Skip to main content

This library provides standard Python APIs to interact with common penetration testing and cyberattack tools, enabling automated penetration testing, red team operations, and development of cybersecurity-related LLM agents.

Project description

License

Attack Executor

Attack Executor is a standardized toolkit for conducting cyberattacks and penetration testing. Our goal is to define a standardized approach to use the common tools involved in cyberattacks and penetration tests, thereby increasing the efficiency of attack execution and prepare for an LLM Agent capable of automated penetration testing and red-team simulations.

For now, Attack Executor supports the following penetration testing and red teaming tools:

Installation

In order to use Attack Executor, please install the Python package using

pip install attack-executor

You also need to install the tools that will be used by Attack Executor. Details can be found here:

We are preparing and will provide a script to automatically install all dependencies.

Sliver

Installation

Install Sliver-server

Download sliver-server bin from their webite

$ ./sliver-server

sliver > new-operator --name zer0cool --lhost localhost --lport 34567 --save ./zer0cool.cfg
[*] Generating new client certificate, please wait ...
[*] Saved new client config to: /Users/zer0cool/zer0cool.cfg

sliver > multiplayer --lport 34567
[*] Multiplayer mode enabled!

Then, modify the related entries in config.ini:

[sliver]
client_config_file = /home/user/Downloads/zer0cool.cfg

Metasploit

Installation

Install Metasploit

$ msfconsole
msf> load msgrpc [Pass=yourpassword]
[*] MSGRPC Service:  127.0.0.1:55552 
[*] MSGRPC Username: msf
[*] MSGRPC Password: glycNshR
[*] Successfully loaded plugin: msgrpc

Then, modify the related entries in config.ini:

[metasploit]
password = glycNshR
host_ip = 127.0.0.1
listening_port = 55552

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

attack_executor-0.2.6.tar.gz (22.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

attack_executor-0.2.6-py3-none-any.whl (25.5 kB view details)

Uploaded Python 3

File details

Details for the file attack_executor-0.2.6.tar.gz.

File metadata

  • Download URL: attack_executor-0.2.6.tar.gz
  • Upload date:
  • Size: 22.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.12

File hashes

Hashes for attack_executor-0.2.6.tar.gz
Algorithm Hash digest
SHA256 8fea2e29cf7c9244450ed2314e89f64b0f9e563d0854dc3d35b9d440390aaec1
MD5 3e3dde066ef24d0d46225584de7a1917
BLAKE2b-256 7f509a9507b2d6d5057b3b7cc448990a194d64887f6dec625d875fe391507306

See more details on using hashes here.

File details

Details for the file attack_executor-0.2.6-py3-none-any.whl.

File metadata

File hashes

Hashes for attack_executor-0.2.6-py3-none-any.whl
Algorithm Hash digest
SHA256 46f41f556b87e93f4bb3815d29352d80d29d85e5e8a840c47a59009a1f105065
MD5 c080a8174684c3f9a5e3830017541f36
BLAKE2b-256 bce91572fb7dbf3d35512e4bfa0535de0e1feaa63b8036980c88987bec416816

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page