souleyez 2.43.26__py3-none-any.whl → 2.43.34__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (358) hide show
  1. souleyez/__init__.py +1 -2
  2. souleyez/ai/__init__.py +21 -15
  3. souleyez/ai/action_mapper.py +249 -150
  4. souleyez/ai/chain_advisor.py +116 -100
  5. souleyez/ai/claude_provider.py +29 -28
  6. souleyez/ai/context_builder.py +80 -62
  7. souleyez/ai/executor.py +158 -117
  8. souleyez/ai/feedback_handler.py +136 -121
  9. souleyez/ai/llm_factory.py +27 -20
  10. souleyez/ai/llm_provider.py +4 -2
  11. souleyez/ai/ollama_provider.py +6 -9
  12. souleyez/ai/ollama_service.py +44 -37
  13. souleyez/ai/path_scorer.py +91 -76
  14. souleyez/ai/recommender.py +176 -144
  15. souleyez/ai/report_context.py +74 -73
  16. souleyez/ai/report_service.py +84 -66
  17. souleyez/ai/result_parser.py +222 -229
  18. souleyez/ai/safety.py +67 -44
  19. souleyez/auth/__init__.py +23 -22
  20. souleyez/auth/audit.py +36 -26
  21. souleyez/auth/engagement_access.py +65 -48
  22. souleyez/auth/permissions.py +14 -3
  23. souleyez/auth/session_manager.py +54 -37
  24. souleyez/auth/user_manager.py +109 -64
  25. souleyez/commands/audit.py +40 -43
  26. souleyez/commands/auth.py +35 -15
  27. souleyez/commands/deliverables.py +55 -50
  28. souleyez/commands/engagement.py +47 -28
  29. souleyez/commands/license.py +32 -23
  30. souleyez/commands/screenshots.py +36 -32
  31. souleyez/commands/user.py +82 -36
  32. souleyez/config.py +52 -44
  33. souleyez/core/credential_tester.py +87 -81
  34. souleyez/core/cve_mappings.py +179 -192
  35. souleyez/core/cve_matcher.py +162 -148
  36. souleyez/core/msf_auto_mapper.py +100 -83
  37. souleyez/core/msf_chain_engine.py +294 -256
  38. souleyez/core/msf_database.py +153 -70
  39. souleyez/core/msf_integration.py +679 -673
  40. souleyez/core/msf_rpc_client.py +40 -42
  41. souleyez/core/msf_rpc_manager.py +77 -79
  42. souleyez/core/msf_sync_manager.py +241 -181
  43. souleyez/core/network_utils.py +22 -15
  44. souleyez/core/parser_handler.py +34 -25
  45. souleyez/core/pending_chains.py +114 -63
  46. souleyez/core/templates.py +158 -107
  47. souleyez/core/tool_chaining.py +9526 -2879
  48. souleyez/core/version_utils.py +79 -94
  49. souleyez/core/vuln_correlation.py +136 -89
  50. souleyez/core/web_utils.py +33 -32
  51. souleyez/data/wordlists/ad_users.txt +378 -0
  52. souleyez/data/wordlists/api_endpoints_large.txt +769 -0
  53. souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
  54. souleyez/data/wordlists/lfi_payloads.txt +82 -0
  55. souleyez/data/wordlists/passwords_brute.txt +1548 -0
  56. souleyez/data/wordlists/passwords_crack.txt +2479 -0
  57. souleyez/data/wordlists/passwords_spray.txt +386 -0
  58. souleyez/data/wordlists/subdomains_large.txt +5057 -0
  59. souleyez/data/wordlists/usernames_common.txt +694 -0
  60. souleyez/data/wordlists/web_dirs_large.txt +4769 -0
  61. souleyez/detection/__init__.py +1 -1
  62. souleyez/detection/attack_signatures.py +12 -17
  63. souleyez/detection/mitre_mappings.py +61 -55
  64. souleyez/detection/validator.py +97 -86
  65. souleyez/devtools.py +23 -10
  66. souleyez/docs/README.md +4 -4
  67. souleyez/docs/api-reference/cli-commands.md +2 -2
  68. souleyez/docs/developer-guide/adding-new-tools.md +562 -0
  69. souleyez/docs/user-guide/auto-chaining.md +30 -8
  70. souleyez/docs/user-guide/getting-started.md +1 -1
  71. souleyez/docs/user-guide/installation.md +26 -3
  72. souleyez/docs/user-guide/metasploit-integration.md +2 -2
  73. souleyez/docs/user-guide/rbac.md +1 -1
  74. souleyez/docs/user-guide/scope-management.md +1 -1
  75. souleyez/docs/user-guide/siem-integration.md +1 -1
  76. souleyez/docs/user-guide/tools-reference.md +1 -8
  77. souleyez/docs/user-guide/worker-management.md +1 -1
  78. souleyez/engine/background.py +1239 -535
  79. souleyez/engine/base.py +4 -1
  80. souleyez/engine/job_status.py +17 -49
  81. souleyez/engine/log_sanitizer.py +103 -77
  82. souleyez/engine/manager.py +38 -7
  83. souleyez/engine/result_handler.py +2200 -1550
  84. souleyez/engine/worker_manager.py +50 -41
  85. souleyez/export/evidence_bundle.py +72 -62
  86. souleyez/feature_flags/features.py +16 -20
  87. souleyez/feature_flags.py +5 -9
  88. souleyez/handlers/__init__.py +11 -0
  89. souleyez/handlers/base.py +188 -0
  90. souleyez/handlers/bash_handler.py +277 -0
  91. souleyez/handlers/bloodhound_handler.py +243 -0
  92. souleyez/handlers/certipy_handler.py +311 -0
  93. souleyez/handlers/crackmapexec_handler.py +486 -0
  94. souleyez/handlers/dnsrecon_handler.py +344 -0
  95. souleyez/handlers/enum4linux_handler.py +400 -0
  96. souleyez/handlers/evil_winrm_handler.py +493 -0
  97. souleyez/handlers/ffuf_handler.py +815 -0
  98. souleyez/handlers/gobuster_handler.py +1114 -0
  99. souleyez/handlers/gpp_extract_handler.py +334 -0
  100. souleyez/handlers/hashcat_handler.py +444 -0
  101. souleyez/handlers/hydra_handler.py +563 -0
  102. souleyez/handlers/impacket_getuserspns_handler.py +343 -0
  103. souleyez/handlers/impacket_psexec_handler.py +222 -0
  104. souleyez/handlers/impacket_secretsdump_handler.py +426 -0
  105. souleyez/handlers/john_handler.py +286 -0
  106. souleyez/handlers/katana_handler.py +425 -0
  107. souleyez/handlers/kerbrute_handler.py +298 -0
  108. souleyez/handlers/ldapsearch_handler.py +636 -0
  109. souleyez/handlers/lfi_extract_handler.py +464 -0
  110. souleyez/handlers/msf_auxiliary_handler.py +408 -0
  111. souleyez/handlers/msf_exploit_handler.py +380 -0
  112. souleyez/handlers/nikto_handler.py +413 -0
  113. souleyez/handlers/nmap_handler.py +821 -0
  114. souleyez/handlers/nuclei_handler.py +359 -0
  115. souleyez/handlers/nxc_handler.py +371 -0
  116. souleyez/handlers/rdp_sec_check_handler.py +353 -0
  117. souleyez/handlers/registry.py +292 -0
  118. souleyez/handlers/responder_handler.py +232 -0
  119. souleyez/handlers/service_explorer_handler.py +434 -0
  120. souleyez/handlers/smbclient_handler.py +344 -0
  121. souleyez/handlers/smbmap_handler.py +510 -0
  122. souleyez/handlers/smbpasswd_handler.py +296 -0
  123. souleyez/handlers/sqlmap_handler.py +1116 -0
  124. souleyez/handlers/theharvester_handler.py +601 -0
  125. souleyez/handlers/web_login_test_handler.py +327 -0
  126. souleyez/handlers/whois_handler.py +277 -0
  127. souleyez/handlers/wpscan_handler.py +554 -0
  128. souleyez/history.py +32 -16
  129. souleyez/importers/msf_importer.py +106 -75
  130. souleyez/importers/smart_importer.py +208 -147
  131. souleyez/integrations/siem/__init__.py +10 -10
  132. souleyez/integrations/siem/base.py +17 -18
  133. souleyez/integrations/siem/elastic.py +108 -122
  134. souleyez/integrations/siem/factory.py +207 -80
  135. souleyez/integrations/siem/googlesecops.py +146 -154
  136. souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
  137. souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
  138. souleyez/integrations/siem/sentinel.py +107 -109
  139. souleyez/integrations/siem/splunk.py +246 -212
  140. souleyez/integrations/siem/wazuh.py +65 -71
  141. souleyez/integrations/wazuh/__init__.py +5 -5
  142. souleyez/integrations/wazuh/client.py +70 -93
  143. souleyez/integrations/wazuh/config.py +85 -57
  144. souleyez/integrations/wazuh/host_mapper.py +28 -36
  145. souleyez/integrations/wazuh/sync.py +78 -68
  146. souleyez/intelligence/__init__.py +4 -5
  147. souleyez/intelligence/correlation_analyzer.py +309 -295
  148. souleyez/intelligence/exploit_knowledge.py +661 -623
  149. souleyez/intelligence/exploit_suggestions.py +159 -139
  150. souleyez/intelligence/gap_analyzer.py +132 -97
  151. souleyez/intelligence/gap_detector.py +251 -214
  152. souleyez/intelligence/sensitive_tables.py +266 -129
  153. souleyez/intelligence/service_parser.py +137 -123
  154. souleyez/intelligence/surface_analyzer.py +407 -268
  155. souleyez/intelligence/target_parser.py +159 -162
  156. souleyez/licensing/__init__.py +6 -6
  157. souleyez/licensing/validator.py +17 -19
  158. souleyez/log_config.py +79 -54
  159. souleyez/main.py +1505 -687
  160. souleyez/migrations/fix_job_counter.py +16 -14
  161. souleyez/parsers/bloodhound_parser.py +41 -39
  162. souleyez/parsers/crackmapexec_parser.py +178 -111
  163. souleyez/parsers/dalfox_parser.py +72 -77
  164. souleyez/parsers/dnsrecon_parser.py +103 -91
  165. souleyez/parsers/enum4linux_parser.py +183 -153
  166. souleyez/parsers/ffuf_parser.py +29 -25
  167. souleyez/parsers/gobuster_parser.py +301 -41
  168. souleyez/parsers/hashcat_parser.py +324 -79
  169. souleyez/parsers/http_fingerprint_parser.py +350 -103
  170. souleyez/parsers/hydra_parser.py +131 -111
  171. souleyez/parsers/impacket_parser.py +231 -178
  172. souleyez/parsers/john_parser.py +98 -86
  173. souleyez/parsers/katana_parser.py +316 -0
  174. souleyez/parsers/msf_parser.py +943 -498
  175. souleyez/parsers/nikto_parser.py +346 -65
  176. souleyez/parsers/nmap_parser.py +262 -174
  177. souleyez/parsers/nuclei_parser.py +40 -44
  178. souleyez/parsers/responder_parser.py +26 -26
  179. souleyez/parsers/searchsploit_parser.py +74 -74
  180. souleyez/parsers/service_explorer_parser.py +279 -0
  181. souleyez/parsers/smbmap_parser.py +180 -124
  182. souleyez/parsers/sqlmap_parser.py +434 -308
  183. souleyez/parsers/theharvester_parser.py +75 -57
  184. souleyez/parsers/whois_parser.py +135 -94
  185. souleyez/parsers/wpscan_parser.py +278 -190
  186. souleyez/plugins/afp.py +44 -36
  187. souleyez/plugins/afp_brute.py +114 -46
  188. souleyez/plugins/ard.py +48 -37
  189. souleyez/plugins/bloodhound.py +95 -61
  190. souleyez/plugins/certipy.py +303 -0
  191. souleyez/plugins/crackmapexec.py +186 -85
  192. souleyez/plugins/dalfox.py +120 -59
  193. souleyez/plugins/dns_hijack.py +146 -41
  194. souleyez/plugins/dnsrecon.py +97 -61
  195. souleyez/plugins/enum4linux.py +91 -66
  196. souleyez/plugins/evil_winrm.py +291 -0
  197. souleyez/plugins/ffuf.py +166 -90
  198. souleyez/plugins/firmware_extract.py +133 -29
  199. souleyez/plugins/gobuster.py +387 -190
  200. souleyez/plugins/gpp_extract.py +393 -0
  201. souleyez/plugins/hashcat.py +100 -73
  202. souleyez/plugins/http_fingerprint.py +854 -267
  203. souleyez/plugins/hydra.py +566 -200
  204. souleyez/plugins/impacket_getnpusers.py +117 -69
  205. souleyez/plugins/impacket_psexec.py +84 -64
  206. souleyez/plugins/impacket_secretsdump.py +103 -69
  207. souleyez/plugins/impacket_smbclient.py +89 -75
  208. souleyez/plugins/john.py +86 -69
  209. souleyez/plugins/katana.py +313 -0
  210. souleyez/plugins/kerbrute.py +237 -0
  211. souleyez/plugins/lfi_extract.py +541 -0
  212. souleyez/plugins/macos_ssh.py +117 -48
  213. souleyez/plugins/mdns.py +35 -30
  214. souleyez/plugins/msf_auxiliary.py +253 -130
  215. souleyez/plugins/msf_exploit.py +239 -161
  216. souleyez/plugins/nikto.py +134 -78
  217. souleyez/plugins/nmap.py +275 -91
  218. souleyez/plugins/nuclei.py +180 -89
  219. souleyez/plugins/nxc.py +285 -0
  220. souleyez/plugins/plugin_base.py +35 -36
  221. souleyez/plugins/plugin_template.py +13 -5
  222. souleyez/plugins/rdp_sec_check.py +130 -0
  223. souleyez/plugins/responder.py +112 -71
  224. souleyez/plugins/router_http_brute.py +76 -65
  225. souleyez/plugins/router_ssh_brute.py +118 -41
  226. souleyez/plugins/router_telnet_brute.py +124 -42
  227. souleyez/plugins/routersploit.py +91 -59
  228. souleyez/plugins/routersploit_exploit.py +77 -55
  229. souleyez/plugins/searchsploit.py +91 -77
  230. souleyez/plugins/service_explorer.py +1160 -0
  231. souleyez/plugins/smbmap.py +122 -72
  232. souleyez/plugins/smbpasswd.py +215 -0
  233. souleyez/plugins/sqlmap.py +301 -113
  234. souleyez/plugins/theharvester.py +127 -75
  235. souleyez/plugins/tr069.py +79 -57
  236. souleyez/plugins/upnp.py +65 -47
  237. souleyez/plugins/upnp_abuse.py +73 -55
  238. souleyez/plugins/vnc_access.py +129 -42
  239. souleyez/plugins/vnc_brute.py +109 -38
  240. souleyez/plugins/web_login_test.py +417 -0
  241. souleyez/plugins/whois.py +77 -58
  242. souleyez/plugins/wpscan.py +173 -69
  243. souleyez/reporting/__init__.py +2 -1
  244. souleyez/reporting/attack_chain.py +411 -346
  245. souleyez/reporting/charts.py +436 -501
  246. souleyez/reporting/compliance_mappings.py +334 -201
  247. souleyez/reporting/detection_report.py +126 -125
  248. souleyez/reporting/formatters.py +828 -591
  249. souleyez/reporting/generator.py +386 -302
  250. souleyez/reporting/metrics.py +72 -75
  251. souleyez/scanner.py +35 -29
  252. souleyez/security/__init__.py +37 -11
  253. souleyez/security/scope_validator.py +175 -106
  254. souleyez/security/validation.py +223 -149
  255. souleyez/security.py +22 -6
  256. souleyez/storage/credentials.py +247 -186
  257. souleyez/storage/crypto.py +296 -129
  258. souleyez/storage/database.py +73 -50
  259. souleyez/storage/db.py +58 -36
  260. souleyez/storage/deliverable_evidence.py +177 -128
  261. souleyez/storage/deliverable_exporter.py +282 -246
  262. souleyez/storage/deliverable_templates.py +134 -116
  263. souleyez/storage/deliverables.py +135 -130
  264. souleyez/storage/engagements.py +109 -56
  265. souleyez/storage/evidence.py +181 -152
  266. souleyez/storage/execution_log.py +31 -17
  267. souleyez/storage/exploit_attempts.py +93 -57
  268. souleyez/storage/exploits.py +67 -36
  269. souleyez/storage/findings.py +48 -61
  270. souleyez/storage/hosts.py +176 -144
  271. souleyez/storage/migrate_to_engagements.py +43 -19
  272. souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
  273. souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
  274. souleyez/storage/migrations/_003_add_execution_log.py +14 -8
  275. souleyez/storage/migrations/_005_screenshots.py +13 -5
  276. souleyez/storage/migrations/_006_deliverables.py +13 -5
  277. souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
  278. souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
  279. souleyez/storage/migrations/_010_evidence_linking.py +17 -10
  280. souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
  281. souleyez/storage/migrations/_012_team_collaboration.py +34 -21
  282. souleyez/storage/migrations/_013_add_host_tags.py +12 -6
  283. souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
  284. souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
  285. souleyez/storage/migrations/_016_add_domain_field.py +10 -4
  286. souleyez/storage/migrations/_017_msf_sessions.py +16 -8
  287. souleyez/storage/migrations/_018_add_osint_target.py +10 -6
  288. souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
  289. souleyez/storage/migrations/_020_add_rbac.py +36 -15
  290. souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
  291. souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
  292. souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
  293. souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
  294. souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
  295. souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
  296. souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
  297. souleyez/storage/migrations/__init__.py +26 -26
  298. souleyez/storage/migrations/migration_manager.py +19 -19
  299. souleyez/storage/msf_sessions.py +100 -65
  300. souleyez/storage/osint.py +17 -24
  301. souleyez/storage/recommendation_engine.py +269 -235
  302. souleyez/storage/screenshots.py +33 -32
  303. souleyez/storage/smb_shares.py +136 -92
  304. souleyez/storage/sqlmap_data.py +183 -128
  305. souleyez/storage/team_collaboration.py +135 -141
  306. souleyez/storage/timeline_tracker.py +122 -94
  307. souleyez/storage/wazuh_vulns.py +64 -66
  308. souleyez/storage/web_paths.py +33 -37
  309. souleyez/testing/credential_tester.py +221 -205
  310. souleyez/ui/__init__.py +1 -1
  311. souleyez/ui/ai_quotes.py +12 -12
  312. souleyez/ui/attack_surface.py +2439 -1516
  313. souleyez/ui/chain_rules_view.py +914 -382
  314. souleyez/ui/correlation_view.py +312 -230
  315. souleyez/ui/dashboard.py +2382 -1130
  316. souleyez/ui/deliverables_view.py +148 -62
  317. souleyez/ui/design_system.py +13 -13
  318. souleyez/ui/errors.py +49 -49
  319. souleyez/ui/evidence_linking_view.py +284 -179
  320. souleyez/ui/evidence_vault.py +393 -285
  321. souleyez/ui/exploit_suggestions_view.py +555 -349
  322. souleyez/ui/export_view.py +100 -66
  323. souleyez/ui/gap_analysis_view.py +315 -171
  324. souleyez/ui/help_system.py +105 -97
  325. souleyez/ui/intelligence_view.py +436 -293
  326. souleyez/ui/interactive.py +23434 -10286
  327. souleyez/ui/interactive_selector.py +75 -68
  328. souleyez/ui/log_formatter.py +47 -39
  329. souleyez/ui/menu_components.py +22 -13
  330. souleyez/ui/msf_auxiliary_menu.py +184 -133
  331. souleyez/ui/pending_chains_view.py +336 -172
  332. souleyez/ui/progress_indicators.py +5 -3
  333. souleyez/ui/recommendations_view.py +195 -137
  334. souleyez/ui/rule_builder.py +343 -225
  335. souleyez/ui/setup_wizard.py +678 -284
  336. souleyez/ui/shortcuts.py +217 -165
  337. souleyez/ui/splunk_gap_analysis_view.py +452 -270
  338. souleyez/ui/splunk_vulns_view.py +139 -86
  339. souleyez/ui/team_dashboard.py +498 -335
  340. souleyez/ui/template_selector.py +196 -105
  341. souleyez/ui/terminal.py +6 -6
  342. souleyez/ui/timeline_view.py +198 -127
  343. souleyez/ui/tool_setup.py +264 -164
  344. souleyez/ui/tutorial.py +202 -72
  345. souleyez/ui/tutorial_state.py +40 -40
  346. souleyez/ui/wazuh_vulns_view.py +235 -141
  347. souleyez/ui/wordlist_browser.py +260 -107
  348. souleyez/ui.py +464 -312
  349. souleyez/utils/tool_checker.py +427 -367
  350. souleyez/utils.py +33 -29
  351. souleyez/wordlists.py +134 -167
  352. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/METADATA +1 -1
  353. souleyez-2.43.34.dist-info/RECORD +443 -0
  354. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/WHEEL +1 -1
  355. souleyez-2.43.26.dist-info/RECORD +0 -379
  356. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/entry_points.txt +0 -0
  357. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/licenses/LICENSE +0 -0
  358. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/top_level.txt +0 -0
@@ -21,59 +21,61 @@ def fix_job_counter():
21
21
  jobs_dir = os.path.join(root, "data", "jobs")
22
22
  jobs_file = os.path.join(jobs_dir, "jobs.json")
23
23
  counter_file = os.path.join(jobs_dir, ".job_counter")
24
-
24
+
25
25
  if not os.path.exists(jobs_dir):
26
26
  print(f"✗ Jobs directory not found: {jobs_dir}")
27
27
  return False
28
-
28
+
29
29
  # Read existing jobs
30
30
  jobs = []
31
31
  if os.path.exists(jobs_file):
32
32
  try:
33
- with open(jobs_file, 'r') as f:
33
+ with open(jobs_file, "r") as f:
34
34
  jobs = json.load(f)
35
35
  except Exception as e:
36
36
  print(f"✗ Error reading jobs file: {e}")
37
37
  return False
38
-
38
+
39
39
  # Find max job ID
40
40
  max_id = 0
41
41
  stuck_jobs = []
42
42
  for job in jobs:
43
- job_id = job.get('id', 0)
43
+ job_id = job.get("id", 0)
44
44
  if job_id > max_id:
45
45
  max_id = job_id
46
-
46
+
47
47
  # Identify stuck jobs (queued with no PID)
48
- if job.get('status') == 'queued' and job.get('pid') is None:
48
+ if job.get("status") == "queued" and job.get("pid") is None:
49
49
  stuck_jobs.append(job_id)
50
-
50
+
51
51
  # Create counter file
52
52
  next_id = max_id + 1
53
53
  try:
54
- with open(counter_file, 'w') as f:
54
+ with open(counter_file, "w") as f:
55
55
  f.write(str(next_id))
56
56
  print(f"✓ Created job counter: next ID will be {next_id}")
57
57
  except Exception as e:
58
58
  print(f"✗ Error creating counter file: {e}")
59
59
  return False
60
-
60
+
61
61
  # Report stuck jobs
62
62
  if stuck_jobs:
63
63
  print(f"\n⚠️ Found {len(stuck_jobs)} stuck job(s): {stuck_jobs}")
64
64
  print(" These jobs are in 'queued' status but have no PID (never started)")
65
- print(" Recommendation: Delete them with 'souleyez jobs purge' or kill them individually")
65
+ print(
66
+ " Recommendation: Delete them with 'souleyez jobs purge' or kill them individually"
67
+ )
66
68
  else:
67
69
  print("✓ No stuck jobs found")
68
-
70
+
69
71
  print(f"\n✅ Migration complete!")
70
72
  print(f" - Job counter initialized to {next_id}")
71
73
  print(f" - Total jobs in queue: {len(jobs)}")
72
74
  print(f" - Stuck jobs: {len(stuck_jobs)}")
73
-
75
+
74
76
  return True
75
77
 
76
78
 
77
- if __name__ == '__main__':
79
+ if __name__ == "__main__":
78
80
  success = fix_job_counter()
79
81
  sys.exit(0 if success else 1)
@@ -20,53 +20,55 @@ def parse_bloodhound(log_path: str, target: str) -> Dict:
20
20
  """
21
21
  output_dir = Path.home() / ".souleyez" / "bloodhound_data"
22
22
 
23
- collections = sorted(output_dir.glob("*"), key=lambda p: p.stat().st_mtime, reverse=True)
23
+ collections = sorted(
24
+ output_dir.glob("*"), key=lambda p: p.stat().st_mtime, reverse=True
25
+ )
24
26
 
25
27
  if not collections:
26
28
  return {
27
- 'tool': 'bloodhound',
28
- 'target': target,
29
- 'error': 'No Bloodhound data found'
29
+ "tool": "bloodhound",
30
+ "target": target,
31
+ "error": "No Bloodhound data found",
30
32
  }
31
33
 
32
34
  latest_collection = collections[0]
33
35
 
34
36
  stats = {
35
- 'users': 0,
36
- 'groups': 0,
37
- 'computers': 0,
38
- 'domains': 0,
39
- 'gpos': 0,
40
- 'sessions': 0
37
+ "users": 0,
38
+ "groups": 0,
39
+ "computers": 0,
40
+ "domains": 0,
41
+ "gpos": 0,
42
+ "sessions": 0,
41
43
  }
42
44
 
43
45
  for json_file in latest_collection.glob("*.json"):
44
46
  try:
45
- with open(json_file, 'r') as f:
47
+ with open(json_file, "r") as f:
46
48
  data = json.load(f)
47
49
 
48
- if 'users' in data:
49
- stats['users'] += len(data['users'])
50
- if 'groups' in data:
51
- stats['groups'] += len(data['groups'])
52
- if 'computers' in data:
53
- stats['computers'] += len(data['computers'])
54
- if 'domains' in data:
55
- stats['domains'] += len(data['domains'])
56
- if 'gpos' in data:
57
- stats['gpos'] += len(data['gpos'])
58
- if 'sessions' in data:
59
- stats['sessions'] += len(data['sessions'])
50
+ if "users" in data:
51
+ stats["users"] += len(data["users"])
52
+ if "groups" in data:
53
+ stats["groups"] += len(data["groups"])
54
+ if "computers" in data:
55
+ stats["computers"] += len(data["computers"])
56
+ if "domains" in data:
57
+ stats["domains"] += len(data["domains"])
58
+ if "gpos" in data:
59
+ stats["gpos"] += len(data["gpos"])
60
+ if "sessions" in data:
61
+ stats["sessions"] += len(data["sessions"])
60
62
  except Exception:
61
63
  continue
62
64
 
63
65
  return {
64
- 'tool': 'bloodhound',
65
- 'target': target,
66
- 'collection_path': str(latest_collection),
67
- 'statistics': stats,
68
- 'summary': f"Enumerated {stats['users']} users, {stats['groups']} groups, "
69
- f"{stats['computers']} computers in AD domain"
66
+ "tool": "bloodhound",
67
+ "target": target,
68
+ "collection_path": str(latest_collection),
69
+ "statistics": stats,
70
+ "summary": f"Enumerated {stats['users']} users, {stats['groups']} groups, "
71
+ f"{stats['computers']} computers in AD domain",
70
72
  }
71
73
 
72
74
 
@@ -83,19 +85,19 @@ def store_bloodhound_results(result: Dict, engagement_id: int, job_id: int):
83
85
 
84
86
  fm = FindingsManager()
85
87
 
86
- stats = result.get('statistics', {})
88
+ stats = result.get("statistics", {})
87
89
 
88
90
  fm.add_finding(
89
91
  engagement_id=engagement_id,
90
92
  title=f"Active Directory Enumerated - {stats.get('users', 0)} Users Discovered",
91
93
  description=f"Bloodhound successfully enumerated Active Directory:\n"
92
- f"- Users: {stats.get('users', 0)}\n"
93
- f"- Groups: {stats.get('groups', 0)}\n"
94
- f"- Computers: {stats.get('computers', 0)}\n"
95
- f"- GPOs: {stats.get('gpos', 0)}\n\n"
96
- f"Data saved to: {result.get('collection_path', 'Unknown')}\n"
97
- f"Import into Bloodhound GUI to visualize attack paths.",
98
- severity='info',
99
- tool='bloodhound',
100
- evidence=result.get('summary', 'AD enumeration complete')
94
+ f"- Users: {stats.get('users', 0)}\n"
95
+ f"- Groups: {stats.get('groups', 0)}\n"
96
+ f"- Computers: {stats.get('computers', 0)}\n"
97
+ f"- GPOs: {stats.get('gpos', 0)}\n\n"
98
+ f"Data saved to: {result.get('collection_path', 'Unknown')}\n"
99
+ f"Import into Bloodhound GUI to visualize attack paths.",
100
+ severity="info",
101
+ tool="bloodhound",
102
+ evidence=result.get("summary", "AD enumeration complete"),
101
103
  )
@@ -32,22 +32,22 @@ def parse_crackmapexec(log_path: str, target: str) -> Dict[str, Any]:
32
32
  Dict containing parsed findings
33
33
  """
34
34
  try:
35
- with open(log_path, 'r', encoding='utf-8', errors='replace') as f:
35
+ with open(log_path, "r", encoding="utf-8", errors="replace") as f:
36
36
  content = f.read()
37
37
  return _parse_content(content, target)
38
38
  except FileNotFoundError:
39
39
  return {
40
- 'tool': 'crackmapexec',
41
- 'target': target,
42
- 'error': 'Log file not found',
43
- 'findings': {
44
- 'hosts': [],
45
- 'shares': [],
46
- 'users': [],
47
- 'groups': [],
48
- 'credentials': [],
49
- 'vulnerabilities': []
50
- }
40
+ "tool": "crackmapexec",
41
+ "target": target,
42
+ "error": "Log file not found",
43
+ "findings": {
44
+ "hosts": [],
45
+ "shares": [],
46
+ "users": [],
47
+ "groups": [],
48
+ "credentials": [],
49
+ "vulnerabilities": [],
50
+ },
51
51
  }
52
52
 
53
53
 
@@ -63,36 +63,45 @@ def _parse_content(content: str, target: str) -> Dict[str, Any]:
63
63
  Dict containing parsed findings
64
64
  """
65
65
  findings = {
66
- 'hosts': [],
67
- 'shares': [],
68
- 'users': [],
69
- 'groups': [],
70
- 'credentials': [],
71
- 'vulnerabilities': [],
72
- 'auth_info': {}
66
+ "hosts": [],
67
+ "shares": [],
68
+ "users": [],
69
+ "groups": [],
70
+ "credentials": [],
71
+ "vulnerabilities": [],
72
+ "auth_info": {},
73
+ "password_must_change": [], # Users with STATUS_PASSWORD_MUST_CHANGE
73
74
  }
74
75
 
75
76
  # Remove ANSI color codes first
76
- content = re.sub(r'\x1b\[[0-9;]*m', '', content)
77
+ content = re.sub(r"\x1b\[[0-9;]*m", "", content)
77
78
 
78
- for line in content.split('\n'):
79
+ for line in content.split("\n"):
79
80
  # Parse host information (Windows OR Unix/Samba)
80
81
  # Format variations:
81
82
  # SMB 10.0.0.88 445 HOSTNAME [*] Windows/Unix ... (name:HOSTNAME) (domain:DOMAIN) ...
82
83
  # SMB 10.0.0.88 445 HOSTNAME [*] Windows Server 2016 ...
83
84
  # WINRM 10.0.0.88 5985 HOSTNAME [*] http://10.0.0.88:5985/wsman
84
85
 
85
- os_keywords = ['Windows', 'Unix', 'Samba', 'Linux', 'Server', 'Microsoft']
86
- if any(proto in line for proto in ['SMB', 'WINRM', 'SSH', 'RDP']) and '[*]' in line:
86
+ os_keywords = ["Windows", "Unix", "Samba", "Linux", "Server", "Microsoft"]
87
+ if (
88
+ any(proto in line for proto in ["SMB", "WINRM", "SSH", "RDP"])
89
+ and "[*]" in line
90
+ ):
87
91
  # Try multiple patterns for host info
88
92
  host_match = None
89
93
 
90
94
  # Pattern 1: Standard format with flexible whitespace
91
- host_match = re.search(r'(\d+\.\d+\.\d+\.\d+)\s+(\d+)\s+(\S+)\s+\[\*\]\s*(.+)', line)
95
+ host_match = re.search(
96
+ r"(\d+\.\d+\.\d+\.\d+)\s+(\d+)\s+(\S+)\s+\[\*\]\s*(.+)", line
97
+ )
92
98
 
93
99
  # Pattern 2: Protocol prefix format
94
100
  if not host_match:
95
- host_match = re.search(r'(?:SMB|WINRM|SSH|RDP)\s+(\d+\.\d+\.\d+\.\d+)\s+(\d+)\s+(\S+)\s+\[\*\]\s*(.+)', line)
101
+ host_match = re.search(
102
+ r"(?:SMB|WINRM|SSH|RDP)\s+(\d+\.\d+\.\d+\.\d+)\s+(\d+)\s+(\S+)\s+\[\*\]\s*(.+)",
103
+ line,
104
+ )
96
105
 
97
106
  if host_match:
98
107
  ip = host_match.group(1)
@@ -101,43 +110,51 @@ def _parse_content(content: str, target: str) -> Dict[str, Any]:
101
110
  details = host_match.group(4).strip()
102
111
 
103
112
  # Only process as host info if it looks like OS/version info
104
- if any(kw in details for kw in os_keywords) or '(domain:' in details:
113
+ if any(kw in details for kw in os_keywords) or "(domain:" in details:
105
114
  # Extract domain from (domain:DOMAIN) or domain: pattern
106
- domain_match = re.search(r'\(?domain:?\s*([^)\s]+)\)?', details, re.IGNORECASE)
115
+ domain_match = re.search(
116
+ r"\(?domain:?\s*([^)\s]+)\)?", details, re.IGNORECASE
117
+ )
107
118
  domain = domain_match.group(1) if domain_match else None
108
119
 
109
120
  # Extract OS info (everything before the first parenthesis)
110
- os_match = re.match(r'([^(]+)', details)
121
+ os_match = re.match(r"([^(]+)", details)
111
122
  os_info = os_match.group(1).strip() if os_match else details
112
123
 
113
124
  # Extract SMB signing status (multiple formats)
114
- signing_match = re.search(r'\(?signing:?\s*(\w+)\)?', details, re.IGNORECASE)
125
+ signing_match = re.search(
126
+ r"\(?signing:?\s*(\w+)\)?", details, re.IGNORECASE
127
+ )
115
128
  signing = signing_match.group(1) if signing_match else None
116
129
 
117
130
  # Extract SMBv1 status
118
- smbv1_match = re.search(r'\(?SMBv1:?\s*(\w+)\)?', details, re.IGNORECASE)
131
+ smbv1_match = re.search(
132
+ r"\(?SMBv1:?\s*(\w+)\)?", details, re.IGNORECASE
133
+ )
119
134
  smbv1 = smbv1_match.group(1) if smbv1_match else None
120
135
 
121
- findings['hosts'].append({
122
- 'ip': ip,
123
- 'port': port,
124
- 'hostname': hostname,
125
- 'domain': domain,
126
- 'os': os_info,
127
- 'signing': signing,
128
- 'smbv1': smbv1
129
- })
136
+ findings["hosts"].append(
137
+ {
138
+ "ip": ip,
139
+ "port": port,
140
+ "hostname": hostname,
141
+ "domain": domain,
142
+ "os": os_info,
143
+ "signing": signing,
144
+ "smbv1": smbv1,
145
+ }
146
+ )
130
147
 
131
148
  # Parse authentication status
132
149
  # Format: SMB 10.0.0.14 445 HOSTNAME [+] \: (Guest)
133
- if 'SMB' in line and '[+]' in line and ('Guest' in line or '\\' in line):
134
- auth_match = re.search(r'\[\+\]\s+(.+)', line)
150
+ if "SMB" in line and "[+]" in line and ("Guest" in line or "\\" in line):
151
+ auth_match = re.search(r"\[\+\]\s+(.+)", line)
135
152
  if auth_match:
136
153
  auth_str = auth_match.group(1).strip()
137
- findings['auth_info'] = {
138
- 'status': 'success',
139
- 'details': auth_str,
140
- 'is_guest': 'Guest' in auth_str
154
+ findings["auth_info"] = {
155
+ "status": "success",
156
+ "details": auth_str,
157
+ "is_guest": "Guest" in auth_str,
141
158
  }
142
159
 
143
160
  # Parse share enumeration (shares WITH permissions)
@@ -146,59 +163,102 @@ def _parse_content(content: str, target: str) -> Dict[str, Any]:
146
163
  # SMB ... ADMIN$ READ, WRITE Remote Admin (with space)
147
164
  # SMB ... C$ READ ONLY Default share
148
165
  share_perm_match = re.search(
149
- r'SMB.*\s+(\S+\$?)\s+(READ,?\s*WRITE|READ\s*ONLY|WRITE\s*ONLY|READ|WRITE|NO\s*ACCESS)\s*(.*)$',
150
- line, re.IGNORECASE
166
+ r"SMB.*\s+(\S+\$?)\s+(READ,?\s*WRITE|READ\s*ONLY|WRITE\s*ONLY|READ|WRITE|NO\s*ACCESS)\s*(.*)$",
167
+ line,
168
+ re.IGNORECASE,
151
169
  )
152
170
  if share_perm_match:
153
171
  share_name = share_perm_match.group(1)
154
172
  # Skip if it looks like a header or status line
155
- if share_name not in ['Share', 'Permissions', 'shares']:
156
- findings['shares'].append({
157
- 'name': share_name,
158
- 'permissions': share_perm_match.group(2).upper().replace(' ', ''),
159
- 'comment': share_perm_match.group(3).strip() if share_perm_match.group(3) else ''
160
- })
173
+ if share_name not in ["Share", "Permissions", "shares"]:
174
+ findings["shares"].append(
175
+ {
176
+ "name": share_name,
177
+ "permissions": share_perm_match.group(2)
178
+ .upper()
179
+ .replace(" ", ""),
180
+ "comment": (
181
+ share_perm_match.group(3).strip()
182
+ if share_perm_match.group(3)
183
+ else ""
184
+ ),
185
+ }
186
+ )
161
187
  # Parse share enumeration (shares WITHOUT explicit permissions - just listed)
162
- elif 'SMB' in line and not ('Share' in line and 'Permissions' in line) and not '-----' in line:
188
+ elif (
189
+ "SMB" in line
190
+ and not ("Share" in line and "Permissions" in line)
191
+ and not "-----" in line
192
+ ):
163
193
  # Look for lines with share names (ending with $, or common names like print$, public, IPC$)
164
- share_list_match = re.search(r'SMB\s+\S+\s+\d+\s+\S+\s+(\w+\$?|\w+)\s+(.+)?$', line)
194
+ share_list_match = re.search(
195
+ r"SMB\s+\S+\s+\d+\s+\S+\s+(\w+\$?|\w+)\s+(.+)?$", line
196
+ )
165
197
  if share_list_match:
166
198
  share_name = share_list_match.group(1).strip()
167
- remark = share_list_match.group(2).strip() if share_list_match.group(2) else ''
199
+ remark = (
200
+ share_list_match.group(2).strip()
201
+ if share_list_match.group(2)
202
+ else ""
203
+ )
168
204
  # Only add if it looks like a share (not header text, not empty)
169
- if share_name and share_name not in ['Share', 'Enumerated', 'shares'] and not share_name.startswith('['):
205
+ if (
206
+ share_name
207
+ and share_name not in ["Share", "Enumerated", "shares"]
208
+ and not share_name.startswith("[")
209
+ ):
170
210
  # Check if not already added
171
- if not any(s['name'] == share_name for s in findings['shares']):
172
- findings['shares'].append({
173
- 'name': share_name,
174
- 'permissions': None,
175
- 'comment': remark
176
- })
211
+ if not any(s["name"] == share_name for s in findings["shares"]):
212
+ findings["shares"].append(
213
+ {"name": share_name, "permissions": None, "comment": remark}
214
+ )
177
215
 
178
216
  # Parse user enumeration with flexible format
179
217
  # Format variations:
180
218
  # username badpwdcount: 0 desc: Description
181
219
  # username badpwdcount:0 desc:Description
182
220
  # username baddpwdcount: 0 description: Description
183
- if 'badpwdcount' in line.lower() or 'baddpwdcount' in line.lower():
221
+ if "badpwdcount" in line.lower() or "baddpwdcount" in line.lower():
184
222
  user_match = re.search(
185
- r'(\S+)\s+bad+pwdcount:?\s*(\d+)\s+(?:desc(?:ription)?:?\s*)?(.+)?',
186
- line, re.IGNORECASE
223
+ r"(\S+)\s+bad+pwdcount:?\s*(\d+)\s+(?:desc(?:ription)?:?\s*)?(.+)?",
224
+ line,
225
+ re.IGNORECASE,
187
226
  )
188
227
  if user_match:
189
- findings['users'].append({
190
- 'username': user_match.group(1),
191
- 'badpwdcount': int(user_match.group(2)),
192
- 'description': user_match.group(3).strip() if user_match.group(3) else ''
193
- })
228
+ findings["users"].append(
229
+ {
230
+ "username": user_match.group(1),
231
+ "badpwdcount": int(user_match.group(2)),
232
+ "description": (
233
+ user_match.group(3).strip() if user_match.group(3) else ""
234
+ ),
235
+ }
236
+ )
194
237
 
195
238
  # Parse vulnerability findings
196
- if 'vulnerable' in line.lower() or 'MS17-010' in line:
197
- vuln_match = re.search(r'\[\+\]\s+(.+)', line)
239
+ if "vulnerable" in line.lower() or "MS17-010" in line:
240
+ vuln_match = re.search(r"\[\+\]\s+(.+)", line)
198
241
  if vuln_match:
199
- findings['vulnerabilities'].append({
200
- 'description': vuln_match.group(1).strip()
201
- })
242
+ findings["vulnerabilities"].append(
243
+ {"description": vuln_match.group(1).strip()}
244
+ )
245
+
246
+ # Parse STATUS_PASSWORD_MUST_CHANGE - user needs to change password
247
+ # Format: SMB IP 445 HOST [-] domain\user:password STATUS_PASSWORD_MUST_CHANGE
248
+ if "STATUS_PASSWORD_MUST_CHANGE" in line:
249
+ pwchange_match = re.search(
250
+ r"\[-\]\s*([^\\/:]+)[\\\/]+([^:]+):([^\s]+)\s+STATUS_PASSWORD_MUST_CHANGE",
251
+ line,
252
+ re.IGNORECASE,
253
+ )
254
+ if pwchange_match:
255
+ findings["password_must_change"].append(
256
+ {
257
+ "domain": pwchange_match.group(1).strip(),
258
+ "username": pwchange_match.group(2).strip(),
259
+ "password": pwchange_match.group(3).strip(),
260
+ }
261
+ )
202
262
 
203
263
  # Parse valid credentials (but not Guest authentication)
204
264
  # Format variations:
@@ -206,57 +266,64 @@ def _parse_content(content: str, target: str) -> Dict[str, Any]:
206
266
  # [+] DOMAIN\\username:password (Pwn3d!)
207
267
  # [+] username:password (Pwn3d!)
208
268
  # [+] DOMAIN/username:password (Pwn3d!)
209
- if '[+]' in line and ('Pwn3d' in line or ':' in line):
269
+ if "[+]" in line and ("Pwn3d" in line or ":" in line):
210
270
  # Try domain\user:pass format first
211
271
  cred_match = re.search(
212
- r'\[\+\]\s*([^\\/:]+)[\\\/]+([^:]+):([^\s(]+)\s*(\(Pwn3d!?\))?',
213
- line, re.IGNORECASE
272
+ r"\[\+\]\s*([^\\/:]+)[\\\/]+([^:]+):([^\s(]+)\s*(\(Pwn3d!?\))?",
273
+ line,
274
+ re.IGNORECASE,
214
275
  )
215
276
  if cred_match:
216
- findings['credentials'].append({
217
- 'domain': cred_match.group(1).strip(),
218
- 'username': cred_match.group(2).strip(),
219
- 'password': cred_match.group(3).strip(),
220
- 'admin': bool(cred_match.group(4))
221
- })
277
+ findings["credentials"].append(
278
+ {
279
+ "domain": cred_match.group(1).strip(),
280
+ "username": cred_match.group(2).strip(),
281
+ "password": cred_match.group(3).strip(),
282
+ "admin": bool(cred_match.group(4)),
283
+ }
284
+ )
222
285
  else:
223
286
  # Try user:pass format (no domain)
224
287
  cred_match = re.search(
225
- r'\[\+\]\s*([^:@\s]+):([^\s(]+)\s*(\(Pwn3d!?\))?',
226
- line, re.IGNORECASE
288
+ r"\[\+\]\s*([^:@\s]+):([^\s(]+)\s*(\(Pwn3d!?\))?",
289
+ line,
290
+ re.IGNORECASE,
227
291
  )
228
- if cred_match and '@' not in cred_match.group(1):
229
- findings['credentials'].append({
230
- 'domain': '',
231
- 'username': cred_match.group(1).strip(),
232
- 'password': cred_match.group(2).strip(),
233
- 'admin': bool(cred_match.group(3))
234
- })
292
+ if cred_match and "@" not in cred_match.group(1):
293
+ findings["credentials"].append(
294
+ {
295
+ "domain": "",
296
+ "username": cred_match.group(1).strip(),
297
+ "password": cred_match.group(2).strip(),
298
+ "admin": bool(cred_match.group(3)),
299
+ }
300
+ )
235
301
 
236
302
  # Extract admin credentials for auto-chaining
237
- admin_creds = [c for c in findings['credentials'] if c.get('admin')]
303
+ admin_creds = [c for c in findings["credentials"] if c.get("admin")]
238
304
 
239
305
  # Extract unique domains for auto-chaining
240
306
  domains = []
241
307
  seen_domains = set()
242
- for host in findings['hosts']:
243
- domain = host.get('domain')
308
+ for host in findings["hosts"]:
309
+ domain = host.get("domain")
244
310
  if domain and domain not in seen_domains:
245
- domains.append({
246
- 'domain': domain,
247
- 'ip': host.get('ip')
248
- })
311
+ domains.append({"domain": domain, "ip": host.get("ip")})
249
312
  seen_domains.add(domain)
250
313
 
251
314
  return {
252
- 'tool': 'crackmapexec',
253
- 'target': target,
254
- 'hosts_found': len(findings['hosts']),
255
- 'shares_found': len(findings['shares']),
256
- 'users_found': len(findings['users']),
257
- 'valid_credentials': len(findings['credentials']),
258
- 'vulnerabilities_found': len(findings['vulnerabilities']),
259
- 'findings': findings,
260
- 'domains': domains, # For auto-chaining to GetNPUsers and other AD tools
261
- 'valid_admin_credentials': admin_creds # For auto-chaining to secretsdump
315
+ "tool": "crackmapexec",
316
+ "target": target,
317
+ "hosts_found": len(findings["hosts"]),
318
+ "shares_found": len(findings["shares"]),
319
+ "users_found": len(findings["users"]),
320
+ "valid_credentials": len(findings["credentials"]),
321
+ "vulnerabilities_found": len(findings["vulnerabilities"]),
322
+ "password_must_change_found": len(findings["password_must_change"]),
323
+ "findings": findings,
324
+ "domains": domains, # For auto-chaining to GetNPUsers and other AD tools
325
+ "valid_admin_credentials": admin_creds, # For auto-chaining to secretsdump
326
+ "password_must_change": findings[
327
+ "password_must_change"
328
+ ], # For smbpasswd chaining
262
329
  }