Skip to main content

This library provides standard Python APIs to interact with common penetration testing and cyberattack tools, enabling automated penetration testing, red team operations, and development of cybersecurity-related LLM agents.

Project description

License

Attack Executor

Attack Executor is a standardized toolkit for conducting cyberattacks and penetration testing. Our goal is to define a standardized approach to use the common tools involved in cyberattacks and penetration tests, thereby increasing the efficiency of attack execution and prepare for an LLM Agent capable of automated penetration testing and red-team simulations.

For now, Attack Executor supports the following penetration testing and red teaming tools:

  • Scanning
    • Nmap
    • Gobuster
  • Exploitation
  • Privilege Escalation
    • Linpeas
  • Post-exploitation

Installation

In order to use Attack Executor, please install the Python package using

pip install attack-executor

You also need to install the tools that will be used by Attack Executor. Details can be found here:

We are preparing and will provide a script to automatically install all dependencies.

Sliver

Installation

Install Sliver-server

Download sliver-server bin from their webite

$ ./sliver-server

sliver > new-operator --name zer0cool --lhost localhost --lport 34567 --save ./zer0cool.cfg
[*] Generating new client certificate, please wait ...
[*] Saved new client config to: /Users/zer0cool/zer0cool.cfg

sliver > multiplayer --lport 34567
[*] Multiplayer mode enabled!

Then, modify the related entries in config.ini:

[sliver]
client_config_file = /home/user/Downloads/zer0cool.cfg

Metasploit

Installation

Install Metasploit

$ msfconsole
msf> load msgrpc [Pass=yourpassword]
[*] MSGRPC Service:  127.0.0.1:55552 
[*] MSGRPC Username: msf
[*] MSGRPC Password: glycNshR
[*] Successfully loaded plugin: msgrpc

Then, modify the related entries in config.ini:

[metasploit]
password = glycNshR
host_ip = 127.0.0.1
listening_port = 55552

Searchsploit

Installation

Searchsploit is part of the ExploitDB project and is required for exploit searching functionality.

  • On Kali Linux / Parrot OS: Searchsploit is usually pre-installed. If not, install it with:
    sudo apt update && sudo apt install exploitdb
    
  • On other Debian/Ubuntu-based systems:
    sudo apt update && sudo apt install exploitdb
    
  • On macOS (using Homebrew):
    brew install exploitdb
    
  • Manual installation and more info: See the official ExploitDB repository: https://github.com/offensive-security/exploitdb

After installation, ensure the searchsploit command is available in your PATH by running:

searchsploit -h

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

attack_executor-0.2.8.tar.gz (56.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

attack_executor-0.2.8-py3-none-any.whl (65.9 kB view details)

Uploaded Python 3

File details

Details for the file attack_executor-0.2.8.tar.gz.

File metadata

  • Download URL: attack_executor-0.2.8.tar.gz
  • Upload date:
  • Size: 56.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.8.8

File hashes

Hashes for attack_executor-0.2.8.tar.gz
Algorithm Hash digest
SHA256 72d1a3bca15b86d5dfa462c14b7fda2afc170932f5acf2429d5ae901503d8054
MD5 4ccddaeb993dc3a061e2753fc8a313e8
BLAKE2b-256 7b1b2b3642600972372aad91a7dce1aec87d9829b13245a4c2f9bf3699e0181f

See more details on using hashes here.

File details

Details for the file attack_executor-0.2.8-py3-none-any.whl.

File metadata

File hashes

Hashes for attack_executor-0.2.8-py3-none-any.whl
Algorithm Hash digest
SHA256 ebd270314128600425714535ac550bfccc1b664e7f8ba1b26e8765d411779808
MD5 d7ebf05be03be8e0bee00cfd6e97d41b
BLAKE2b-256 1bf73ba38091c2fcb2503a486662320e99ed81be06c475ad723fe2f823055cc0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page