pentesting 0.7.1 → 0.7.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/index.js +71 -35
  2. package/package.json +1 -1
package/dist/index.js CHANGED
@@ -1299,41 +1299,77 @@ var execAsync = promisify(exec);
1299
1299
  var DOCKER_CONTAINER = process.env.PENTESTING_CONTAINER || "pentesting-tools";
1300
1300
  var FORCE_DOCKER = process.env.PENTESTING_DOCKER === "1";
1301
1301
  var DOCKER_TOOLS = [
1302
- "rustscan",
1303
- "nmap",
1304
- "masscan",
1305
- "gobuster",
1306
- "ffuf",
1307
- "nikto",
1308
- "sqlmap",
1309
- "dirb",
1310
- "hydra",
1311
- "john",
1312
- "hashcat",
1313
- "medusa",
1314
- "searchsploit",
1315
- "msfconsole",
1316
- "msfvenom",
1317
- "tshark",
1318
- "tcpdump",
1319
- "ngrep",
1320
- "chisel",
1321
- "proxychains",
1322
- "evil-winrm",
1323
- "binwalk",
1324
- "foremost",
1325
- "steghide",
1326
- "exiftool",
1327
- "volatility3",
1328
- "gdb",
1329
- "radare2",
1330
- "r2",
1331
- "subfinder",
1332
- "httpx",
1333
- "nuclei",
1334
- "impacket-psexec",
1335
- "impacket-wmiexec",
1336
- "impacket-smbexec"
1302
+ // Network scanning
1303
+ TOOL_NAME.RUSTSCAN,
1304
+ TOOL_NAME.NMAP_SCAN,
1305
+ TOOL_NAME.MASSCAN,
1306
+ TOOL_NAME.TCPDUMP_CAPTURE,
1307
+ TOOL_NAME.PING,
1308
+ TOOL_NAME.TRACEROUTE,
1309
+ TOOL_NAME.NETCAT,
1310
+ // DNS & Subdomain
1311
+ TOOL_NAME.DIG,
1312
+ TOOL_NAME.HOST,
1313
+ TOOL_NAME.NSLOOKUP,
1314
+ TOOL_NAME.WHOIS,
1315
+ TOOL_NAME.SUBFINDER,
1316
+ TOOL_NAME.AMASS,
1317
+ TOOL_NAME.DNSENUM,
1318
+ TOOL_NAME.ZONE_TRANSFER,
1319
+ // Service Enumeration
1320
+ TOOL_NAME.SNMP_WALK,
1321
+ TOOL_NAME.SNMP_CHECK,
1322
+ TOOL_NAME.ONESIXTYONE,
1323
+ TOOL_NAME.FTP_ENUM,
1324
+ TOOL_NAME.FTP_ANON,
1325
+ TOOL_NAME.NBTSCAN,
1326
+ TOOL_NAME.RPC_INFO,
1327
+ TOOL_NAME.SHOWMOUNT,
1328
+ TOOL_NAME.TELNET,
1329
+ // Web tools
1330
+ TOOL_NAME.FFUF,
1331
+ TOOL_NAME.FEROXBUSTER,
1332
+ TOOL_NAME.WHATWEB,
1333
+ TOOL_NAME.HTTPX,
1334
+ TOOL_NAME.NUCLEI,
1335
+ TOOL_NAME.NIKTO,
1336
+ TOOL_NAME.DIRECTORY_BRUTEFORCE,
1337
+ TOOL_NAME.SQL_INJECTION,
1338
+ TOOL_NAME.WAYBACKURLS,
1339
+ // Windows/SMB/AD
1340
+ TOOL_NAME.SMB_ENUM,
1341
+ TOOL_NAME.ENUM4LINUX,
1342
+ TOOL_NAME.CRACKMAPEXEC,
1343
+ TOOL_NAME.SMBCLIENT,
1344
+ TOOL_NAME.RPCCLIENT,
1345
+ TOOL_NAME.WINRM,
1346
+ TOOL_NAME.RDP_CHECK,
1347
+ TOOL_NAME.LDAP_SEARCH,
1348
+ TOOL_NAME.KERBRUTE,
1349
+ TOOL_NAME.BLOODHOUND,
1350
+ // Database
1351
+ TOOL_NAME.MSSQL_CLIENT,
1352
+ TOOL_NAME.MYSQL_CLIENT,
1353
+ TOOL_NAME.PSQL_CLIENT,
1354
+ TOOL_NAME.REDIS_CLI,
1355
+ TOOL_NAME.MONGO_CLIENT,
1356
+ // Bruteforce
1357
+ TOOL_NAME.HYDRA,
1358
+ TOOL_NAME.BRUTEFORCE_LOGIN,
1359
+ TOOL_NAME.CRACK_HASH,
1360
+ // Exploitation
1361
+ TOOL_NAME.SEARCHSPLOIT,
1362
+ TOOL_NAME.METASPLOIT,
1363
+ TOOL_NAME.GENERATE_PAYLOAD,
1364
+ // Post-exploitation
1365
+ TOOL_NAME.SETUP_TUNNEL,
1366
+ TOOL_NAME.LATERAL_MOVEMENT,
1367
+ TOOL_NAME.REVERSE_SHELL,
1368
+ TOOL_NAME.DUMP_CREDENTIALS,
1369
+ // Privesc
1370
+ TOOL_NAME.RUN_PRIVESC_ENUM,
1371
+ TOOL_NAME.CHECK_SUDO,
1372
+ TOOL_NAME.FIND_SUID
1337
1373
  ];
1338
1374
  async function isDockerAvailable() {
1339
1375
  try {
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "pentesting",
3
- "version": "0.7.1",
3
+ "version": "0.7.2",
4
4
  "description": "Autonomous Penetration Testing AI Agent",
5
5
  "type": "module",
6
6
  "main": "dist/index.js",