# Installation and activation guide

Exploit Pack is a Java desktop application. Because it runs on a JVM, it is multi-platform and can run on Windows, Linux or macOS. This guide explains how to prepare an environment and install Exploit Pack on your chosen OS.

***

### Overview & recommendations

* Exploit Pack requires a Java Virtual Machine (JVM). You can use [OpenJDK](https://openjdk.java.net/) and [Oracle Java](https://www.oracle.com/java/technologies/downloads/).
* Prefer a modern Java (JDK) release. For production and stability, we recommend using the latest **LTS** release.

***

### Environment suggestions

* We recommend running Exploit Pack from an isolated environment such as a virtual machine (VirtualBox, VMware, etc.).
* Exploit Pack includes exploit scripts and utilities that many antivirus products will flag (and in some cases quarantine or delete). Running from a VM reduces the risk to your primary desktop and prevents accidental leaks during testing.
* During penetration tests or red team exercises, always work from an isolated environment, not from your everyday workstation.

***

### Technical requirements

Minimum recommended resources:

* Disk: **≥ 500 MB** free
* RAM: **≈ 4 GB** or more
* CPU: modern multi-core CPU capable of handling multi-threaded workloads\
  Any operating system is suitable, provided a compatible JVM is installed.

***

#### Nmap and Python

Exploit Pack requires both [Nmap](https://nmap.org/download.html) and [Python](https://www.python.org/downloads/) (V2.7). If you don't have them installed yet, you can either:

* Visit their official websites to download and install them manually.
* Simply launch Exploit Pack, and a pop-up will guide you through the installation process for both tools.

***

### Java installation: Quick notes

* Decide whether to use OpenJDK or Oracle JDK. Both are supported.
* Install a modern JDK. Preferably, the latest LTS release that receives long-term updates and support; using an up-to-date JDK gives you performance, stability and security improvements.
* After installing the JDK, verify it from a terminal/command prompt with `java -version` and `javac -version`. The output should match the JDK you installed.

{% hint style="success" %}
Install Java on Linux ( Debian-based ) or Mac:&#x20;

```
apt-get install default-jdk
```

```
brew install --cask oracle-jdk
```

{% endhint %}

***

### Installation steps

{% embed url="<https://youtu.be/_4dMW_atZWM>" %}

* Download the launcher.
* Download your copy of Exploit Pack using the personal download link and the credentials provided. The download links and activation are available for **48 hours**.
* **Only** extract (uncompress) the launcher. Do **not** extract other archive files yet; it should look like this:

<figure><img src="https://1112023788-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MU9W-baGw5TeUzNXoyo%2Fuploads%2FsCcUwaX61wqiBTgWJQ9F%2FScreenshot%202025-10-16%20115401.png?alt=media&#x26;token=53801abb-8c50-4b80-87d2-87c1cdfeccc7" alt=""><figcaption></figcaption></figure>

* Open the launcher.jar from the launcher folder
* The tool in the launcher will appear greyed out.

<figure><img src="https://1112023788-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MU9W-baGw5TeUzNXoyo%2Fuploads%2FVHIekiLpetU0JH67RWu0%2FScreenshot%202025-10-15%20121235.png?alt=media&#x26;token=2728dc1c-861d-4c65-a1b9-1977b5f870f5" alt=""><figcaption></figcaption></figure>

* Click **Activate**.
* In the file dialog, select the Exploit Pack `.zip` file you downloaded and click **Open**.

<figure><img src="https://1112023788-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MU9W-baGw5TeUzNXoyo%2Fuploads%2FXsPoyG00pMTL54B0J2et%2FScreenshot%202025-10-16%20111316.png?alt=media&#x26;token=d48ea8f5-ea6c-495b-a3cc-544a8db35212" alt=""><figcaption></figcaption></figure>

* Follow the on-screen steps. When activation succeeds, the **Order now** button will change to **Launch**.
* Click **Launch,** and a new window will open.

<figure><img src="https://1112023788-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MU9W-baGw5TeUzNXoyo%2Fuploads%2FFFJqhXvuMzYpppEsry0q%2FScreenshot%202025-10-16%20111349.png?alt=media&#x26;token=105cf412-e8f4-44b7-8fba-2e9f95127038" alt=""><figcaption></figcaption></figure>

* Click **Browse key** and select your key file.
* Read the EULA carefully. If you agree, click **I agree**. Exploit Pack will then start.

Congratulations! You have used your first CPU cycles with Exploit Pack on your system! ‌&#x20;

Happy Hacking!

### Important notes

* If an antivirus flags files, run Exploit Pack in an isolated VM or lab and whitelist the Exploit Pack folder **only inside that isolated environment**.
* Do **not** run Exploit Pack as the root/Administrator account. Run it as a regular (non-privileged) user to reduce risk.

***

{% hint style="warning" %}
The first time you run Exploit Pack, it will prompt you with the first-steps configuration wizard, if you need help to configure it in Exploit Pack, please check the section "[First Steps](https://exploit-pack.gitbook.io/exploit-pack-manual-pages/master/first-steps)"&#x20;

Never run exploit code on production networks or systems without explicit authorisation.

Keep your JVM and OS updated with security patches.

When performing client engagements, follow the rules of engagement and always get written authorisation.
{% endhint %}

{% hint style="info" %}
**Do you still need help?**  Feel free to [contact us](https://www.exploitpack.com/pages/contact). We can help you out with the installation or with any other technical questions regarding the use of our tools.
{% endhint %}
