🚀 Big News: Socket Acquires Coana to Bring Reachability Analysis to Every Appsec Team.Learn more
Socket
Sign inDemoInstall
Socket

attack-executor

Package Overview
Dependencies
Maintainers
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

attack-executor

This library provides standard Python APIs to interact with common penetration testing and cyberattack tools, enabling automated penetration testing, red team operations, and development of cybersecurity-related LLM agents.

0.2.6
PyPI
Maintainers
1

License

Attack Executor

Attack Executor is a standardized toolkit for conducting cyberattacks and penetration testing. Our goal is to define a standardized approach to use the common tools involved in cyberattacks and penetration tests, thereby increasing the efficiency of attack execution and prepare for an LLM Agent capable of automated penetration testing and red-team simulations.

For now, Attack Executor supports the following penetration testing and red teaming tools:

  • Scanning
    • Nmap
    • Nuclei
    • Gobuster
  • Exploitation
  • Privilege Escalation
    • Linpeas
  • Post-exploitation

Installation

In order to use Attack Executor, please install the Python package using

pip install attack-executor

You also need to install the tools that will be used by Attack Executor. Details can be found here:

We are preparing and will provide a script to automatically install all dependencies.

Sliver

Installation

Install Sliver-server

Download sliver-server bin from their webite

$ ./sliver-server

sliver > new-operator --name zer0cool --lhost localhost --lport 34567 --save ./zer0cool.cfg
[*] Generating new client certificate, please wait ...
[*] Saved new client config to: /Users/zer0cool/zer0cool.cfg

sliver > multiplayer --lport 34567
[*] Multiplayer mode enabled!

Then, modify the related entries in config.ini:

[sliver]
client_config_file = /home/user/Downloads/zer0cool.cfg

Metasploit

Installation

Install Metasploit

$ msfconsole
msf> load msgrpc [Pass=yourpassword]
[*] MSGRPC Service:  127.0.0.1:55552 
[*] MSGRPC Username: msf
[*] MSGRPC Password: glycNshR
[*] Successfully loaded plugin: msgrpc

Then, modify the related entries in config.ini:

[metasploit]
password = glycNshR
host_ip = 127.0.0.1
listening_port = 55552

FAQs

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts