mirror of
https://github.com/Ed1s0nZ/CyberStrikeAI.git
synced 2026-03-31 00:09:29 +02:00
Add files via upload
This commit is contained in:
57
tools/bloodhound.yaml
Normal file
57
tools/bloodhound.yaml
Normal file
@@ -0,0 +1,57 @@
|
||||
name: "bloodhound"
|
||||
command: "bloodhound-python"
|
||||
enabled: true
|
||||
|
||||
short_description: "Active Directory 攻击路径分析和可视化工具"
|
||||
|
||||
description: |
|
||||
BloodHound 是一个 Active Directory 攻击路径分析和可视化工具,通过收集域内信息并分析攻击路径。
|
||||
|
||||
**主要功能:**
|
||||
- 域信息收集
|
||||
- 攻击路径分析
|
||||
- 权限关系可视化
|
||||
- 最短攻击路径计算
|
||||
- 高风险路径识别
|
||||
|
||||
**使用场景:**
|
||||
- Active Directory 安全评估
|
||||
- 后渗透测试
|
||||
- 域环境审计
|
||||
- 红队演练
|
||||
|
||||
**注意事项:**
|
||||
- 需要域用户凭据
|
||||
- 需要 Neo4j 数据库支持
|
||||
- 收集过程可能需要较长时间
|
||||
- 建议在授权环境中使用
|
||||
|
||||
parameters:
|
||||
- name: "domain"
|
||||
type: "string"
|
||||
description: "目标域名"
|
||||
required: false
|
||||
flag: "-d"
|
||||
format: "flag"
|
||||
|
||||
- name: "username"
|
||||
type: "string"
|
||||
description: "域用户名"
|
||||
required: false
|
||||
flag: "-u"
|
||||
format: "flag"
|
||||
|
||||
- name: "password"
|
||||
type: "string"
|
||||
description: "域用户密码"
|
||||
required: false
|
||||
flag: "-p"
|
||||
format: "flag"
|
||||
|
||||
- name: "dc"
|
||||
type: "string"
|
||||
description: "域控制器 IP 地址"
|
||||
required: false
|
||||
flag: "-dc"
|
||||
format: "flag"
|
||||
|
||||
50
tools/cyberchef.yaml
Normal file
50
tools/cyberchef.yaml
Normal file
@@ -0,0 +1,50 @@
|
||||
name: "cyberchef"
|
||||
command: "cyberchef"
|
||||
enabled: true
|
||||
|
||||
short_description: "数据转换和分析工具,支持多种编码、加密和数据处理操作"
|
||||
|
||||
description: |
|
||||
CyberChef 是一个强大的数据转换和分析工具,支持数百种数据操作。
|
||||
|
||||
**主要功能:**
|
||||
- 编码/解码(Base64, Hex, URL 等)
|
||||
- 加密/解密(AES, DES, RSA 等)
|
||||
- 哈希计算
|
||||
- 数据格式转换
|
||||
- 正则表达式操作
|
||||
- 数据提取和分析
|
||||
|
||||
**使用场景:**
|
||||
- CTF 竞赛
|
||||
- 数据分析和转换
|
||||
- 加密算法研究
|
||||
- 数字取证
|
||||
|
||||
**注意事项:**
|
||||
- 通常以 Web 界面运行
|
||||
- 命令行版本可能需要 Node.js
|
||||
- 功能强大,操作复杂
|
||||
|
||||
parameters:
|
||||
- name: "recipe"
|
||||
type: "string"
|
||||
description: "操作配方(JSON 格式),定义要执行的操作序列"
|
||||
required: true
|
||||
flag: "-Recipe"
|
||||
format: "flag"
|
||||
|
||||
- name: "input"
|
||||
type: "string"
|
||||
description: "输入数据(字符串或文件路径)"
|
||||
required: true
|
||||
flag: "-Input"
|
||||
format: "flag"
|
||||
|
||||
- name: "output"
|
||||
type: "string"
|
||||
description: "输出文件路径(可选)"
|
||||
required: false
|
||||
flag: "-Output"
|
||||
format: "flag"
|
||||
|
||||
70
tools/fcrackzip.yaml
Normal file
70
tools/fcrackzip.yaml
Normal file
@@ -0,0 +1,70 @@
|
||||
name: "fcrackzip"
|
||||
command: "fcrackzip"
|
||||
enabled: true
|
||||
|
||||
short_description: "ZIP 文件密码破解工具,支持暴力破解和字典攻击"
|
||||
|
||||
description: |
|
||||
fcrackzip 是一个用于破解受密码保护的 ZIP 文件密码的工具。
|
||||
|
||||
**主要功能:**
|
||||
- 暴力破解
|
||||
- 字典攻击
|
||||
- 指定字符集
|
||||
- 指定密码长度范围
|
||||
- 多线程支持
|
||||
|
||||
**使用场景:**
|
||||
- CTF 竞赛
|
||||
- ZIP 文件密码恢复
|
||||
- 安全测试
|
||||
- 数字取证
|
||||
|
||||
**注意事项:**
|
||||
- 破解时间取决于密码复杂度
|
||||
- 建议使用字典文件提高效率
|
||||
- 仅用于授权的安全测试
|
||||
|
||||
parameters:
|
||||
- name: "file"
|
||||
type: "string"
|
||||
description: "要破解的 ZIP 文件路径"
|
||||
required: true
|
||||
position: 0
|
||||
format: "positional"
|
||||
|
||||
- name: "dictionary"
|
||||
type: "string"
|
||||
description: "字典文件路径"
|
||||
required: false
|
||||
flag: "-D"
|
||||
format: "flag"
|
||||
|
||||
- name: "bruteforce"
|
||||
type: "bool"
|
||||
description: "使用暴力破解模式"
|
||||
required: false
|
||||
flag: "-b"
|
||||
format: "flag"
|
||||
|
||||
- name: "charset"
|
||||
type: "string"
|
||||
description: "字符集,例如 'aA1' 表示小写字母、大写字母和数字"
|
||||
required: false
|
||||
flag: "-c"
|
||||
format: "flag"
|
||||
|
||||
- name: "min_length"
|
||||
type: "int"
|
||||
description: "最小密码长度"
|
||||
required: false
|
||||
flag: "-l"
|
||||
format: "flag"
|
||||
|
||||
- name: "max_length"
|
||||
type: "int"
|
||||
description: "最大密码长度"
|
||||
required: false
|
||||
flag: "-u"
|
||||
format: "flag"
|
||||
|
||||
42
tools/hash-identifier.yaml
Normal file
42
tools/hash-identifier.yaml
Normal file
@@ -0,0 +1,42 @@
|
||||
name: "hash-identifier"
|
||||
command: "hash-identifier"
|
||||
enabled: true
|
||||
|
||||
short_description: "哈希类型识别工具,用于识别未知哈希值的类型"
|
||||
|
||||
description: |
|
||||
hash-identifier 是一个用于识别哈希值类型的工具,可以帮助确定未知哈希值使用的算法。
|
||||
|
||||
**主要功能:**
|
||||
- 识别多种哈希算法
|
||||
- 支持 MD5, SHA1, SHA256, bcrypt 等
|
||||
- 交互式识别
|
||||
- 快速识别常见哈希类型
|
||||
|
||||
**支持的哈希类型:**
|
||||
- MD5
|
||||
- SHA1, SHA256, SHA512
|
||||
- bcrypt
|
||||
- NTLM
|
||||
- MySQL
|
||||
- PostgreSQL
|
||||
- 等多种哈希算法
|
||||
|
||||
**使用场景:**
|
||||
- CTF 密码破解
|
||||
- 哈希值分析
|
||||
- 密码学研究
|
||||
- 安全审计
|
||||
|
||||
**注意事项:**
|
||||
- 需要 Python 环境
|
||||
- 交互式工具,可能需要特殊处理
|
||||
|
||||
parameters:
|
||||
- name: "hash"
|
||||
type: "string"
|
||||
description: "要识别的哈希值"
|
||||
required: true
|
||||
position: 0
|
||||
format: "positional"
|
||||
|
||||
50
tools/impacket.yaml
Normal file
50
tools/impacket.yaml
Normal file
@@ -0,0 +1,50 @@
|
||||
name: "impacket"
|
||||
command: "python3"
|
||||
enabled: true
|
||||
|
||||
short_description: "Impacket 网络协议工具集,用于网络协议攻击和横向移动"
|
||||
|
||||
description: |
|
||||
Impacket 是一个 Python 工具集,用于处理网络协议,常用于渗透测试和横向移动。
|
||||
|
||||
**主要功能:**
|
||||
- SMB 协议攻击
|
||||
- Kerberos 协议攻击
|
||||
- RPC 协议攻击
|
||||
- 远程命令执行
|
||||
- 凭证转储
|
||||
- 票据传递攻击
|
||||
|
||||
**常用工具:**
|
||||
- psexec: 远程命令执行
|
||||
- smbexec: SMB 远程执行
|
||||
- wmiexec: WMI 远程执行
|
||||
- secretsdump: 凭证转储
|
||||
- getTGT: Kerberos 票据获取
|
||||
|
||||
**使用场景:**
|
||||
- 横向移动
|
||||
- 凭证转储
|
||||
- 远程命令执行
|
||||
- 后渗透测试
|
||||
|
||||
**注意事项:**
|
||||
- 需要 Python 环境
|
||||
- 需要相应的凭据
|
||||
- 仅用于授权的安全测试
|
||||
- 工具路径通常在 /usr/share/doc/python3-impacket/examples/ 或通过 pip 安装
|
||||
|
||||
parameters:
|
||||
- name: "script"
|
||||
type: "string"
|
||||
description: "Impacket 脚本路径,例如 '/usr/share/doc/python3-impacket/examples/psexec.py'"
|
||||
required: true
|
||||
position: 0
|
||||
format: "positional"
|
||||
|
||||
- name: "args"
|
||||
type: "string"
|
||||
description: "脚本参数(JSON 格式的字符串,会被解析为多个参数)"
|
||||
required: false
|
||||
format: "positional"
|
||||
|
||||
45
tools/linpeas.yaml
Normal file
45
tools/linpeas.yaml
Normal file
@@ -0,0 +1,45 @@
|
||||
name: "linpeas"
|
||||
command: "linpeas.sh"
|
||||
enabled: true
|
||||
|
||||
short_description: "Linux 权限提升枚举脚本,自动检测常见提权路径"
|
||||
|
||||
description: |
|
||||
LinPEAS (Linux Privilege Escalation Awesome Script) 是一个自动化权限提升枚举脚本,用于检测 Linux 系统中的常见提权路径。
|
||||
|
||||
**主要功能:**
|
||||
- 系统信息收集
|
||||
- 权限和组检查
|
||||
- 可写文件和目录检测
|
||||
- SUID/SGID 文件查找
|
||||
- 环境变量检查
|
||||
- 定时任务分析
|
||||
- 网络配置检查
|
||||
- 敏感文件查找
|
||||
|
||||
**使用场景:**
|
||||
- 渗透测试中的权限提升
|
||||
- 安全审计
|
||||
- 后渗透测试
|
||||
- CTF 竞赛
|
||||
|
||||
**注意事项:**
|
||||
- 需要目标系统上已下载 linpeas.sh 脚本
|
||||
- 执行时间可能较长
|
||||
- 输出信息量大,建议保存到文件
|
||||
|
||||
parameters:
|
||||
- name: "output"
|
||||
type: "string"
|
||||
description: "输出文件路径(可选)"
|
||||
required: false
|
||||
flag: "-o"
|
||||
format: "flag"
|
||||
|
||||
- name: "fast"
|
||||
type: "bool"
|
||||
description: "快速模式,跳过耗时检查"
|
||||
required: false
|
||||
flag: "-fast"
|
||||
format: "flag"
|
||||
|
||||
@@ -28,11 +28,11 @@ parameters:
|
||||
|
||||
- name: "long_format"
|
||||
type: "bool"
|
||||
description: "显示详细信息"
|
||||
description: "显示详细信息(长格式)"
|
||||
required: false
|
||||
flag: "-l"
|
||||
format: "flag"
|
||||
default: true
|
||||
default: false
|
||||
|
||||
- name: "recursive"
|
||||
type: "bool"
|
||||
|
||||
36
tools/mimikatz.yaml
Normal file
36
tools/mimikatz.yaml
Normal file
@@ -0,0 +1,36 @@
|
||||
name: "mimikatz"
|
||||
command: "mimikatz.exe"
|
||||
enabled: true
|
||||
|
||||
short_description: "Windows 凭证提取工具,用于提取内存中的密码和哈希"
|
||||
|
||||
description: |
|
||||
Mimikatz 是一个强大的 Windows 凭证提取工具,可以从内存中提取明文密码、哈希值、票据等敏感信息。
|
||||
|
||||
**主要功能:**
|
||||
- 提取内存中的明文密码
|
||||
- 提取 NTLM 哈希
|
||||
- 提取 Kerberos 票据
|
||||
- Pass-the-Hash 攻击
|
||||
- Pass-the-Ticket 攻击
|
||||
- 凭证转储
|
||||
|
||||
**使用场景:**
|
||||
- 后渗透测试
|
||||
- 横向移动
|
||||
- 权限提升
|
||||
- 安全研究
|
||||
|
||||
**注意事项:**
|
||||
- 需要管理员权限运行
|
||||
- 可能被杀毒软件检测
|
||||
- 仅用于授权的安全测试
|
||||
- 使用前需要进入 mimikatz 交互式命令行
|
||||
|
||||
parameters:
|
||||
- name: "command"
|
||||
type: "string"
|
||||
description: "Mimikatz 命令,例如 'privilege::debug sekurlsa::logonpasswords'"
|
||||
required: true
|
||||
format: "positional"
|
||||
|
||||
55
tools/pdfcrack.yaml
Normal file
55
tools/pdfcrack.yaml
Normal file
@@ -0,0 +1,55 @@
|
||||
name: "pdfcrack"
|
||||
command: "pdfcrack"
|
||||
enabled: true
|
||||
|
||||
short_description: "PDF 文件密码破解工具,支持暴力破解和字典攻击"
|
||||
|
||||
description: |
|
||||
pdfcrack 是一个用于破解受密码保护的 PDF 文件密码的工具。
|
||||
|
||||
**主要功能:**
|
||||
- 暴力破解
|
||||
- 字典攻击
|
||||
- 用户密码和所有者密码破解
|
||||
- 支持多种加密算法
|
||||
|
||||
**使用场景:**
|
||||
- CTF 竞赛
|
||||
- PDF 文件密码恢复
|
||||
- 安全测试
|
||||
- 数字取证
|
||||
|
||||
**注意事项:**
|
||||
- 破解时间取决于密码复杂度
|
||||
- 建议使用字典文件提高效率
|
||||
- 仅用于授权的安全测试
|
||||
|
||||
parameters:
|
||||
- name: "file"
|
||||
type: "string"
|
||||
description: "要破解的 PDF 文件路径"
|
||||
required: true
|
||||
position: 0
|
||||
format: "positional"
|
||||
|
||||
- name: "wordlist"
|
||||
type: "string"
|
||||
description: "字典文件路径"
|
||||
required: false
|
||||
flag: "-w"
|
||||
format: "flag"
|
||||
|
||||
- name: "min_length"
|
||||
type: "int"
|
||||
description: "最小密码长度"
|
||||
required: false
|
||||
flag: "-n"
|
||||
format: "flag"
|
||||
|
||||
- name: "max_length"
|
||||
type: "int"
|
||||
description: "最大密码长度"
|
||||
required: false
|
||||
flag: "-m"
|
||||
format: "flag"
|
||||
|
||||
42
tools/stegsolve.yaml
Normal file
42
tools/stegsolve.yaml
Normal file
@@ -0,0 +1,42 @@
|
||||
name: "stegsolve"
|
||||
command: "java"
|
||||
enabled: true
|
||||
|
||||
short_description: "图片隐写分析工具,用于分析图片中的隐写数据"
|
||||
|
||||
description: |
|
||||
Stegsolve 是一个 Java 图片隐写分析工具,支持多种图片格式和隐写分析技术。
|
||||
|
||||
**主要功能:**
|
||||
- 图片格式转换
|
||||
- 颜色通道分析
|
||||
- LSB 隐写检测
|
||||
- 图片叠加分析
|
||||
- 数据提取
|
||||
|
||||
**使用场景:**
|
||||
- CTF 隐写题目
|
||||
- 图片隐写分析
|
||||
- 数字取证
|
||||
- 安全研究
|
||||
|
||||
**注意事项:**
|
||||
- 需要 Java 环境
|
||||
- 通常以 GUI 形式运行
|
||||
- 可能需要通过命令行参数或脚本调用
|
||||
|
||||
parameters:
|
||||
- name: "jar_file"
|
||||
type: "string"
|
||||
description: "Stegsolve JAR 文件路径,例如 'stegsolve.jar'"
|
||||
required: true
|
||||
position: 0
|
||||
format: "positional"
|
||||
|
||||
- name: "image"
|
||||
type: "string"
|
||||
description: "要分析的图片文件路径"
|
||||
required: false
|
||||
position: 1
|
||||
format: "positional"
|
||||
|
||||
45
tools/winpeas.yaml
Normal file
45
tools/winpeas.yaml
Normal file
@@ -0,0 +1,45 @@
|
||||
name: "winpeas"
|
||||
command: "winPEAS.exe"
|
||||
enabled: true
|
||||
|
||||
short_description: "Windows 权限提升枚举工具,自动检测常见提权路径"
|
||||
|
||||
description: |
|
||||
WinPEAS (Windows Privilege Escalation Awesome Script) 是一个自动化权限提升枚举工具,用于检测 Windows 系统中的常见提权路径。
|
||||
|
||||
**主要功能:**
|
||||
- 系统信息收集
|
||||
- 用户和组权限检查
|
||||
- 服务配置分析
|
||||
- 注册表检查
|
||||
- 计划任务分析
|
||||
- 网络配置检查
|
||||
- 文件权限检查
|
||||
- 凭证查找
|
||||
|
||||
**使用场景:**
|
||||
- 渗透测试中的权限提升
|
||||
- Windows 安全审计
|
||||
- 后渗透测试
|
||||
- CTF 竞赛
|
||||
|
||||
**注意事项:**
|
||||
- 需要目标系统上已下载 winPEAS.exe
|
||||
- 可能需要管理员权限
|
||||
- 输出信息量大,建议保存到文件
|
||||
|
||||
parameters:
|
||||
- name: "quiet"
|
||||
type: "bool"
|
||||
description: "安静模式,只显示重要信息"
|
||||
required: false
|
||||
flag: "-q"
|
||||
format: "flag"
|
||||
|
||||
- name: "notcolor"
|
||||
type: "bool"
|
||||
description: "禁用颜色输出"
|
||||
required: false
|
||||
flag: "-notcolor"
|
||||
format: "flag"
|
||||
|
||||
48
tools/zsteg.yaml
Normal file
48
tools/zsteg.yaml
Normal file
@@ -0,0 +1,48 @@
|
||||
name: "zsteg"
|
||||
command: "zsteg"
|
||||
enabled: true
|
||||
|
||||
short_description: "LSB 隐写检测工具,用于检测 PNG/BMP 图片中的隐写数据"
|
||||
|
||||
description: |
|
||||
zsteg 是一个用于检测 PNG 和 BMP 图片中 LSB (Least Significant Bit) 隐写的工具。
|
||||
|
||||
**主要功能:**
|
||||
- LSB 隐写检测
|
||||
- 多种隐写算法支持
|
||||
- 自动提取隐写数据
|
||||
- 支持多种图片格式
|
||||
|
||||
**使用场景:**
|
||||
- CTF 隐写题目
|
||||
- 图片隐写分析
|
||||
- 数字取证
|
||||
- 安全研究
|
||||
|
||||
**注意事项:**
|
||||
- 需要 Ruby 环境
|
||||
- 支持 PNG 和 BMP 格式
|
||||
- 可以检测多种隐写算法
|
||||
|
||||
parameters:
|
||||
- name: "file"
|
||||
type: "string"
|
||||
description: "要分析的图片文件路径"
|
||||
required: true
|
||||
position: 0
|
||||
format: "positional"
|
||||
|
||||
- name: "all"
|
||||
type: "bool"
|
||||
description: "检测所有可能的隐写方法"
|
||||
required: false
|
||||
flag: "--all"
|
||||
format: "flag"
|
||||
|
||||
- name: "lsb"
|
||||
type: "bool"
|
||||
description: "只检测 LSB 隐写"
|
||||
required: false
|
||||
flag: "--lsb"
|
||||
format: "flag"
|
||||
|
||||
Reference in New Issue
Block a user