Automated security tools installation for Ubuntu systems
Simple, straightforward script to install and configure essential security analysis tools on Ubuntu. Designed for red teaming, pentesting, and security analysis work.
- nmap, ncat, netexec, smbclient
- dnsrecon, dnsenum, dnsutils
- proxychains4, net-tools, binwalk
- impacket (via pipx): Active Directory assessment tools
- responder: LLMNR/NBT-NS/mDNS poisoner
- certipy-ad: Active Directory certificate abuse
- hashcat with OpenCL support
- i3 window manager with polybar
- kitty terminal
- zsh with oh-my-zsh
- Obsidian note-taking
Run system update before using this script:
sudo apt update && sudo apt upgrade -yRecommended (v3.0 - Clean, modular architecture):
sudo ./Ubuntu-Autodeploy-v3.shLegacy version:
sudo ./Ubuntu-Autodeploy2-Beta.shImportant:
- Run with
sudo, not as root user directly - Script detects
$SUDO_USERand installs user-specific tools correctly - Logs installation to
/var/log/security-tools-install.log - v3 script automatically enables universe repository and updates package lists
- Restart your terminal for PATH changes to take effect
- Run
check-all-toolsto verify installations - Run
sec-envto activate Python virtual environment
The script adds 50+ aliases and helper functions:
quickscan <target>- Fast nmap scanfullscan <target>- Comprehensive nmap scansmbenum <target>- SMB enumerationcheck-all-tools- Verify tool installationsgenpass [length]- Generate random passwords- Plus many more encoding/decoding helpers
- System tools: Standard PATH (
/usr/bin,/usr/local/bin) - pipx tools:
~/.local/bin(netexec, impacket) - Python venv:
/opt/security-tools-venv(responder, certipy-ad) - Wrapper scripts:
/usr/local/bin(responder, certipy-venv)
If tools are not found after installation:
# Verify installations
check-all-tools
# Check pipx tools
pipx list
# Verify PATH
echo $PATH | grep -E 'local|snap|opt'
# Reload shell
source ~/.zshrc- Designed for Ubuntu/Debian-based systems
- Some tools may require additional configuration for specific use cases
- Network interfaces may need adjustment (e.g.,
eth0→ your interface) - Virtual environment:
sec-envorsource /opt/security-tools-venv/bin/activate