mirror of
https://github.com/0x4m4/hexstrike-ai.git
synced 2026-02-10 14:03:03 +00:00
102 lines
3.8 KiB
JSON
102 lines
3.8 KiB
JSON
{
|
|
"vulnerability_intelligence": {
|
|
"enabled": true,
|
|
"description": "Advanced vulnerability intelligence and exploit generation system",
|
|
"version": "6.0",
|
|
"features": {
|
|
"cve_monitoring": {
|
|
"enabled": true,
|
|
"default_hours": 24,
|
|
"default_severity": "HIGH,CRITICAL",
|
|
"max_results": 100,
|
|
"cache_ttl": 3600
|
|
},
|
|
"exploit_generation": {
|
|
"enabled": true,
|
|
"supported_types": ["poc", "weaponized", "stealth"],
|
|
"supported_architectures": ["x86", "x64", "arm"],
|
|
"supported_os": ["windows", "linux", "macos"],
|
|
"evasion_levels": ["none", "basic", "advanced"]
|
|
},
|
|
"attack_chains": {
|
|
"enabled": true,
|
|
"max_depth": 5,
|
|
"default_depth": 3,
|
|
"include_zero_days": false
|
|
},
|
|
"threat_intelligence": {
|
|
"enabled": true,
|
|
"supported_sources": ["cve", "exploit-db", "github", "twitter"],
|
|
"timeframes": ["7d", "30d", "90d", "1y"],
|
|
"max_indicators": 50
|
|
},
|
|
"advanced_payloads": {
|
|
"enabled": true,
|
|
"attack_types": ["rce", "privilege_escalation", "persistence", "exfiltration", "xss", "sqli", "lfi", "ssrf"],
|
|
"evasion_levels": ["basic", "standard", "advanced", "nation-state"],
|
|
"max_payload_size": 10240
|
|
},
|
|
"zero_day_research": {
|
|
"enabled": true,
|
|
"analysis_depths": ["quick", "standard", "comprehensive"],
|
|
"max_vulnerabilities": 10
|
|
}
|
|
},
|
|
"api_endpoints": {
|
|
"cve_monitor": "/api/vuln-intel/cve-monitor",
|
|
"exploit_generate": "/api/vuln-intel/exploit-generate",
|
|
"attack_chains": "/api/vuln-intel/attack-chains",
|
|
"threat_feeds": "/api/vuln-intel/threat-feeds",
|
|
"zero_day_research": "/api/vuln-intel/zero-day-research",
|
|
"advanced_payloads": "/api/ai/advanced-payload-generation"
|
|
},
|
|
"rate_limits": {
|
|
"cve_monitor": "10/hour",
|
|
"exploit_generate": "5/hour",
|
|
"attack_chains": "3/hour",
|
|
"threat_feeds": "20/hour",
|
|
"zero_day_research": "2/hour",
|
|
"advanced_payloads": "15/hour"
|
|
},
|
|
"security": {
|
|
"require_authentication": false,
|
|
"log_all_requests": true,
|
|
"sanitize_outputs": true,
|
|
"disclaimer_required": true
|
|
}
|
|
},
|
|
"mcp_tools": {
|
|
"monitor_cve_feeds": {
|
|
"description": "Monitor CVE databases for new vulnerabilities with AI analysis",
|
|
"parameters": ["hours", "severity_filter", "keywords"]
|
|
},
|
|
"generate_exploit_from_cve": {
|
|
"description": "Generate working exploits from CVE information using AI",
|
|
"parameters": ["cve_id", "target_os", "target_arch", "exploit_type", "evasion_level"]
|
|
},
|
|
"discover_attack_chains": {
|
|
"description": "Discover multi-stage attack chains with vulnerability correlation",
|
|
"parameters": ["target_software", "attack_depth", "include_zero_days"]
|
|
},
|
|
"research_zero_day_opportunities": {
|
|
"description": "Automated zero-day vulnerability research using AI analysis",
|
|
"parameters": ["target_software", "analysis_depth", "source_code_url"]
|
|
},
|
|
"correlate_threat_intelligence": {
|
|
"description": "Correlate threat intelligence across multiple sources",
|
|
"parameters": ["indicators", "timeframe", "sources"]
|
|
},
|
|
"advanced_payload_generation": {
|
|
"description": "Generate advanced payloads with AI-powered evasion techniques",
|
|
"parameters": ["attack_type", "target_context", "evasion_level", "custom_constraints"]
|
|
},
|
|
"vulnerability_intelligence_dashboard": {
|
|
"description": "Get comprehensive vulnerability intelligence dashboard",
|
|
"parameters": []
|
|
},
|
|
"threat_hunting_assistant": {
|
|
"description": "AI-powered threat hunting assistant with vulnerability correlation",
|
|
"parameters": ["target_environment", "threat_indicators", "hunt_focus"]
|
|
}
|
|
}
|
|
} |