines.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors