A simple example module
Project description
Attack Executor
Attack Executor is a standardized toolkit for conducting cyberattacks and penetration testing. Our goal is to define a standardized approach to use the common tools involved in cyberattacks and penetration tests, thereby increasing the efficiency of attack execution and prepare for an LLM Agent capable of automated penetration testing and red-team simulations.
Installation
In order to use Attack Executor, please install the Python package using
pip install -i https://test.pypi.org/simple/ --extra-index-url https://pypi.org/simple attack-executor==0.1.2
You also need to install the tools that will be used by Attack Executor. For now, Attack Executor supports the following tools:
- Metasploit
- Sliver
- Nmap
Sliver
Installation
Install Sliver-server
Download sliver-server bin from their webite
$ ./sliver-server
sliver > new-operator --name zer0cool --lhost localhost --lport 34567 --save ./zer0cool.cfg
[*] Generating new client certificate, please wait ...
[*] Saved new client config to: /Users/zer0cool/zer0cool.cfg
sliver > multiplayer --lport 34567
[*] Multiplayer mode enabled!
Then, modify the related entries in config.ini:
[sliver]
client_config_file = /home/user/Downloads/zer0cool.cfg
Metasploit
Installation
Install Metasploit
$ msfconsole
msf> load msgrpc [Pass=yourpassword]
[*] MSGRPC Service: 127.0.0.1:55552
[*] MSGRPC Username: msf
[*] MSGRPC Password: glycNshR
[*] Successfully loaded plugin: msgrpc
Then, modify the related entries in config.ini:
[metasploit]
password = glycNshR
host_ip = 127.0.0.1
listening_port = 55552
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file attack_executor-0.2.1.tar.gz.
File metadata
- Download URL: attack_executor-0.2.1.tar.gz
- Upload date:
- Size: 10.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.11.11
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
5e6a76fac348439681a7272103753a082a8b160294e054afc930d6a121c1032b
|
|
| MD5 |
5ce12c235cfb91ae1ba6c081e974dd3a
|
|
| BLAKE2b-256 |
9ee08e2ff43bb779d8fe0e57d78df9752c55a6ee8b3567007cc7268a6f29db04
|
File details
Details for the file attack_executor-0.2.1-py3-none-any.whl.
File metadata
- Download URL: attack_executor-0.2.1-py3-none-any.whl
- Upload date:
- Size: 11.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.11.11
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
82e8eee9d478f3d648ccaff0bcc9a1b6220e1b579b0c7d7d4d59ba6d4f39282a
|
|
| MD5 |
0695b72fd2163e2a596f2be5f6add62e
|
|
| BLAKE2b-256 |
55abba4110eb95f67650aa7e8626acc4025700609de46e77245d9a61d1cc83a8
|