Skip to main content

A simple example module

Project description

Attack Executor

Attack Executor is a standardized toolkit for conducting cyberattacks and penetration testing. Our goal is to define a standardized approach to use the common tools involved in cyberattacks and penetration tests, thereby increasing the efficiency of attack execution and prepare for an LLM Agent capable of automated penetration testing and red-team simulations.

Installation

In order to use Attack Executor, please install the Python package using

pip install -i https://test.pypi.org/simple/ --extra-index-url https://pypi.org/simple attack-executor==0.1.2

You also need to install the tools that will be used by Attack Executor. For now, Attack Executor supports the following tools:

Sliver

Installation

Install Sliver-server

Download sliver-server bin from their webite

$ ./sliver-server

sliver > new-operator --name zer0cool --lhost localhost --lport 34567 --save ./zer0cool.cfg
[*] Generating new client certificate, please wait ...
[*] Saved new client config to: /Users/zer0cool/zer0cool.cfg

sliver > multiplayer --lport 34567
[*] Multiplayer mode enabled!

Then, modify the related entries in config.ini:

[sliver]
client_config_file = /home/user/Downloads/zer0cool.cfg

Metasploit

Installation

Install Metasploit

$ msfconsole
msf> load msgrpc [Pass=yourpassword]
[*] MSGRPC Service:  127.0.0.1:55552 
[*] MSGRPC Username: msf
[*] MSGRPC Password: glycNshR
[*] Successfully loaded plugin: msgrpc

Then, modify the related entries in config.ini:

[metasploit]
password = glycNshR
host_ip = 127.0.0.1
listening_port = 55552

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

attack_executor-0.2.1.tar.gz (10.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

attack_executor-0.2.1-py3-none-any.whl (11.8 kB view details)

Uploaded Python 3

File details

Details for the file attack_executor-0.2.1.tar.gz.

File metadata

  • Download URL: attack_executor-0.2.1.tar.gz
  • Upload date:
  • Size: 10.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.11

File hashes

Hashes for attack_executor-0.2.1.tar.gz
Algorithm Hash digest
SHA256 5e6a76fac348439681a7272103753a082a8b160294e054afc930d6a121c1032b
MD5 5ce12c235cfb91ae1ba6c081e974dd3a
BLAKE2b-256 9ee08e2ff43bb779d8fe0e57d78df9752c55a6ee8b3567007cc7268a6f29db04

See more details on using hashes here.

File details

Details for the file attack_executor-0.2.1-py3-none-any.whl.

File metadata

File hashes

Hashes for attack_executor-0.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 82e8eee9d478f3d648ccaff0bcc9a1b6220e1b579b0c7d7d4d59ba6d4f39282a
MD5 0695b72fd2163e2a596f2be5f6add62e
BLAKE2b-256 55abba4110eb95f67650aa7e8626acc4025700609de46e77245d9a61d1cc83a8

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page