Skip to main content

This library provides standard Python APIs to interact with common penetration testing and cyberattack tools, enabling automated penetration testing, red team operations, and development of cybersecurity-related LLM agents.

Project description

Attack Executor

Attack Executor is a standardized toolkit for conducting cyberattacks and penetration testing. Our goal is to define a standardized approach to use the common tools involved in cyberattacks and penetration tests, thereby increasing the efficiency of attack execution and prepare for an LLM Agent capable of automated penetration testing and red-team simulations.

Installation

In order to use Attack Executor, please install the Python package using

pip install -i https://test.pypi.org/simple/ --extra-index-url https://pypi.org/simple attack-executor==0.1.2

You also need to install the tools that will be used by Attack Executor. For now, Attack Executor supports the following tools:

Sliver

Installation

Install Sliver-server

Download sliver-server bin from their webite

$ ./sliver-server

sliver > new-operator --name zer0cool --lhost localhost --lport 34567 --save ./zer0cool.cfg
[*] Generating new client certificate, please wait ...
[*] Saved new client config to: /Users/zer0cool/zer0cool.cfg

sliver > multiplayer --lport 34567
[*] Multiplayer mode enabled!

Then, modify the related entries in config.ini:

[sliver]
client_config_file = /home/user/Downloads/zer0cool.cfg

Metasploit

Installation

Install Metasploit

$ msfconsole
msf> load msgrpc [Pass=yourpassword]
[*] MSGRPC Service:  127.0.0.1:55552 
[*] MSGRPC Username: msf
[*] MSGRPC Password: glycNshR
[*] Successfully loaded plugin: msgrpc

Then, modify the related entries in config.ini:

[metasploit]
password = glycNshR
host_ip = 127.0.0.1
listening_port = 55552

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

attack_executor-0.2.2.tar.gz (16.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

attack_executor-0.2.2-py3-none-any.whl (17.5 kB view details)

Uploaded Python 3

File details

Details for the file attack_executor-0.2.2.tar.gz.

File metadata

  • Download URL: attack_executor-0.2.2.tar.gz
  • Upload date:
  • Size: 16.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.12

File hashes

Hashes for attack_executor-0.2.2.tar.gz
Algorithm Hash digest
SHA256 90a951e71d11efb4676ae39c761d0f184b7e740a1a0e205d5072cb26616e5038
MD5 ba5f335828b809de177fa3d900e9c369
BLAKE2b-256 627e38eff271d8c53dbc14f3ebe35f1d3abd3623c2dcb79ee899fd3b04e56111

See more details on using hashes here.

File details

Details for the file attack_executor-0.2.2-py3-none-any.whl.

File metadata

File hashes

Hashes for attack_executor-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 e0b35e14f32780138257f7007de58f257d1633c4f1ff6516b2d09ab180b04493
MD5 ba8eef761469caeb671ec355e81af4e7
BLAKE2b-256 5a49db0849e831dc834885b75b5e9370d07f89c2c933ac2df3e539d8bcadd51d

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page