Skip to main content

This library provides standard Python APIs to interact with common penetration testing and cyberattack tools, enabling automated penetration testing, red team operations, and development of cybersecurity-related LLM agents.

Project description

License

Attack Executor

Attack Executor is a standardized toolkit for conducting cyberattacks and penetration testing. Our goal is to define a standardized approach to use the common tools involved in cyberattacks and penetration tests, thereby increasing the efficiency of attack execution and prepare for an LLM Agent capable of automated penetration testing and red-team simulations.

For now, Attack Executor supports the following penetration testing and red teaming tools:

  • Scanning
    • Nmap
    • Gobuster
  • Exploitation
  • Privilege Escalation
    • Linpeas
  • Post-exploitation

Installation

In order to use Attack Executor, please install the Python package using

pip install attack-executor

You also need to install the tools that will be used by Attack Executor. Details can be found here:

We are preparing and will provide a script to automatically install all dependencies.

Sliver

Installation

Install Sliver-server

Download sliver-server bin from their webite

$ ./sliver-server

sliver > new-operator --name zer0cool --lhost localhost --lport 34567 --save ./zer0cool.cfg
[*] Generating new client certificate, please wait ...
[*] Saved new client config to: /Users/zer0cool/zer0cool.cfg

sliver > multiplayer --lport 34567
[*] Multiplayer mode enabled!

Then, modify the related entries in config.ini:

[sliver]
client_config_file = /home/user/Downloads/zer0cool.cfg

Metasploit

Installation

Install Metasploit

$ msfconsole
msf> load msgrpc [Pass=yourpassword]
[*] MSGRPC Service:  127.0.0.1:55552 
[*] MSGRPC Username: msf
[*] MSGRPC Password: glycNshR
[*] Successfully loaded plugin: msgrpc

Then, modify the related entries in config.ini:

[metasploit]
password = glycNshR
host_ip = 127.0.0.1
listening_port = 55552

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

attack_executor-0.2.3.tar.gz (20.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

attack_executor-0.2.3-py3-none-any.whl (21.7 kB view details)

Uploaded Python 3

File details

Details for the file attack_executor-0.2.3.tar.gz.

File metadata

  • Download URL: attack_executor-0.2.3.tar.gz
  • Upload date:
  • Size: 20.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.8.8

File hashes

Hashes for attack_executor-0.2.3.tar.gz
Algorithm Hash digest
SHA256 5ee2c094129c59d7a7b3da74a6eda558b1f0c0bb78d76694c8ebb842cb240deb
MD5 0954e7f82c15ce639ab9f6f70ef7d137
BLAKE2b-256 110ce41c29128a2f5eb1c7067e404b45a40165963c7cbf7f646cfd921cfd9321

See more details on using hashes here.

File details

Details for the file attack_executor-0.2.3-py3-none-any.whl.

File metadata

File hashes

Hashes for attack_executor-0.2.3-py3-none-any.whl
Algorithm Hash digest
SHA256 c1254d372b400a2bbaf4f7a201b0563d1fb7188835f2544fa02c211c3574dbc8
MD5 69b2b815add614adf987613f901068e2
BLAKE2b-256 a8a00f8071745e3085cdf20be65bd0d72e0e18dd9e091e53ddb4765c612f1077

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page