Add files via upload

This commit is contained in:
公明
2025-11-08 22:57:03 +08:00
committed by GitHub
parent 515c00eac9
commit ae1f2531c9
93 changed files with 4482 additions and 0 deletions
+42
View File
@@ -0,0 +1,42 @@
name: "amass"
command: "amass"
enabled: true
short_description: "子域名枚举和网络映射工具"
description: |
Amass是一个深度子域名枚举和网络映射工具,通过多种技术发现目标域名的子域名。
**主要功能:**
- 被动和主动子域名枚举
- 多种数据源集成
- 网络映射和可视化
- 证书透明度日志查询
**使用场景:**
- 子域名发现
- 资产发现
- 渗透测试信息收集
- Bug bounty侦察
parameters:
- name: "domain"
type: "string"
description: "目标域名"
required: true
flag: "-d"
format: "flag"
- name: "mode"
type: "string"
description: "运行模式(enum, intel, viz"
required: false
default: "enum"
flag: "-mode"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的Amass参数"
required: false
+32
View File
@@ -0,0 +1,32 @@
name: "anew"
command: "anew"
enabled: true
short_description: "数据去重工具,用于处理文件中的新行"
description: |
Anew是一个数据去重工具,用于将新行追加到文件中,自动过滤重复项。
**主要功能:**
- 数据去重
- 文件追加
- 唯一行过滤
- 快速处理
**使用场景:**
- 数据处理
- 结果去重
- 数据合并
- 工具链集成
parameters:
- name: "input_data"
type: "string"
description: "输入数据"
required: true
- name: "output_file"
type: "string"
description: "输出文件路径"
required: false
+48
View File
@@ -0,0 +1,48 @@
name: "angr"
command: "python3"
enabled: true
short_description: "符号执行和二进制分析框架"
description: |
Angr是一个符号执行和二进制分析框架,用于自动化漏洞发现和利用。
**主要功能:**
- 符号执行
- 控制流图分析
- 静态分析
- 漏洞发现
**使用场景:**
- 二进制分析
- 漏洞发现
- 符号执行
- 安全研究
parameters:
- name: "binary"
type: "string"
description: "要分析的二进制文件路径"
required: true
- name: "script_content"
type: "string"
description: "自定义angr脚本内容"
required: false
- name: "find_address"
type: "string"
description: "符号执行中要查找的地址"
required: false
- name: "avoid_addresses"
type: "string"
description: "要避免的地址(逗号分隔)"
required: false
- name: "analysis_type"
type: "string"
description: "分析类型(symbolic, cfg, static"
required: false
default: "symbolic"
+48
View File
@@ -0,0 +1,48 @@
name: "api-fuzzer"
command: "ffuf"
enabled: true
short_description: "API端点模糊测试工具,支持智能参数发现"
description: |
高级API端点模糊测试工具,支持智能参数发现和漏洞评估。
**主要功能:**
- API端点发现
- 参数模糊测试
- 漏洞评估
- 多种HTTP方法支持
**使用场景:**
- API安全测试
- 端点发现
- 参数测试
- 安全评估
parameters:
- name: "base_url"
type: "string"
description: "API基础URL"
required: true
flag: "-u"
format: "flag"
- name: "endpoints"
type: "string"
description: "要测试的特定端点(逗号分隔)"
required: false
- name: "methods"
type: "string"
description: "HTTP方法(逗号分隔)"
required: false
default: "GET,POST,PUT,DELETE"
- name: "wordlist"
type: "string"
description: "端点发现字典"
required: false
default: "/usr/share/wordlists/api/api-endpoints.txt"
flag: "-w"
format: "flag"
+37
View File
@@ -0,0 +1,37 @@
name: "api-schema-analyzer"
command: "spectral"
enabled: true
short_description: "API模式分析工具,识别潜在安全问题"
description: |
分析API模式(OpenAPI/Swagger/GraphQL)并识别潜在安全问题。
**主要功能:**
- API模式分析
- 安全问题识别
- 端点发现
- 建议生成
**使用场景:**
- API安全审计
- 模式分析
- 安全问题发现
- 安全评估
parameters:
- name: "schema_url"
type: "string"
description: "API模式URLOpenAPI/Swagger/GraphQL"
required: true
flag: "-s"
format: "flag"
- name: "schema_type"
type: "string"
description: "模式类型(openapi, swagger, graphql"
required: false
default: "openapi"
flag: "--type"
format: "flag"
+60
View File
@@ -0,0 +1,60 @@
name: "arjun"
command: "arjun"
enabled: true
short_description: "HTTP参数发现工具"
description: |
Arjun是一个HTTP参数发现工具,用于发现Web应用中的隐藏参数。
**主要功能:**
- HTTP参数发现
- 多种HTTP方法支持
- 多线程支持
- 稳定模式
**使用场景:**
- 参数发现
- Web应用安全测试
- Bug bounty侦察
- 安全测试
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
flag: "-u"
format: "flag"
- name: "method"
type: "string"
description: "HTTP方法(GET, POST等)"
required: false
flag: "-m"
format: "flag"
default: "GET"
- name: "wordlist"
type: "string"
description: "自定义字典文件"
required: false
flag: "-w"
format: "flag"
- name: "threads"
type: "int"
description: "线程数"
required: false
flag: "-t"
format: "flag"
default: 25
- name: "stable"
type: "bool"
description: "使用稳定模式"
required: false
flag: "--stable"
format: "flag"
default: false
+44
View File
@@ -0,0 +1,44 @@
name: "arp-scan"
command: "arp-scan"
enabled: true
short_description: "ARP网络发现工具"
description: |
Arp-scan是一个ARP网络发现工具,用于发现本地网络中的活动主机。
**主要功能:**
- ARP扫描
- 本地网络发现
- MAC地址识别
- 快速扫描
**使用场景:**
- 本地网络发现
- 主机发现
- 网络映射
- 渗透测试
parameters:
- name: "target"
type: "string"
description: "目标IP范围(如果不使用local_network"
required: false
flag: "-l"
format: "flag"
- name: "interface"
type: "string"
description: "网络接口"
required: false
flag: "-I"
format: "flag"
- name: "local_network"
type: "bool"
description: "扫描本地网络"
required: false
flag: "-l"
format: "flag"
default: false
+61
View File
@@ -0,0 +1,61 @@
name: "autorecon"
command: "autorecon"
enabled: true
short_description: "自动化综合侦察工具"
description: |
AutoRecon是一个自动化综合侦察工具,用于执行全面的目标枚举。
**主要功能:**
- 自动化端口扫描
- 服务识别
- 漏洞扫描
- 综合报告
**使用场景:**
- 综合安全评估
- 渗透测试
- 网络侦察
- 安全审计
parameters:
- name: "target"
type: "string"
description: "目标IP地址或主机名"
required: true
position: 0
format: "positional"
- name: "output_dir"
type: "string"
description: "输出目录"
required: false
flag: "-o"
format: "flag"
default: "/tmp/autorecon"
- name: "port_scans"
type: "string"
description: "端口扫描配置"
required: false
flag: "--port-scans"
format: "flag"
default: "top-100-ports"
- name: "service_scans"
type: "string"
description: "服务扫描配置"
required: false
flag: "--service-scans"
format: "flag"
default: "default"
- name: "timeout"
type: "int"
description: "单个扫描的超时时间(秒)"
required: false
flag: "--timeout"
format: "flag"
default: 300
+37
View File
@@ -0,0 +1,37 @@
name: "binwalk"
command: "binwalk"
enabled: true
short_description: "固件和文件分析工具"
description: |
Binwalk是一个固件分析工具,用于分析、提取和逆向工程固件镜像。
**主要功能:**
- 文件签名识别
- 文件提取
- 熵分析
- 固件分析
**使用场景:**
- 固件分析
- 文件格式识别
- 数据提取
- 逆向工程
parameters:
- name: "file_path"
type: "string"
description: "要分析的文件路径"
required: true
position: 0
format: "positional"
- name: "extract"
type: "bool"
description: "提取发现的文件"
required: false
flag: "-e"
format: "flag"
default: false
+65
View File
@@ -0,0 +1,65 @@
name: "burpsuite"
command: "burpsuite"
enabled: true
short_description: "Web应用安全测试平台"
description: |
Burp Suite是一个Web应用安全测试平台,提供全面的Web安全测试功能。
**主要功能:**
- Web应用安全扫描
- 代理拦截
- 漏洞扫描
- 手动测试工具
**使用场景:**
- Web应用安全测试
- 渗透测试
- 漏洞扫描
- 安全评估
parameters:
- name: "project_file"
type: "string"
description: "Burp项目文件路径"
required: false
flag: "--project-file"
format: "flag"
- name: "config_file"
type: "string"
description: "Burp配置文件路径"
required: false
flag: "--config-file"
format: "flag"
- name: "target"
type: "string"
description: "目标URL"
required: false
flag: "--target"
format: "flag"
- name: "headless"
type: "bool"
description: "无头模式运行"
required: false
flag: "--headless"
format: "flag"
default: false
- name: "scan_type"
type: "string"
description: "要执行的扫描类型"
required: false
flag: "--scan-type"
format: "flag"
- name: "output_file"
type: "string"
description: "输出文件路径"
required: false
flag: "--output"
format: "flag"
+52
View File
@@ -0,0 +1,52 @@
name: "checkov"
command: "checkov"
enabled: true
short_description: "基础设施即代码安全扫描工具"
description: |
Checkov是一个静态代码分析工具,用于基础设施即代码(IaC)的安全扫描。
**主要功能:**
- 支持多种IaC框架(Terraform, CloudFormation, Kubernetes等)
- 数百个内置策略
- 自定义策略支持
- CI/CD集成
**使用场景:**
- IaC安全扫描
- 云配置审计
- 安全策略检查
- 合规性检查
parameters:
- name: "directory"
type: "string"
description: "要扫描的目录"
required: false
flag: "-d"
format: "flag"
default: "."
- name: "framework"
type: "string"
description: "要扫描的框架(terraform, cloudformation, kubernetes等)"
required: false
flag: "--framework"
format: "flag"
- name: "check"
type: "string"
description: "要运行的特定检查"
required: false
flag: "--check"
format: "flag"
- name: "output_format"
type: "string"
description: "输出格式(json, yaml, cli"
required: false
flag: "--output"
format: "flag"
default: "json"
+29
View File
@@ -0,0 +1,29 @@
name: "checksec"
command: "checksec"
enabled: true
short_description: "二进制安全特性检查工具"
description: |
Checksec是一个用于检查二进制文件安全特性的工具。
**主要功能:**
- 安全特性检查
- 保护机制检测
- 多种架构支持
- 详细报告
**使用场景:**
- 二进制安全分析
- 保护机制检查
- 漏洞研究
- 安全评估
parameters:
- name: "binary"
type: "string"
description: "要检查的二进制文件路径"
required: true
position: 0
format: "positional"
+45
View File
@@ -0,0 +1,45 @@
name: "clair"
command: "clair"
enabled: true
short_description: "容器漏洞分析工具"
description: |
Clair是一个容器漏洞分析工具,用于扫描容器镜像中的漏洞。
**主要功能:**
- 容器镜像扫描
- 漏洞检测
- 多种数据库支持
- API接口
**使用场景:**
- 容器安全扫描
- 漏洞检测
- CI/CD集成
- 安全审计
parameters:
- name: "image"
type: "string"
description: "要扫描的容器镜像"
required: true
flag: "--image"
format: "flag"
- name: "config"
type: "string"
description: "Clair配置文件"
required: false
flag: "--config"
format: "flag"
default: "/etc/clair/config.yaml"
- name: "output_format"
type: "string"
description: "输出格式(json, yaml"
required: false
flag: "--format"
format: "flag"
default: "json"
+43
View File
@@ -0,0 +1,43 @@
name: "cloudmapper"
command: "cloudmapper"
enabled: true
short_description: "AWS网络可视化和安全分析工具"
description: |
CloudMapper是一个AWS网络可视化和安全分析工具。
**主要功能:**
- AWS网络可视化
- 安全分析
- 网络映射
- 管理员查找
**使用场景:**
- AWS网络分析
- 安全评估
- 网络可视化
- 安全审计
parameters:
- name: "action"
type: "string"
description: "要执行的操作(collect, prepare, webserver, find_admins等)"
required: false
default: "collect"
- name: "account"
type: "string"
description: "要分析的AWS账户"
required: false
flag: "--account"
format: "flag"
- name: "config"
type: "string"
description: "配置文件路径"
required: false
flag: "--config"
format: "flag"
default: "config.json"
+36
View File
@@ -0,0 +1,36 @@
name: "create-file"
command: "sh"
enabled: true
short_description: "创建文件工具"
description: |
在服务器上创建指定内容的文件。
**主要功能:**
- 创建文件
- 写入内容
- 支持二进制文件
**使用场景:**
- 文件创建
- 脚本生成
- 数据保存
parameters:
- name: "filename"
type: "string"
description: "要创建的文件名"
required: true
- name: "content"
type: "string"
description: "文件内容"
required: true
- name: "binary"
type: "bool"
description: "是否为二进制内容"
required: false
default: false
+61
View File
@@ -0,0 +1,61 @@
name: "dalfox"
command: "dalfox"
enabled: true
short_description: "高级XSS漏洞扫描器"
description: |
Dalfox是一个高级XSS漏洞扫描器,支持多种XSS检测技术。
**主要功能:**
- XSS漏洞检测
- 盲XSS测试
- DOM挖掘
- 字典挖掘
**使用场景:**
- XSS漏洞测试
- Web应用安全测试
- Bug bounty侦察
- 安全测试
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
flag: "-u"
format: "flag"
- name: "pipe_mode"
type: "bool"
description: "使用管道模式输入"
required: false
flag: "--pipe"
format: "flag"
default: false
- name: "blind"
type: "bool"
description: "启用盲XSS测试"
required: false
flag: "-b"
format: "flag"
default: false
- name: "mining_dom"
type: "bool"
description: "启用DOM挖掘"
required: false
flag: "--mining-dom"
format: "flag"
default: true
- name: "mining_dict"
type: "bool"
description: "启用字典挖掘"
required: false
flag: "--mining-dict"
format: "flag"
default: true
+35
View File
@@ -0,0 +1,35 @@
name: "delete-file"
command: "rm"
enabled: true
short_description: "删除文件或目录工具"
description: |
删除服务器上的文件或目录。
**主要功能:**
- 删除文件
- 删除目录
- 递归删除
**使用场景:**
- 文件清理
- 临时文件删除
- 目录清理
parameters:
- name: "filename"
type: "string"
description: "要删除的文件或目录名"
required: true
position: 0
format: "positional"
- name: "recursive"
type: "bool"
description: "递归删除目录"
required: false
flag: "-r"
format: "flag"
default: false
+60
View File
@@ -0,0 +1,60 @@
name: "dirsearch"
command: "dirsearch"
enabled: true
short_description: "高级目录和文件发现工具"
description: |
Dirsearch是一个高级Web内容扫描器,用于发现目录和文件。
**主要功能:**
- 快速目录和文件发现
- 多线程支持
- 递归扫描
- 扩展名过滤
**使用场景:**
- Web应用安全测试
- 目录枚举
- 文件发现
- 渗透测试
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
flag: "-u"
format: "flag"
- name: "extensions"
type: "string"
description: "文件扩展名(逗号分隔)"
required: false
flag: "-e"
format: "flag"
default: "php,html,js,txt,xml,json"
- name: "wordlist"
type: "string"
description: "字典文件路径"
required: false
flag: "-w"
format: "flag"
- name: "threads"
type: "int"
description: "线程数"
required: false
flag: "-t"
format: "flag"
default: 30
- name: "recursive"
type: "bool"
description: "启用递归扫描"
required: false
flag: "-r"
format: "flag"
default: false
+43
View File
@@ -0,0 +1,43 @@
name: "dnsenum"
command: "dnsenum"
enabled: true
short_description: "DNS枚举工具"
description: |
DNSenum是一个DNS信息收集工具,用于枚举DNS信息。
**主要功能:**
- DNS信息收集
- 子域名枚举
- 区域传输测试
- 反向查找
**使用场景:**
- DNS枚举
- 子域名发现
- 网络侦察
- 渗透测试
parameters:
- name: "domain"
type: "string"
description: "目标域名"
required: true
position: 0
format: "positional"
- name: "dns_server"
type: "string"
description: "要使用的DNS服务器"
required: false
flag: "-n"
format: "flag"
- name: "wordlist"
type: "string"
description: "用于暴力破解的字典文件"
required: false
flag: "-f"
format: "flag"
+44
View File
@@ -0,0 +1,44 @@
name: "docker-bench-security"
command: "docker-bench-security"
enabled: true
short_description: "Docker安全基准检查工具"
description: |
Docker Bench for Security是一个Docker安全基准检查工具,用于检查Docker配置是否符合安全最佳实践。
**主要功能:**
- Docker安全基准检查
- 配置审计
- 安全最佳实践检查
- 详细报告
**使用场景:**
- Docker安全审计
- 配置检查
- 合规性验证
- 安全评估
parameters:
- name: "checks"
type: "string"
description: "要运行的特定检查"
required: false
flag: "--check"
format: "flag"
- name: "exclude"
type: "string"
description: "要排除的检查"
required: false
flag: "--exclude"
format: "flag"
- name: "output_file"
type: "string"
description: "输出文件路径"
required: false
flag: "--output"
format: "flag"
default: "/tmp/docker-bench-results.json"
+37
View File
@@ -0,0 +1,37 @@
name: "dotdotpwn"
command: "dotdotpwn"
enabled: true
short_description: "目录遍历漏洞测试工具"
description: |
DotDotPwn是一个目录遍历漏洞测试工具,支持多种协议。
**主要功能:**
- 目录遍历测试
- 多种协议支持(HTTP, FTP, TFTP等)
- 自动化测试
- 报告生成
**使用场景:**
- 目录遍历漏洞测试
- Web应用安全测试
- 渗透测试
- 漏洞验证
parameters:
- name: "target"
type: "string"
description: "目标主机名或IP"
required: true
flag: "-m"
format: "flag"
- name: "module"
type: "string"
description: "要使用的模块(http, ftp, tftp等)"
required: false
flag: "-m"
format: "flag"
default: "http"
+82
View File
@@ -0,0 +1,82 @@
name: "enum4linux-ng"
command: "enum4linux-ng"
enabled: true
short_description: "高级SMB枚举工具(Enum4linux的下一代版本)"
description: |
Enum4linux-ng是Enum4linux的下一代版本,提供更强大的SMB枚举功能。
**主要功能:**
- SMB共享枚举
- 用户和组枚举
- 策略枚举
- 系统信息收集
**使用场景:**
- Windows系统渗透测试
- SMB安全评估
- 域环境侦察
- 安全测试
parameters:
- name: "target"
type: "string"
description: "目标IP地址"
required: true
position: 0
format: "positional"
- name: "username"
type: "string"
description: "用户名"
required: false
flag: "-u"
format: "flag"
- name: "password"
type: "string"
description: "密码"
required: false
flag: "-p"
format: "flag"
- name: "domain"
type: "string"
description: "域名"
required: false
flag: "-d"
format: "flag"
- name: "shares"
type: "bool"
description: "枚举共享"
required: false
flag: "-S"
format: "flag"
default: true
- name: "users"
type: "bool"
description: "枚举用户"
required: false
flag: "-U"
format: "flag"
default: true
- name: "groups"
type: "bool"
description: "枚举组"
required: false
flag: "-G"
format: "flag"
default: true
- name: "policy"
type: "bool"
description: "枚举策略"
required: false
flag: "-P"
format: "flag"
default: true
+35
View File
@@ -0,0 +1,35 @@
name: "enum4linux"
command: "enum4linux"
enabled: true
short_description: "SMB枚举工具,用于Windows/Samba系统信息收集"
description: |
Enum4linux是一个用于枚举SMB共享和Windows系统信息的工具。
**主要功能:**
- SMB共享枚举
- 用户和组枚举
- 密码策略信息
- 系统信息收集
**使用场景:**
- Windows系统渗透测试
- SMB安全评估
- 网络信息收集
- 域环境侦察
parameters:
- name: "target"
type: "string"
description: "目标IP地址"
required: true
position: 0
format: "positional"
- name: "additional_args"
type: "string"
description: "额外的Enum4linux参数(默认:-a"
required: false
default: "-a"
+36
View File
@@ -0,0 +1,36 @@
name: "execute-python-script"
command: "python3"
enabled: true
short_description: "执行Python脚本工具"
description: |
在虚拟环境中执行Python脚本。
**主要功能:**
- 执行Python脚本
- 虚拟环境支持
- 脚本内容执行
**使用场景:**
- 脚本执行
- 自动化任务
- 数据处理
parameters:
- name: "script"
type: "string"
description: "要执行的Python脚本内容"
required: true
- name: "env_name"
type: "string"
description: "虚拟环境名称"
required: false
default: "default"
- name: "filename"
type: "string"
description: "自定义脚本文件名(为空则自动生成)"
required: false
+43
View File
@@ -0,0 +1,43 @@
name: "exiftool"
command: "exiftool"
enabled: true
short_description: "元数据提取工具"
description: |
ExifTool用于读取、写入和编辑各种文件格式的元数据。
**主要功能:**
- 元数据提取
- 多种文件格式支持
- 元数据编辑
- 批量处理
**使用场景:**
- 取证分析
- 元数据检查
- 隐私保护
- 文件分析
parameters:
- name: "file_path"
type: "string"
description: "要分析的文件路径"
required: true
position: 0
format: "positional"
- name: "output_format"
type: "string"
description: "输出格式(json, xml, csv"
required: false
flag: "-j"
format: "flag"
- name: "tags"
type: "string"
description: "要提取的特定标签"
required: false
flag: "-TAG"
format: "flag"
+51
View File
@@ -0,0 +1,51 @@
name: "falco"
command: "falco"
enabled: true
short_description: "运行时安全监控工具"
description: |
Falco是一个运行时安全监控工具,用于检测容器和主机中的异常行为。
**主要功能:**
- 运行时监控
- 异常检测
- 规则引擎
- 实时告警
**使用场景:**
- 运行时安全监控
- 异常检测
- 安全事件响应
- 合规性监控
parameters:
- name: "config_file"
type: "string"
description: "Falco配置文件"
required: false
flag: "--config"
format: "flag"
default: "/etc/falco/falco.yaml"
- name: "rules_file"
type: "string"
description: "自定义规则文件"
required: false
flag: "--rules"
format: "flag"
- name: "output_format"
type: "string"
description: "输出格式(json, text"
required: false
flag: "--output"
format: "flag"
default: "json"
- name: "duration"
type: "int"
description: "监控持续时间(秒)"
required: false
default: 60
+44
View File
@@ -0,0 +1,44 @@
name: "feroxbuster"
command: "feroxbuster"
enabled: true
short_description: "递归内容发现工具"
description: |
Feroxbuster是一个快速、简单的递归内容发现工具。
**主要功能:**
- 递归目录发现
- 多线程支持
- 自动过滤
- 多种输出格式
**使用场景:**
- Web内容发现
- 目录枚举
- 文件发现
- 安全测试
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
flag: "-u"
format: "flag"
- name: "wordlist"
type: "string"
description: "字典文件路径"
required: false
flag: "-w"
format: "flag"
- name: "threads"
type: "int"
description: "线程数"
required: false
flag: "-t"
format: "flag"
default: 10
+57
View File
@@ -0,0 +1,57 @@
name: "ffuf"
command: "ffuf"
enabled: true
short_description: "快速Web模糊测试工具,用于目录、参数和内容发现"
description: |
FFuf是一个快速的Web模糊测试工具,用于目录发现、参数模糊测试和内容发现。
**主要功能:**
- 快速目录和文件发现
- 参数模糊测试
- 虚拟主机发现
- 自定义过滤器和匹配器
- 多线程支持
**使用场景:**
- Web应用安全测试
- 目录枚举
- 参数发现
- 内容发现
parameters:
- name: "url"
type: "string"
description: "目标URL(使用FUZZ作为占位符)"
required: true
flag: "-u"
format: "flag"
- name: "wordlist"
type: "string"
description: "字典文件路径"
required: false
default: "/usr/share/wordlists/dirb/common.txt"
flag: "-w"
format: "flag"
- name: "mode"
type: "string"
description: "模糊测试模式(directory, vhost, parameter"
required: false
default: "directory"
- name: "match_codes"
type: "string"
description: "匹配的HTTP状态码(逗号分隔)"
required: false
default: "200,204,301,302,307,401,403"
flag: "-mc"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的FFuf参数"
required: false
+36
View File
@@ -0,0 +1,36 @@
name: "fierce"
command: "fierce"
enabled: true
short_description: "DNS侦察工具"
description: |
Fierce是一个DNS侦察工具,用于发现目标域名的子域名。
**主要功能:**
- 子域名发现
- DNS暴力破解
- 区域传输测试
- 网络映射
**使用场景:**
- DNS侦察
- 子域名枚举
- 网络映射
- 渗透测试
parameters:
- name: "domain"
type: "string"
description: "目标域名"
required: true
flag: "-dns"
format: "flag"
- name: "dns_server"
type: "string"
description: "要使用的DNS服务器"
required: false
flag: "-dnsserver"
format: "flag"
+44
View File
@@ -0,0 +1,44 @@
name: "foremost"
command: "foremost"
enabled: true
short_description: "文件恢复工具"
description: |
Foremost是一个基于文件头和尾的文件恢复工具。
**主要功能:**
- 文件恢复
- 多种文件类型支持
- 磁盘镜像分析
- 数据恢复
**使用场景:**
- 数据恢复
- 取证分析
- 文件提取
- 磁盘分析
parameters:
- name: "input_file"
type: "string"
description: "输入文件或设备"
required: true
flag: "-i"
format: "flag"
- name: "output_dir"
type: "string"
description: "输出目录"
required: false
flag: "-o"
format: "flag"
default: "/tmp/foremost_output"
- name: "file_types"
type: "string"
description: "要恢复的文件类型(jpg,gif,png等)"
required: false
flag: "-t"
format: "flag"
+44
View File
@@ -0,0 +1,44 @@
name: "gau"
command: "gau"
enabled: true
short_description: "从多个数据源获取所有URL"
description: |
Gau (Get All URLs) 从多个数据源获取目标域名的所有URL。
**主要功能:**
- 从Wayback Machine获取URL
- 从CommonCrawl获取URL
- 从OTX获取URL
- 从URLScan获取URL
**使用场景:**
- URL发现
- 历史URL收集
- Bug bounty侦察
- 安全测试
parameters:
- name: "domain"
type: "string"
description: "目标域名"
required: true
position: 0
format: "positional"
- name: "providers"
type: "string"
description: "数据源(wayback,commoncrawl,otx,urlscan"
required: false
flag: "-providers"
format: "flag"
- name: "include_subs"
type: "bool"
description: "包含子域名"
required: false
flag: "-subs"
format: "flag"
default: true
+50
View File
@@ -0,0 +1,50 @@
name: "gdb-peda"
command: "gdb"
enabled: true
short_description: "带PEDA增强的GDB调试器"
description: |
GDB-PEDA是带有PEDAPython Exploit Development Assistance)增强的GDB调试器。
**主要功能:**
- 增强的GDB功能
- 自动化分析
- 漏洞利用辅助
- 可视化显示
**使用场景:**
- 二进制调试
- 漏洞利用开发
- 逆向工程
- 安全研究
parameters:
- name: "binary"
type: "string"
description: "要调试的二进制文件"
required: false
position: 0
format: "positional"
- name: "commands"
type: "string"
description: "GDB命令(分号分隔)"
required: false
flag: "-ex"
format: "flag"
- name: "attach_pid"
type: "int"
description: "要附加的进程ID"
required: false
flag: "-p"
format: "flag"
- name: "core_file"
type: "string"
description: "核心转储文件路径"
required: false
flag: "-c"
format: "flag"
+43
View File
@@ -0,0 +1,43 @@
name: "gdb"
command: "gdb"
enabled: true
short_description: "GNU调试器,用于二进制分析和调试"
description: |
GDB是GNU调试器,用于调试和分析二进制程序。
**主要功能:**
- 程序调试
- 内存分析
- 反汇编
- 断点设置
**使用场景:**
- 二进制分析
- 漏洞研究
- 逆向工程
- 程序调试
parameters:
- name: "binary"
type: "string"
description: "要分析的二进制文件路径"
required: true
position: 0
format: "positional"
- name: "commands"
type: "string"
description: "要执行的GDB命令(分号分隔)"
required: false
flag: "-ex"
format: "flag"
- name: "script_file"
type: "string"
description: "GDB脚本文件路径"
required: false
flag: "-x"
format: "flag"
+50
View File
@@ -0,0 +1,50 @@
name: "ghidra"
command: "ghidra"
enabled: true
short_description: "高级二进制分析和逆向工程工具"
description: |
Ghidra是NSA开发的免费二进制分析和逆向工程工具。
**主要功能:**
- 反汇编和反编译
- 高级分析
- 脚本支持
- 协作功能
**使用场景:**
- 二进制分析
- 逆向工程
- 恶意软件分析
- 漏洞研究
parameters:
- name: "binary"
type: "string"
description: "要分析的二进制文件路径"
required: true
- name: "project_name"
type: "string"
description: "Ghidra项目名称"
required: false
default: "hexstrike_analysis"
- name: "script_file"
type: "string"
description: "自定义Ghidra脚本文件"
required: false
- name: "analysis_timeout"
type: "int"
description: "分析超时时间(秒)"
required: false
default: 300
- name: "output_format"
type: "string"
description: "输出格式(xml, json"
required: false
default: "xml"
+50
View File
@@ -0,0 +1,50 @@
name: "gobuster"
command: "gobuster"
enabled: true
short_description: "Web内容扫描工具,用于发现目录、文件和子域名"
description: |
Gobuster是一个快速的内容发现工具,用于Web应用程序的目录、文件和子域名枚举。
**主要功能:**
- 目录和文件发现
- DNS子域名枚举
- 虚拟主机发现
- 支持多种模式(dir, dns, fuzz, vhost
**使用场景:**
- Web应用安全测试
- 目录枚举和文件发现
- 子域名发现
- 渗透测试信息收集
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
flag: "-u"
format: "flag"
- name: "mode"
type: "string"
description: "扫描模式(dir, dns, fuzz, vhost"
required: false
default: "dir"
flag: "-m"
format: "flag"
- name: "wordlist"
type: "string"
description: "字典文件路径"
required: false
default: "/usr/share/wordlists/dirb/common.txt"
flag: "-w"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的Gobuster参数"
required: false
+53
View File
@@ -0,0 +1,53 @@
name: "graphql-scanner"
command: "graphqlmap"
enabled: true
short_description: "GraphQL安全扫描和自省工具"
description: |
高级GraphQL安全扫描和自省工具,用于检测GraphQL API中的安全问题。
**主要功能:**
- GraphQL自省
- 查询深度测试
- 突变操作测试
- 漏洞评估
**使用场景:**
- GraphQL安全测试
- API安全评估
- 漏洞发现
- 安全测试
parameters:
- name: "endpoint"
type: "string"
description: "GraphQL端点URL"
required: true
flag: "-u"
format: "flag"
- name: "introspection"
type: "bool"
description: "测试自省查询"
required: false
default: true
flag: "--introspection"
format: "flag"
- name: "query_depth"
type: "int"
description: "要测试的最大查询深度"
required: false
default: 10
flag: "--depth"
format: "flag"
- name: "test_mutations"
type: "bool"
description: "测试突变操作"
required: false
default: true
flag: "--mutations"
format: "flag"
+43
View File
@@ -0,0 +1,43 @@
name: "hakrawler"
command: "hakrawler"
enabled: true
short_description: "Web端点发现工具"
description: |
Hakrawler是一个快速、简单的Web端点发现工具。
**主要功能:**
- Web端点发现
- 链接提取
- JavaScript文件发现
- 快速爬取
**使用场景:**
- Web端点发现
- 内容爬取
- 安全测试
- Bug bounty侦察
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
- name: "depth"
type: "int"
description: "爬取深度"
required: false
flag: "-d"
format: "flag"
default: 2
- name: "forms"
type: "bool"
description: "包含表单"
required: false
flag: "-forms"
format: "flag"
default: true
+64
View File
@@ -0,0 +1,64 @@
name: "hashcat"
command: "hashcat"
enabled: true
short_description: "高级密码破解工具,支持GPU加速"
description: |
Hashcat是一个高级密码恢复工具,支持多种哈希算法和攻击模式。
**主要功能:**
- 支持多种哈希算法
- GPU加速
- 多种攻击模式(字典、组合、掩码等)
- 规则引擎
**使用场景:**
- 密码恢复
- 哈希破解
- 安全测试
- 取证分析
parameters:
- name: "hash_file"
type: "string"
description: "包含哈希的文件"
required: true
position: 0
format: "positional"
- name: "hash_type"
type: "string"
description: "哈希类型编号"
required: true
flag: "-m"
format: "flag"
- name: "attack_mode"
type: "string"
description: "攻击模式(0=字典, 1=组合, 3=掩码等)"
required: false
default: "0"
flag: "-a"
format: "flag"
- name: "wordlist"
type: "string"
description: "字典文件"
required: false
default: "/usr/share/wordlists/rockyou.txt"
position: 1
format: "positional"
- name: "mask"
type: "string"
description: "掩码(用于掩码攻击)"
required: false
flag: "-a"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的Hashcat参数"
required: false
+42
View File
@@ -0,0 +1,42 @@
name: "hashpump"
command: "hashpump"
enabled: true
short_description: "哈希长度扩展攻击工具"
description: |
HashPump是一个用于执行哈希长度扩展攻击的工具。
**主要功能:**
- 哈希长度扩展攻击
- 多种哈希算法支持
- 签名生成
- 数据追加
**使用场景:**
- 密码学攻击
- 哈希函数测试
- CTF挑战
- 安全研究
parameters:
- name: "signature"
type: "string"
description: "原始哈希签名"
required: true
- name: "data"
type: "string"
description: "原始数据"
required: true
- name: "key_length"
type: "string"
description: "密钥长度"
required: true
- name: "append_data"
type: "string"
description: "要追加的数据"
required: true
+54
View File
@@ -0,0 +1,54 @@
name: "http-framework-test"
command: "curl"
enabled: true
short_description: "增强的HTTP测试框架(Burp Suite替代)"
description: |
增强的HTTP测试框架,用于综合Web安全测试(Burp Suite替代)。
**主要功能:**
- HTTP请求测试
- 代理拦截
- 重放器
- 入侵者
**使用场景:**
- Web安全测试
- HTTP测试
- 渗透测试
- 安全评估
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
- name: "method"
type: "string"
description: "HTTP方法(GET, POST, PUT, DELETE等)"
required: false
default: "GET"
- name: "data"
type: "string"
description: "请求数据/参数(JSON格式)"
required: false
- name: "headers"
type: "string"
description: "自定义请求头(JSON格式)"
required: false
- name: "cookies"
type: "string"
description: "自定义CookieJSON格式)"
required: false
- name: "action"
type: "string"
description: "要执行的操作(request, spider, proxy_history, repeater, intruder"
required: false
default: "request"
+55
View File
@@ -0,0 +1,55 @@
name: "http-intruder"
command: "ffuf"
enabled: true
short_description: "简单的Intrudersniper)模糊测试工具"
description: |
简单的Intruder(sniper)模糊测试,逐个参数迭代载荷。
**主要功能:**
- 参数模糊测试
- 载荷迭代
- 多种位置支持
- 批量请求
**使用场景:**
- 参数模糊测试
- 载荷测试
- 安全测试
- 漏洞发现
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
- name: "method"
type: "string"
description: "HTTP方法"
required: false
default: "GET"
- name: "location"
type: "string"
description: "载荷位置(query, body, headers, cookie"
required: false
default: "query"
- name: "params"
type: "string"
description: "参数列表(JSON格式)"
required: false
- name: "payloads"
type: "string"
description: "载荷列表(JSON格式)"
required: false
- name: "max_requests"
type: "int"
description: "最大请求数"
required: false
default: 100
+27
View File
@@ -0,0 +1,27 @@
name: "http-repeater"
command: "curl"
enabled: true
short_description: "发送精心制作的HTTP请求(Burp Repeater等效)"
description: |
发送精心制作的HTTP请求,类似于Burp Suite的Repeater功能。
**主要功能:**
- 请求重放
- 请求修改
- 响应查看
- 多次发送
**使用场景:**
- HTTP请求测试
- 请求重放
- 安全测试
- 漏洞验证
parameters:
- name: "request_spec"
type: "string"
description: "请求规范(JSON格式,包含url, method, headers, cookies, data"
required: true
+85
View File
@@ -0,0 +1,85 @@
name: "httpx"
command: "httpx"
enabled: true
short_description: "快速HTTP探测和指纹识别工具"
description: |
HTTPx是一个快速HTTP探测工具,用于发现和验证HTTP服务。
**主要功能:**
- 快速HTTP探测
- 技术检测
- 状态码过滤
- 多线程支持
**使用场景:**
- HTTP服务发现
- 技术栈识别
- Web应用发现
- 安全测试
parameters:
- name: "target"
type: "string"
description: "目标文件或单个URL"
required: true
flag: "-u"
format: "flag"
- name: "probe"
type: "bool"
description: "启用探测"
required: false
flag: "-probe"
format: "flag"
default: true
- name: "tech_detect"
type: "bool"
description: "启用技术检测"
required: false
flag: "-td"
format: "flag"
default: false
- name: "status_code"
type: "bool"
description: "显示状态码"
required: false
flag: "-sc"
format: "flag"
default: false
- name: "content_length"
type: "bool"
description: "显示内容长度"
required: false
flag: "-cl"
format: "flag"
default: false
- name: "title"
type: "bool"
description: "显示页面标题"
required: false
flag: "-title"
format: "flag"
default: false
- name: "web_server"
type: "bool"
description: "显示Web服务器"
required: false
flag: "-server"
format: "flag"
default: false
- name: "threads"
type: "int"
description: "线程数"
required: false
flag: "-t"
format: "flag"
default: 50
+69
View File
@@ -0,0 +1,69 @@
name: "hydra"
command: "hydra"
enabled: true
short_description: "密码暴力破解工具,支持多种协议和服务"
description: |
Hydra是一个快速的网络登录破解工具,支持多种协议和服务的密码暴力破解。
**主要功能:**
- 支持多种协议(SSH, FTP, HTTP, SMB等)
- 快速并行破解
- 支持用户名和密码字典
- 可恢复的会话
**使用场景:**
- 密码强度测试
- 渗透测试
- 安全评估
- 弱密码检测
parameters:
- name: "target"
type: "string"
description: "目标IP或主机名"
required: true
position: 0
format: "positional"
- name: "service"
type: "string"
description: "服务类型(ssh, ftp, http等)"
required: true
position: 1
format: "positional"
- name: "username"
type: "string"
description: "单个用户名"
required: false
flag: "-l"
format: "flag"
- name: "username_file"
type: "string"
description: "用户名字典文件"
required: false
flag: "-L"
format: "flag"
- name: "password"
type: "string"
description: "单个密码"
required: false
flag: "-p"
format: "flag"
- name: "password_file"
type: "string"
description: "密码字典文件"
required: false
flag: "-P"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的Hydra参数"
required: false
+33
View File
@@ -0,0 +1,33 @@
name: "install-python-package"
command: "pip"
enabled: true
short_description: "安装Python包工具"
description: |
在虚拟环境中安装Python包。
**主要功能:**
- 安装Python包
- 虚拟环境支持
- 依赖管理
**使用场景:**
- 环境配置
- 依赖安装
- 工具安装
parameters:
- name: "package"
type: "string"
description: "要安装的Python包名"
required: true
position: 0
format: "positional"
- name: "env_name"
type: "string"
description: "虚拟环境名称"
required: false
default: "default"
+58
View File
@@ -0,0 +1,58 @@
name: "jaeles"
command: "jaeles"
enabled: true
short_description: "高级漏洞扫描器,支持自定义签名"
description: |
Jaeles是一个高级漏洞扫描器,支持自定义签名进行漏洞检测。
**主要功能:**
- 自定义签名支持
- 多种漏洞检测
- 快速扫描
- 详细报告
**使用场景:**
- 漏洞扫描
- Web应用安全测试
- 自定义检测规则
- 安全测试
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
flag: "-u"
format: "flag"
- name: "signatures"
type: "string"
description: "自定义签名路径"
required: false
flag: "-s"
format: "flag"
- name: "config"
type: "string"
description: "配置文件"
required: false
flag: "-c"
format: "flag"
- name: "threads"
type: "int"
description: "线程数"
required: false
flag: "-t"
format: "flag"
default: 20
- name: "timeout"
type: "int"
description: "请求超时时间(秒)"
required: false
flag: "--timeout"
format: "flag"
default: 20
+49
View File
@@ -0,0 +1,49 @@
name: "john"
command: "john"
enabled: true
short_description: "John the Ripper密码破解工具"
description: |
John the Ripper是一个快速的密码破解工具,支持多种哈希算法。
**主要功能:**
- 多种哈希算法支持
- 字典攻击
- 暴力破解
- 规则引擎
**使用场景:**
- 密码恢复
- 哈希破解
- 安全测试
- 取证分析
parameters:
- name: "hash_file"
type: "string"
description: "包含哈希的文件"
required: true
position: 0
format: "positional"
- name: "wordlist"
type: "string"
description: "字典文件"
required: false
default: "/usr/share/wordlists/rockyou.txt"
flag: "--wordlist"
format: "flag"
- name: "format_type"
type: "string"
description: "哈希格式类型"
required: false
flag: "--format"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的John参数"
required: false
+36
View File
@@ -0,0 +1,36 @@
name: "jwt-analyzer"
command: "jwt_tool"
enabled: true
short_description: "JWT令牌分析和漏洞测试工具"
description: |
高级JWT令牌分析和漏洞测试工具,用于检测JWT实现中的安全问题。
**主要功能:**
- JWT令牌分析
- 漏洞测试
- 攻击向量检测
- 令牌操作
**使用场景:**
- JWT安全测试
- 令牌分析
- 漏洞发现
- 安全测试
parameters:
- name: "jwt_token"
type: "string"
description: "要分析的JWT令牌"
required: true
flag: "-t"
format: "flag"
- name: "target_url"
type: "string"
description: "用于测试令牌操作的可选目标URL"
required: false
flag: "-u"
format: "flag"
+53
View File
@@ -0,0 +1,53 @@
name: "katana"
command: "katana"
enabled: true
short_description: "下一代Web爬虫和蜘蛛工具"
description: |
Katana是一个快速、智能的Web爬虫工具,用于发现Web应用中的端点和资源。
**主要功能:**
- 智能Web爬虫
- JavaScript渲染支持
- 表单提取
- 端点发现
**使用场景:**
- Web应用侦察
- 端点发现
- 内容爬取
- 安全测试
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
flag: "-u"
format: "flag"
- name: "depth"
type: "int"
description: "爬取深度"
required: false
flag: "-d"
format: "flag"
default: 3
- name: "js_crawl"
type: "bool"
description: "启用JavaScript爬取"
required: false
flag: "-js-crawl"
format: "flag"
default: true
- name: "form_extraction"
type: "bool"
description: "启用表单提取"
required: false
flag: "-form"
format: "flag"
default: true
+51
View File
@@ -0,0 +1,51 @@
name: "kube-bench"
command: "kube-bench"
enabled: true
short_description: "CIS Kubernetes基准检查工具"
description: |
Kube-bench是一个CIS Kubernetes基准检查工具,用于检查Kubernetes集群是否符合CIS基准。
**主要功能:**
- CIS基准检查
- 多种目标支持(master, node, etcd, policies
- 详细报告
- 配置验证
**使用场景:**
- Kubernetes合规性检查
- 安全配置审计
- CIS基准验证
- 安全评估
parameters:
- name: "targets"
type: "string"
description: "要检查的目标(master, node, etcd, policies"
required: false
flag: "--targets"
format: "flag"
- name: "version"
type: "string"
description: "Kubernetes版本"
required: false
flag: "--version"
format: "flag"
- name: "config_dir"
type: "string"
description: "配置目录"
required: false
flag: "--config-dir"
format: "flag"
- name: "output_format"
type: "string"
description: "输出格式(json, yaml"
required: false
flag: "--output"
format: "flag"
default: "json"
+59
View File
@@ -0,0 +1,59 @@
name: "kube-hunter"
command: "kube-hunter"
enabled: true
short_description: "Kubernetes渗透测试工具"
description: |
Kube-hunter是一个Kubernetes渗透测试工具,用于发现Kubernetes集群中的安全问题。
**主要功能:**
- Kubernetes安全扫描
- 漏洞发现
- 配置问题检测
- 主动和被动模式
**使用场景:**
- Kubernetes安全测试
- 集群安全评估
- 渗透测试
- 安全审计
parameters:
- name: "target"
type: "string"
description: "特定目标扫描"
required: false
flag: "--remote"
format: "flag"
- name: "cidr"
type: "string"
description: "CIDR范围扫描"
required: false
flag: "--cidr"
format: "flag"
- name: "interface"
type: "string"
description: "网络接口扫描"
required: false
flag: "--interface"
format: "flag"
- name: "active"
type: "bool"
description: "启用主动扫描(可能有风险)"
required: false
flag: "--active"
format: "flag"
default: false
- name: "report"
type: "string"
description: "报告格式(json, yaml"
required: false
flag: "--report"
format: "flag"
default: "json"
+37
View File
@@ -0,0 +1,37 @@
name: "libc-database"
command: "libc-database"
enabled: true
short_description: "libc识别和偏移查找工具"
description: |
Libc-database是一个用于libc识别和偏移查找的工具。
**主要功能:**
- libc识别
- 符号偏移查找
- libc下载
- 数据库查询
**使用场景:**
- CTF挑战
- 漏洞利用开发
- libc识别
- 安全研究
parameters:
- name: "action"
type: "string"
description: "要执行的操作(find, dump, download"
required: true
- name: "symbols"
type: "string"
description: "符号和偏移(格式:symbol1:offset1 symbol2:offset2"
required: false
- name: "libc_id"
type: "string"
description: "Libc ID(用于dump/download操作)"
required: false
+44
View File
@@ -0,0 +1,44 @@
name: "list-files"
command: "ls"
enabled: true
short_description: "列出目录文件工具"
description: |
列出服务器上指定目录中的文件。
**主要功能:**
- 列出文件
- 显示详细信息
- 递归列出
**使用场景:**
- 目录浏览
- 文件查找
- 系统检查
parameters:
- name: "directory"
type: "string"
description: "要列出的目录(相对于服务器基础目录)"
required: false
default: "."
position: 0
format: "positional"
- name: "long_format"
type: "bool"
description: "显示详细信息"
required: false
flag: "-l"
format: "flag"
default: true
- name: "recursive"
type: "bool"
description: "递归列出"
required: false
flag: "-R"
format: "flag"
default: false
+59
View File
@@ -0,0 +1,59 @@
name: "masscan"
command: "masscan"
enabled: true
short_description: "高速互联网级端口扫描工具"
description: |
Masscan是一个高速端口扫描工具,可以在几分钟内扫描整个互联网。
**主要功能:**
- 极高的扫描速度
- 支持大规模网络扫描
- Banner抓取
- 可配置扫描速率
**使用场景:**
- 大规模网络扫描
- 互联网级扫描
- 快速端口发现
parameters:
- name: "target"
type: "string"
description: "目标IP地址或CIDR范围"
required: true
position: 0
format: "positional"
- name: "ports"
type: "string"
description: "端口范围(如:1-65535"
required: false
flag: "-p"
format: "flag"
default: "1-65535"
- name: "rate"
type: "int"
description: "每秒数据包数"
required: false
flag: "--rate"
format: "flag"
default: 1000
- name: "interface"
type: "string"
description: "网络接口"
required: false
flag: "-e"
format: "flag"
- name: "banners"
type: "bool"
description: "启用Banner抓取"
required: false
flag: "--banners"
format: "flag"
default: false
+32
View File
@@ -0,0 +1,32 @@
name: "metasploit"
command: "msfconsole"
enabled: true
short_description: "Metasploit渗透测试框架"
description: |
Metasploit是一个渗透测试框架,提供大量漏洞利用模块和辅助工具。
**主要功能:**
- 漏洞利用
- 载荷生成
- 后渗透模块
- 辅助工具
**使用场景:**
- 渗透测试
- 漏洞利用
- 安全测试
- 安全研究
parameters:
- name: "module"
type: "string"
description: "要使用的Metasploit模块"
required: true
- name: "options"
type: "string"
description: "模块选项(JSON格式)"
required: false
+36
View File
@@ -0,0 +1,36 @@
name: "modify-file"
command: "sh"
enabled: true
short_description: "修改文件工具"
description: |
修改服务器上的现有文件。
**主要功能:**
- 修改文件
- 追加内容
- 覆盖内容
**使用场景:**
- 文件编辑
- 内容追加
- 配置修改
parameters:
- name: "filename"
type: "string"
description: "要修改的文件名"
required: true
- name: "content"
type: "string"
description: "要写入或追加的内容"
required: true
- name: "append"
type: "bool"
description: "是否追加(true)或覆盖(false"
required: false
default: false
+57
View File
@@ -0,0 +1,57 @@
name: "msfvenom"
command: "msfvenom"
enabled: true
short_description: "Metasploit载荷生成工具"
description: |
MSFVenom是Metasploit框架的载荷生成工具,用于创建各种类型的攻击载荷。
**主要功能:**
- 多种载荷类型
- 编码器支持
- 多种输出格式
- 平台支持
**使用场景:**
- 渗透测试
- 载荷生成
- 漏洞利用
- 安全测试
parameters:
- name: "payload"
type: "string"
description: "要生成的载荷(如:windows/meterpreter/reverse_tcp"
required: true
flag: "-p"
format: "flag"
- name: "format_type"
type: "string"
description: "输出格式(exe, elf, raw等)"
required: false
flag: "-f"
format: "flag"
- name: "output_file"
type: "string"
description: "输出文件路径"
required: false
flag: "-o"
format: "flag"
- name: "encoder"
type: "string"
description: "编码器(如:x86/shikata_ga_nai"
required: false
flag: "-e"
format: "flag"
- name: "iterations"
type: "string"
description: "编码迭代次数"
required: false
flag: "-i"
format: "flag"
+45
View File
@@ -0,0 +1,45 @@
name: "nbtscan"
command: "nbtscan"
enabled: true
short_description: "NetBIOS名称扫描工具"
description: |
Nbtscan是一个NetBIOS名称扫描工具,用于发现网络中的Windows系统。
**主要功能:**
- NetBIOS名称扫描
- Windows系统发现
- 网络映射
- 快速扫描
**使用场景:**
- Windows网络发现
- NetBIOS枚举
- 网络映射
- 渗透测试
parameters:
- name: "target"
type: "string"
description: "目标IP地址或范围"
required: true
position: 0
format: "positional"
- name: "verbose"
type: "bool"
description: "详细输出"
required: false
flag: "-v"
format: "flag"
default: false
- name: "timeout"
type: "int"
description: "超时时间(秒)"
required: false
flag: "-t"
format: "flag"
default: 2
+70
View File
@@ -0,0 +1,70 @@
name: "netexec"
command: "netexec"
enabled: true
short_description: "网络枚举和利用框架(原CrackMapExec"
description: |
NetExec(原CrackMapExec)是一个网络枚举和利用框架,支持多种协议。
**主要功能:**
- 多协议支持(SMB, SSH, WinRM等)
- 凭证验证
- 横向移动
- 模块化架构
**使用场景:**
- 网络渗透测试
- 域环境测试
- 横向移动测试
- 凭证验证
parameters:
- name: "target"
type: "string"
description: "目标IP或网络"
required: true
position: 0
format: "positional"
- name: "protocol"
type: "string"
description: "协议类型(smb, ssh, winrm等)"
required: false
default: "smb"
flag: "-M"
format: "flag"
- name: "username"
type: "string"
description: "用户名"
required: false
flag: "-u"
format: "flag"
- name: "password"
type: "string"
description: "密码"
required: false
flag: "-p"
format: "flag"
- name: "hash_value"
type: "string"
description: "NTLM哈希(用于Pass-the-Hash"
required: false
flag: "-H"
format: "flag"
- name: "module"
type: "string"
description: "要执行的模块"
required: false
flag: "-M"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的NetExec参数"
required: false
+91
View File
@@ -0,0 +1,91 @@
name: "nmap-advanced"
command: "nmap"
enabled: true
short_description: "高级Nmap扫描,支持自定义NSE脚本和优化时序"
description: |
高级Nmap扫描工具,支持自定义NSE脚本、优化时序和多种扫描技术。
**主要功能:**
- 多种扫描技术(SYN, TCP, UDP等)
- 自定义NSE脚本
- 时序优化
- OS检测和版本检测
**使用场景:**
- 高级网络扫描
- 深度安全评估
- 渗透测试
- 网络侦察
parameters:
- name: "target"
type: "string"
description: "目标IP地址或主机名"
required: true
position: 0
format: "positional"
- name: "scan_type"
type: "string"
description: "扫描类型(-sS, -sT, -sU等)"
required: false
flag: ""
format: "positional"
default: "-sS"
- name: "ports"
type: "string"
description: "要扫描的端口"
required: false
flag: "-p"
format: "flag"
- name: "timing"
type: "string"
description: "时序模板(T0-T5"
required: false
flag: "-T"
format: "flag"
default: "T4"
- name: "nse_scripts"
type: "string"
description: "要运行的自定义NSE脚本"
required: false
flag: "--script"
format: "flag"
- name: "os_detection"
type: "bool"
description: "启用OS检测"
required: false
flag: "-O"
format: "flag"
default: false
- name: "version_detection"
type: "bool"
description: "启用版本检测"
required: false
flag: "-sV"
format: "flag"
default: false
- name: "aggressive"
type: "bool"
description: "启用激进扫描"
required: false
flag: "-A"
format: "flag"
default: false
- name: "stealth"
type: "bool"
description: "启用隐蔽模式"
required: false
flag: "-sS"
format: "flag"
default: false
+56
View File
@@ -0,0 +1,56 @@
name: "nuclei"
command: "nuclei"
enabled: true
short_description: "快速漏洞扫描器,使用YAML模板进行漏洞检测"
description: |
Nuclei是一个基于模板的快速漏洞扫描器,使用社区维护的YAML模板进行漏洞检测。
**主要功能:**
- 快速漏洞扫描
- 基于模板的检测
- 支持多种协议(HTTP, TCP, DNS等)
- 实时结果输出
- 支持自定义模板
**使用场景:**
- 漏洞扫描和发现
- 安全评估
- 渗透测试
- 漏洞验证
parameters:
- name: "target"
type: "string"
description: "目标URL或IP"
required: true
flag: "-u"
format: "flag"
- name: "severity"
type: "string"
description: "严重程度过滤(critical,high,medium,low,info"
required: false
flag: "-s"
format: "flag"
- name: "tags"
type: "string"
description: "标签过滤(如cve,rce,lfi"
required: false
flag: "-tags"
format: "flag"
- name: "template"
type: "string"
description: "自定义模板路径"
required: false
flag: "-t"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的Nuclei参数"
required: false
+37
View File
@@ -0,0 +1,37 @@
name: "objdump"
command: "objdump"
enabled: true
short_description: "二进制文件反汇编工具"
description: |
Objdump是GNU binutils的一部分,用于反汇编二进制文件。
**主要功能:**
- 反汇编
- 符号表显示
- 节信息显示
- 多种架构支持
**使用场景:**
- 二进制分析
- 逆向工程
- 程序理解
- 调试辅助
parameters:
- name: "binary"
type: "string"
description: "要分析的二进制文件路径"
required: true
position: 0
format: "positional"
- name: "disassemble"
type: "bool"
description: "反汇编二进制文件"
required: false
flag: "-d"
format: "flag"
default: true
+36
View File
@@ -0,0 +1,36 @@
name: "one-gadget"
command: "one_gadget"
enabled: true
short_description: "在libc中查找one-shot RCE gadget的工具"
description: |
One-gadget是一个用于在libc中查找one-shot RCE gadget的工具。
**主要功能:**
- One-shot gadget搜索
- 约束级别检查
- 多种libc支持
**使用场景:**
- CTF挑战
- 漏洞利用开发
- ROP链简化
- 安全研究
parameters:
- name: "libc_path"
type: "string"
description: "libc二进制文件路径"
required: true
position: 0
format: "positional"
- name: "level"
type: "int"
description: "约束级别(0, 1, 2"
required: false
flag: "-l"
format: "flag"
default: 1
+44
View File
@@ -0,0 +1,44 @@
name: "pacu"
command: "pacu"
enabled: true
short_description: "AWS渗透测试框架"
description: |
Pacu是一个AWS渗透测试框架,用于测试AWS环境的安全性。
**主要功能:**
- AWS渗透测试
- 权限提升
- 数据访问
- 模块化架构
**使用场景:**
- AWS安全测试
- 渗透测试
- 权限测试
- 安全评估
parameters:
- name: "session_name"
type: "string"
description: "Pacu会话名称"
required: false
flag: "--session"
format: "flag"
default: "hexstrike_session"
- name: "modules"
type: "string"
description: "要运行的模块(逗号分隔)"
required: false
flag: "--modules"
format: "flag"
- name: "regions"
type: "string"
description: "AWS区域(逗号分隔)"
required: false
flag: "--regions"
format: "flag"
+51
View File
@@ -0,0 +1,51 @@
name: "paramspider"
command: "paramspider"
enabled: true
short_description: "从Web档案中挖掘参数"
description: |
ParamSpider从Web档案中挖掘参数,用于发现隐藏的参数。
**主要功能:**
- 参数挖掘
- Web档案查询
- 多级深度支持
- 扩展名过滤
**使用场景:**
- 参数发现
- Bug bounty侦察
- Web应用安全测试
- 安全测试
parameters:
- name: "domain"
type: "string"
description: "目标域名"
required: true
flag: "-d"
format: "flag"
- name: "level"
type: "int"
description: "挖掘深度级别"
required: false
flag: "-l"
format: "flag"
default: 2
- name: "exclude"
type: "string"
description: "要排除的文件扩展名"
required: false
flag: "-e"
format: "flag"
- name: "output"
type: "string"
description: "输出文件路径"
required: false
flag: "-o"
format: "flag"
+60
View File
@@ -0,0 +1,60 @@
name: "prowler"
command: "prowler"
enabled: true
short_description: "云安全评估工具(AWS, Azure, GCP"
description: |
Prowler是一个全面的云安全评估工具,支持AWS、Azure和GCP。
**主要功能:**
- 云安全评估
- 合规性检查
- 安全最佳实践检查
- 多种输出格式
**使用场景:**
- 云安全审计
- 合规性检查
- 安全评估
- 云配置审计
parameters:
- name: "provider"
type: "string"
description: "云提供商(aws, azure, gcp"
required: false
flag: "-p"
format: "flag"
default: "aws"
- name: "profile"
type: "string"
description: "AWS配置文件"
required: false
flag: "-p"
format: "flag"
default: "default"
- name: "region"
type: "string"
description: "要扫描的特定区域"
required: false
flag: "-r"
format: "flag"
- name: "checks"
type: "string"
description: "要运行的特定检查"
required: false
flag: "-c"
format: "flag"
- name: "output_format"
type: "string"
description: "输出格式(json, csv, html"
required: false
flag: "-M"
format: "flag"
default: "json"
+51
View File
@@ -0,0 +1,51 @@
name: "pwninit"
command: "pwninit"
enabled: true
short_description: "CTF二进制漏洞利用设置工具"
description: |
Pwninit是一个用于CTF二进制漏洞利用设置的工具,自动配置libc和loader。
**主要功能:**
- 自动libc识别
- Loader配置
- 模板生成
- 环境设置
**使用场景:**
- CTF挑战
- 漏洞利用开发
- 环境配置
- 安全研究
parameters:
- name: "binary"
type: "string"
description: "二进制文件路径"
required: true
position: 0
format: "positional"
- name: "libc"
type: "string"
description: "libc文件路径"
required: false
flag: "--libc"
format: "flag"
- name: "ld"
type: "string"
description: "Loader文件路径"
required: false
flag: "--ld"
format: "flag"
- name: "template_type"
type: "string"
description: "模板类型(python, c"
required: false
flag: "--template"
format: "flag"
default: "python"
+48
View File
@@ -0,0 +1,48 @@
name: "pwntools"
command: "python3"
enabled: true
short_description: "CTF和漏洞利用开发框架"
description: |
Pwntools是一个CTF和漏洞利用开发框架,用于快速开发漏洞利用程序。
**主要功能:**
- 漏洞利用开发
- 自动化脚本
- 网络交互
- 二进制分析辅助
**使用场景:**
- CTF挑战
- 漏洞利用开发
- 二进制分析
- 安全研究
parameters:
- name: "script_content"
type: "string"
description: "Python脚本内容(使用pwntools"
required: true
- name: "target_binary"
type: "string"
description: "本地二进制文件路径"
required: false
- name: "target_host"
type: "string"
description: "远程主机地址"
required: false
- name: "target_port"
type: "int"
description: "远程端口"
required: false
- name: "exploit_type"
type: "string"
description: "漏洞利用类型(local, remote, format_string, rop"
required: false
default: "local"
+33
View File
@@ -0,0 +1,33 @@
name: "qsreplace"
command: "qsreplace"
enabled: true
short_description: "查询字符串参数替换工具"
description: |
Qsreplace是一个用于替换URL中查询字符串参数的工具,常用于模糊测试。
**主要功能:**
- 参数替换
- 批量处理
- 多种替换模式
- 快速处理
**使用场景:**
- 参数模糊测试
- URL处理
- 工具链集成
- 安全测试
parameters:
- name: "urls"
type: "string"
description: "要处理的URL(每行一个)"
required: true
- name: "replacement"
type: "string"
description: "替换字符串"
required: false
default: "FUZZ"
+36
View File
@@ -0,0 +1,36 @@
name: "radare2"
command: "r2"
enabled: true
short_description: "二进制分析和逆向工程框架"
description: |
Radare2是一个完整的二进制分析和逆向工程框架。
**主要功能:**
- 反汇编和反编译
- 调试支持
- 脚本支持
- 多种架构支持
**使用场景:**
- 二进制分析
- 逆向工程
- 漏洞研究
- 恶意软件分析
parameters:
- name: "binary"
type: "string"
description: "要分析的二进制文件路径"
required: true
position: 0
format: "positional"
- name: "commands"
type: "string"
description: "要执行的Radare2命令(分号分隔)"
required: false
flag: "-c"
format: "flag"
+60
View File
@@ -0,0 +1,60 @@
name: "responder"
command: "responder"
enabled: true
short_description: "LLMNR/NBT-NS/MDNS投毒和凭据收集工具"
description: |
Responder是一个LLMNR/NBT-NS/MDNS投毒工具,用于收集网络凭据。
**主要功能:**
- LLMNR/NBT-NS投毒
- 凭据收集
- WPAD代理
- 指纹识别
**使用场景:**
- 网络渗透测试
- 凭据收集
- 横向移动
- 安全测试
parameters:
- name: "interface"
type: "string"
description: "网络接口"
required: false
flag: "-I"
format: "flag"
default: "eth0"
- name: "analyze"
type: "bool"
description: "仅分析模式"
required: false
flag: "-A"
format: "flag"
default: false
- name: "wpad"
type: "bool"
description: "启用WPAD恶意代理"
required: false
flag: "-w"
format: "flag"
default: true
- name: "fingerprint"
type: "bool"
description: "指纹识别模式"
required: false
flag: "-f"
format: "flag"
default: false
- name: "duration"
type: "int"
description: "运行持续时间(秒)"
required: false
default: 300
+36
View File
@@ -0,0 +1,36 @@
name: "ropgadget"
command: "ROPgadget"
enabled: true
short_description: "ROP gadget搜索工具"
description: |
ROPgadget是一个用于在二进制文件中搜索ROP gadget的工具。
**主要功能:**
- ROP gadget搜索
- 多种架构支持
- Gadget分类
- 利用链生成
**使用场景:**
- 二进制分析
- 漏洞利用开发
- ROP链构建
- 安全研究
parameters:
- name: "binary"
type: "string"
description: "要分析的二进制文件路径"
required: true
position: 0
format: "positional"
- name: "gadget_type"
type: "string"
description: "要搜索的gadget类型"
required: false
flag: "--gadgets"
format: "flag"
+59
View File
@@ -0,0 +1,59 @@
name: "ropper"
command: "ropper"
enabled: true
short_description: "高级ROP/JOP gadget搜索工具"
description: |
Ropper是一个高级ROP/JOP gadget搜索工具,用于漏洞利用开发。
**主要功能:**
- ROP/JOP gadget搜索
- Gadget质量评估
- 多种架构支持
- 利用链生成
**使用场景:**
- 漏洞利用开发
- ROP链构建
- 二进制分析
- 安全研究
parameters:
- name: "binary"
type: "string"
description: "要分析的二进制文件路径"
required: true
flag: "--file"
format: "flag"
- name: "gadget_type"
type: "string"
description: "Gadget类型(rop, jop, sys, all"
required: false
flag: "--type"
format: "flag"
default: "rop"
- name: "quality"
type: "int"
description: "Gadget质量级别(1-5"
required: false
flag: "--quality"
format: "flag"
default: 1
- name: "arch"
type: "string"
description: "目标架构(x86, x86_64, arm等)"
required: false
flag: "--arch"
format: "flag"
- name: "search_string"
type: "string"
description: "要搜索的特定gadget模式"
required: false
flag: "--search"
format: "flag"
+56
View File
@@ -0,0 +1,56 @@
name: "rpcclient"
command: "rpcclient"
enabled: true
short_description: "RPC枚举工具"
description: |
Rpcclient是一个RPC客户端工具,用于枚举Windows/Samba系统信息。
**主要功能:**
- RPC枚举
- 用户和组枚举
- 域信息查询
- 系统信息收集
**使用场景:**
- Windows系统渗透测试
- Samba枚举
- 域环境侦察
- 安全测试
parameters:
- name: "target"
type: "string"
description: "目标IP地址"
required: true
position: 0
format: "positional"
- name: "username"
type: "string"
description: "用户名"
required: false
flag: "-U"
format: "flag"
- name: "password"
type: "string"
description: "密码"
required: false
flag: "-N"
format: "flag"
- name: "domain"
type: "string"
description: "域名"
required: false
flag: "-W"
format: "flag"
- name: "commands"
type: "string"
description: "RPC命令(分号分隔)"
required: false
default: "enumdomusers;enumdomgroups;querydominfo"
+51
View File
@@ -0,0 +1,51 @@
name: "rustscan"
command: "rustscan"
enabled: true
short_description: "超快速端口扫描工具,使用Rust编写"
description: |
Rustscan是一个用Rust编写的超快速端口扫描工具,可以快速扫描大量端口。
**主要功能:**
- 超快速端口扫描
- 可配置的扫描速度
- 支持Nmap脚本集成
- 批量扫描支持
**使用场景:**
- 快速端口扫描
- 大规模网络扫描
- 渗透测试信息收集
parameters:
- name: "target"
type: "string"
description: "目标IP地址或主机名"
required: true
flag: "-a"
format: "flag"
- name: "ports"
type: "string"
description: "要扫描的端口(如:22,80,443或1-1000"
required: false
flag: "-p"
format: "flag"
- name: "ulimit"
type: "int"
description: "文件描述符限制"
required: false
flag: "-u"
format: "flag"
default: 5000
- name: "scripts"
type: "bool"
description: "在发现的端口上运行Nmap脚本"
required: false
flag: "--scripts"
format: "flag"
default: false
+53
View File
@@ -0,0 +1,53 @@
name: "scout-suite"
command: "scout"
enabled: true
short_description: "多云安全评估工具"
description: |
Scout Suite是一个多云安全评估工具,支持AWS、Azure、GCP、Aliyun和OCI。
**主要功能:**
- 多云安全评估
- 配置审计
- 安全最佳实践检查
- 详细报告生成
**使用场景:**
- 云安全审计
- 合规性检查
- 安全评估
- 云配置审计
parameters:
- name: "provider"
type: "string"
description: "云提供商(aws, azure, gcp, aliyun, oci"
required: false
flag: "--provider"
format: "flag"
default: "aws"
- name: "profile"
type: "string"
description: "AWS配置文件"
required: false
flag: "--profile"
format: "flag"
default: "default"
- name: "report_dir"
type: "string"
description: "报告保存目录"
required: false
flag: "--report-dir"
format: "flag"
default: "/tmp/scout-suite"
- name: "services"
type: "string"
description: "要评估的特定服务"
required: false
flag: "--services"
format: "flag"
+55
View File
@@ -0,0 +1,55 @@
name: "smbmap"
command: "smbmap"
enabled: true
short_description: "SMB共享枚举和访问工具"
description: |
SMBMap是一个用于枚举SMB共享并提供文件访问功能的工具。
**主要功能:**
- SMB共享枚举
- 文件列表和下载
- 权限检查
- 支持多种认证方式
**使用场景:**
- SMB安全测试
- 文件共享审计
- 渗透测试
- 网络侦察
parameters:
- name: "target"
type: "string"
description: "目标IP地址"
required: true
flag: "-H"
format: "flag"
- name: "username"
type: "string"
description: "用户名"
required: false
flag: "-u"
format: "flag"
- name: "password"
type: "string"
description: "密码"
required: false
flag: "-p"
format: "flag"
- name: "domain"
type: "string"
description: "域名"
required: false
flag: "-d"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的SMBMap参数"
required: false
+57
View File
@@ -0,0 +1,57 @@
name: "steghide"
command: "steghide"
enabled: true
short_description: "隐写术分析工具"
description: |
Steghide是一个隐写术工具,用于在图像和音频文件中隐藏数据。
**主要功能:**
- 数据隐藏
- 数据提取
- 信息查看
- 密码保护
**使用场景:**
- 隐写术分析
- 数据隐藏检测
- 取证分析
- CTF挑战
parameters:
- name: "action"
type: "string"
description: "操作类型(extract, embed, info"
required: true
position: 0
format: "positional"
- name: "cover_file"
type: "string"
description: "载体文件路径"
required: true
position: 1
format: "positional"
- name: "embed_file"
type: "string"
description: "要嵌入的文件(embed操作时)"
required: false
flag: "-ef"
format: "flag"
- name: "passphrase"
type: "string"
description: "密码"
required: false
flag: "-p"
format: "flag"
- name: "output_file"
type: "string"
description: "输出文件路径"
required: false
flag: "-sf"
format: "flag"
+36
View File
@@ -0,0 +1,36 @@
name: "strings"
command: "strings"
enabled: true
short_description: "从二进制文件中提取字符串"
description: |
Strings工具用于从二进制文件中提取可打印字符串。
**主要功能:**
- 字符串提取
- 可配置最小长度
- 支持多种文件格式
**使用场景:**
- 二进制分析
- 恶意软件分析
- 取证分析
- 逆向工程
parameters:
- name: "file_path"
type: "string"
description: "要分析的文件路径"
required: true
position: 0
format: "positional"
- name: "min_len"
type: "int"
description: "最小字符串长度"
required: false
flag: "-n"
format: "flag"
default: 4
+50
View File
@@ -0,0 +1,50 @@
name: "subfinder"
command: "subfinder"
enabled: true
short_description: "被动子域名发现工具,使用多个数据源"
description: |
Subfinder是一个被动子域名发现工具,通过查询多个数据源来发现子域名。
**主要功能:**
- 被动子域名发现
- 多个数据源集成
- 快速扫描
- 支持API密钥配置
**使用场景:**
- 子域名枚举
- 资产发现
- Bug bounty侦察
- 渗透测试信息收集
parameters:
- name: "domain"
type: "string"
description: "目标域名"
required: true
flag: "-d"
format: "flag"
- name: "silent"
type: "bool"
description: "静默模式"
required: false
default: true
flag: "-silent"
format: "flag"
- name: "all_sources"
type: "bool"
description: "使用所有数据源"
required: false
default: false
flag: "-all"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的Subfinder参数"
required: false
+60
View File
@@ -0,0 +1,60 @@
name: "terrascan"
command: "terrascan"
enabled: true
short_description: "基础设施即代码安全扫描工具"
description: |
Terrascan是一个基础设施即代码安全扫描工具,用于检测IaC配置中的安全问题。
**主要功能:**
- IaC安全扫描
- 多种框架支持
- 策略检查
- 合规性验证
**使用场景:**
- IaC安全扫描
- 云配置审计
- 安全策略检查
- 合规性检查
parameters:
- name: "scan_type"
type: "string"
description: "扫描类型(all, terraform, k8s等)"
required: false
flag: "--scan-type"
format: "flag"
default: "all"
- name: "iac_dir"
type: "string"
description: "IaC目录"
required: false
flag: "-d"
format: "flag"
default: "."
- name: "policy_type"
type: "string"
description: "要使用的策略类型"
required: false
flag: "--policy-type"
format: "flag"
- name: "output_format"
type: "string"
description: "输出格式(json, yaml, xml"
required: false
flag: "--output"
format: "flag"
default: "json"
- name: "severity"
type: "string"
description: "严重程度过滤(high, medium, low"
required: false
flag: "--severity"
format: "flag"
+50
View File
@@ -0,0 +1,50 @@
name: "trivy"
command: "trivy"
enabled: true
short_description: "容器和文件系统漏洞扫描器"
description: |
Trivy是一个简单而全面的容器和文件系统漏洞扫描器。
**主要功能:**
- 容器镜像扫描
- 文件系统扫描
- 代码仓库扫描
- 配置文件扫描
**使用场景:**
- 容器安全扫描
- CI/CD集成
- 漏洞检测
- 安全审计
parameters:
- name: "scan_type"
type: "string"
description: "扫描类型(image, fs, repo, config"
required: false
default: "image"
- name: "target"
type: "string"
description: "扫描目标(镜像名、目录、仓库)"
required: true
position: 0
format: "positional"
- name: "severity"
type: "string"
description: "严重程度过滤(UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL"
required: false
flag: "--severity"
format: "flag"
- name: "output_format"
type: "string"
description: "输出格式(json, table, sarif"
required: false
flag: "--format"
format: "flag"
default: "json"
+37
View File
@@ -0,0 +1,37 @@
name: "uro"
command: "uro"
enabled: true
short_description: "URL过滤工具,用于过滤相似的URL"
description: |
Uro是一个URL过滤工具,用于过滤掉相似的URL,去除重复项。
**主要功能:**
- URL去重
- 相似URL过滤
- 白名单/黑名单支持
- 快速处理
**使用场景:**
- URL去重
- 结果过滤
- 数据清理
- 工具链集成
parameters:
- name: "urls"
type: "string"
description: "要过滤的URL(每行一个)"
required: true
- name: "whitelist"
type: "string"
description: "白名单模式"
required: false
- name: "blacklist"
type: "string"
description: "黑名单模式"
required: false
+43
View File
@@ -0,0 +1,43 @@
name: "volatility"
command: "volatility"
enabled: true
short_description: "内存取证分析工具"
description: |
Volatility是一个内存取证框架,用于从内存转储中提取数字证据。
**主要功能:**
- 内存转储分析
- 进程列表提取
- 网络连接分析
- 文件系统重建
**使用场景:**
- 内存取证
- 恶意软件分析
- 事件响应
- 数字取证
parameters:
- name: "memory_file"
type: "string"
description: "内存转储文件路径"
required: true
flag: "-f"
format: "flag"
- name: "plugin"
type: "string"
description: "要使用的Volatility插件"
required: true
position: 0
format: "positional"
- name: "profile"
type: "string"
description: "内存配置文件"
required: false
flag: "--profile"
format: "flag"
+43
View File
@@ -0,0 +1,43 @@
name: "volatility3"
command: "volatility"
enabled: true
short_description: "Volatility3内存取证分析工具"
description: |
Volatility3是Volatility框架的下一代版本,用于内存取证分析。
**主要功能:**
- 内存转储分析
- 高级插件系统
- 改进的性能
- 更好的文档
**使用场景:**
- 内存取证
- 恶意软件分析
- 事件响应
- 数字取证
parameters:
- name: "memory_file"
type: "string"
description: "内存转储文件路径"
required: true
flag: "-f"
format: "flag"
- name: "plugin"
type: "string"
description: "要执行的Volatility3插件"
required: true
position: 0
format: "positional"
- name: "output_file"
type: "string"
description: "输出文件路径"
required: false
flag: "-o"
format: "flag"
+29
View File
@@ -0,0 +1,29 @@
name: "wafw00f"
command: "wafw00f"
enabled: true
short_description: "WAF识别和指纹识别工具"
description: |
Wafw00f是一个Web应用防火墙(WAF)识别和指纹识别工具。
**主要功能:**
- WAF检测
- WAF指纹识别
- 多种WAF支持
- 绕过技术检测
**使用场景:**
- WAF识别
- 安全测试
- 渗透测试
- 安全评估
parameters:
- name: "target"
type: "string"
description: "目标URL或IP"
required: true
position: 0
format: "positional"
+44
View File
@@ -0,0 +1,44 @@
name: "waybackurls"
command: "waybackurls"
enabled: true
short_description: "从Wayback Machine获取历史URL"
description: |
Waybackurls从Wayback Machine获取目标域名的历史URL。
**主要功能:**
- 历史URL发现
- 版本获取
- 子域名支持
**使用场景:**
- 历史URL收集
- Bug bounty侦察
- 安全测试
- 内容发现
parameters:
- name: "domain"
type: "string"
description: "目标域名"
required: true
position: 0
format: "positional"
- name: "get_versions"
type: "bool"
description: "获取所有版本的URL"
required: false
flag: "-get-versions"
format: "flag"
default: false
- name: "no_subs"
type: "bool"
description: "不包含子域名"
required: false
flag: "-no-subs"
format: "flag"
default: false
+36
View File
@@ -0,0 +1,36 @@
name: "wfuzz"
command: "wfuzz"
enabled: true
short_description: "Web应用模糊测试工具"
description: |
Wfuzz是一个Web应用模糊测试工具,用于发现Web应用中的漏洞。
**主要功能:**
- Web应用模糊测试
- 参数发现
- 目录发现
- 多种过滤器
**使用场景:**
- Web应用安全测试
- 参数模糊测试
- 目录枚举
- 漏洞发现
parameters:
- name: "url"
type: "string"
description: "目标URL(使用FUZZ作为占位符)"
required: true
flag: "-u"
format: "flag"
- name: "wordlist"
type: "string"
description: "字典文件路径"
required: false
flag: "-w"
format: "flag"
+35
View File
@@ -0,0 +1,35 @@
name: "wpscan"
command: "wpscan"
enabled: true
short_description: "WordPress安全扫描器,用于检测WordPress漏洞"
description: |
WPScan是专门用于WordPress安全扫描的工具,可以检测主题、插件和核心漏洞。
**主要功能:**
- WordPress核心漏洞检测
- 主题和插件漏洞扫描
- 用户枚举
- 密码暴力破解
- 安全配置检查
**使用场景:**
- WordPress安全评估
- 漏洞扫描
- 渗透测试
- 安全审计
parameters:
- name: "url"
type: "string"
description: "WordPress站点URL"
required: true
flag: "--url"
format: "flag"
- name: "additional_args"
type: "string"
description: "额外的WPScan参数"
required: false
+59
View File
@@ -0,0 +1,59 @@
name: "x8"
command: "x8"
enabled: true
short_description: "隐藏参数发现工具"
description: |
X8是一个用于发现Web应用中隐藏参数的工具。
**主要功能:**
- 隐藏参数发现
- 多种HTTP方法支持
- 自定义字典
- 快速扫描
**使用场景:**
- 参数发现
- Web应用安全测试
- Bug bounty侦察
- 安全测试
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
flag: "--url"
format: "flag"
- name: "wordlist"
type: "string"
description: "参数字典"
required: false
flag: "--wordlist"
format: "flag"
default: "/usr/share/wordlists/x8/params.txt"
- name: "method"
type: "string"
description: "HTTP方法"
required: false
flag: "--method"
format: "flag"
default: "GET"
- name: "body"
type: "string"
description: "请求体"
required: false
flag: "--body"
format: "flag"
- name: "headers"
type: "string"
description: "自定义请求头"
required: false
flag: "--headers"
format: "flag"
+36
View File
@@ -0,0 +1,36 @@
name: "xsser"
command: "xsser"
enabled: true
short_description: "XSS漏洞测试工具"
description: |
XSSer是一个自动化XSS漏洞测试工具。
**主要功能:**
- XSS漏洞检测
- 多种XSS技术
- 自动化测试
- 报告生成
**使用场景:**
- XSS漏洞测试
- Web应用安全测试
- 渗透测试
- 漏洞验证
parameters:
- name: "url"
type: "string"
description: "目标URL"
required: true
flag: "--url"
format: "flag"
- name: "params"
type: "string"
description: "要测试的参数"
required: false
flag: "--Fp"
format: "flag"
+44
View File
@@ -0,0 +1,44 @@
name: "xxd"
command: "xxd"
enabled: true
short_description: "十六进制转储工具"
description: |
Xxd是一个十六进制转储工具,用于以十六进制格式显示文件内容。
**主要功能:**
- 十六进制转储
- 可配置偏移和长度
- 反向转换
- 多种输出格式
**使用场景:**
- 二进制分析
- 文件检查
- 数据提取
- 取证分析
parameters:
- name: "file_path"
type: "string"
description: "要转储的文件路径"
required: true
position: 0
format: "positional"
- name: "offset"
type: "string"
description: "开始读取的偏移量"
required: false
flag: "-s"
format: "flag"
default: "0"
- name: "length"
type: "string"
description: "要读取的字节数"
required: false
flag: "-l"
format: "flag"
+75
View File
@@ -0,0 +1,75 @@
name: "zap"
command: "zap-cli"
enabled: true
short_description: "OWASP ZAP Web应用安全扫描器"
description: |
OWASP ZAP是一个Web应用安全扫描器,用于发现Web应用中的安全漏洞。
**主要功能:**
- Web应用安全扫描
- 主动和被动扫描
- API测试
- 详细报告
**使用场景:**
- Web应用安全测试
- 漏洞扫描
- 安全评估
- 渗透测试
parameters:
- name: "target"
type: "string"
description: "目标URL"
required: true
flag: "-t"
format: "flag"
- name: "scan_type"
type: "string"
description: "扫描类型(baseline, full, api"
required: false
flag: "--scan-type"
format: "flag"
default: "baseline"
- name: "api_key"
type: "string"
description: "ZAP API密钥"
required: false
flag: "--api-key"
format: "flag"
- name: "daemon"
type: "bool"
description: "以守护进程模式运行"
required: false
flag: "--daemon"
format: "flag"
default: false
- name: "port"
type: "string"
description: "ZAP守护进程端口"
required: false
flag: "--port"
format: "flag"
default: "8090"
- name: "format_type"
type: "string"
description: "输出格式(xml, json, html"
required: false
flag: "--format"
format: "flag"
default: "xml"
- name: "output_file"
type: "string"
description: "输出文件路径"
required: false
flag: "--output"
format: "flag"