Skip to content

installation

This guide will help you set up X with rainbow tables and the exploit database.


Run these installation commands in order:

Terminal window
apt-get install x /home/USER_HOME
apt-get install exploits /home/USER_HOME
apt-get install bash /home/USER_HOME
apt-get install man /home/USER_HOME
apt-get install passwords /home/USER_HOME

Run X at least once, then execute the following commands in any order:

Terminal window
exploits
bash
man
passwords

Initialize your password lists and rainbow tables:

Terminal window
rainbow -n

If not prompted, enable rainbow indexing on startup:

Terminal window
config -p

If you plan to use the AI agent, speed up learning by having it read all man pages:

Terminal window
ai learn all

Verify and auto-install required core libraries:

Terminal window
sys check

Requirements:

  • Must be run from main session
  • Requires internet connection
  • Auto-installs: crypto.so, metaxploit.so, aptclient.so, librshell.so

This ensures X has all necessary components to function properly.

6. Configure Root Bounce Library (Optional)

Section titled “6. Configure Root Bounce Library (Optional)”

If you’re using a root bounce library, configure it:

Terminal window
# Set the bounce library (can be short like "http", "ssh", etc.)
config -v bounce_lib
# Set the exploit index
config -x
# Add library to saved libs
libs -a /path/to/library.so

Important: Make regular backups of your database - bad things happen!

Terminal window
exp backup

The included bash scripts demonstrate how X’s macro/bash system works:

  • Most scripts are usable out of the box
  • Some require a working exploit database
  • Use them as learning examples for creating your own scripts

Once X is set up correctly, it becomes a powerful operation script. However, X requires regular maintenance to keep the database updated.

Run these regularly to keep your exploit database current:

Terminal window
pacman exp router
pacman -Sy -e -c 100

For weekly maintenance, use a higher count:

Terminal window
pacman -Sy -e -c 1000

Always use @proxy after you have a working database and before attacking systems.


  • List commands: Type ?, cmd, or help from any object
  • Man pages: Most commands have documentation - man <command>
  • RTFM: Read the manual pages for detailed information

If you need help getting X up and running (and can stream):


⚠️ X should be used as a user and not run as root.

  • Running as root may cause unknown issues
  • If you choose to run as root, be aware of potential problems
  • You can chmod your / filesystem if needed
  • Payload must be 755 to work correctly

If you are a new player or have little to no experience with Linux:

Consider using Doom instead of X

X is a powerful but complex tool that requires Linux knowledge and regular maintenance.


  • Install all packages (x, exploits, bash, man, passwords)
  • Run each installer (exploits, bash, man, passwords)
  • Initialize rainbow tables (rainbow -n)
  • Run system check (sys check)
  • Configure bounce library (optional)
  • Backup database (exp backup)
  • Set up AI learning (optional - ai learn all)
  • Regular maintenance with pacman updates
  • Always use @proxy before attacks

Happy Hacking! 🚀