Installation and activation guide

How to install and activate Exploit Pack - Step by step guide

Exploit Pack is a Java desktop application. Because it runs on a JVM, it is multi-platform and can run on Windows, Linux or macOS. This guide explains how to prepare an environment and install Exploit Pack on your chosen OS.


Overview & recommendations

  • Exploit Pack requires a Java Virtual Machine (JVM). You can use OpenJDK and Oracle Java.

  • Prefer a modern Java (JDK) release. For production and stability, we recommend using the latest LTS release.


Environment suggestions

  • We recommend running Exploit Pack from an isolated environment such as a virtual machine (VirtualBox, VMware, etc.).

  • Exploit Pack includes exploit scripts and utilities that many antivirus products will flag (and in some cases quarantine or delete). Running from a VM reduces the risk to your primary desktop and prevents accidental leaks during testing.

  • During penetration tests or red team exercises, always work from an isolated environment, not from your everyday workstation.


Technical requirements

Minimum recommended resources:

  • Disk: ≥ 500 MB free

  • RAM: ≈ 4 GB or more

  • CPU: modern multi-core CPU capable of handling multi-threaded workloads Any operating system is suitable, provided a compatible JVM is installed.


Nmap and Python

Exploit Pack requires both Nmap and Python (V2.7). If you don't have them installed yet, you can either:

  • Visit their official websites to download and install them manually.

  • Simply launch Exploit Pack, and a pop-up will guide you through the installation process for both tools.


Java installation: Quick notes

  • Decide whether to use OpenJDK or Oracle JDK. Both are supported.

  • Install a modern JDK. Preferably, the latest LTS release that receives long-term updates and support; using an up-to-date JDK gives you performance, stability and security improvements.

  • After installing the JDK, verify it from a terminal/command prompt with java -version and javac -version. The output should match the JDK you installed.


Installation steps

  • Download the launcher.

  • Download your copy of Exploit Pack using the personal download link and the credentials provided. The download links and activation are available for 48 hours.

  • Only extract (uncompress) the launcher. Do not extract other archive files yet; it should look like this:

  • Open the launcher.jar from the launcher folder

  • The tool in the launcher will appear greyed out.

  • Click Activate.

  • In the file dialog, select the Exploit Pack .zip file you downloaded and click Open.

  • Follow the on-screen steps. When activation succeeds, the Order now button will change to Launch.

  • Click Launch, and a new window will open.

  • Click Browse key and select your key file.

  • Read the EULA carefully. If you agree, click I agree. Exploit Pack will then start.

Congratulations! You have used your first CPU cycles with Exploit Pack on your system! ‌

Happy Hacking!

Important notes

  • If an antivirus flags files, run Exploit Pack in an isolated VM or lab and whitelist the Exploit Pack folder only inside that isolated environment.

  • Do not run Exploit Pack as the root/Administrator account. Run it as a regular (non-privileged) user to reduce risk.


Do you still need help? Feel free to contact us. We can help you out with the installation or with any other technical questions regarding the use of our tools.

Last updated

Was this helpful?