GooseStrike

Canadian-themed, AI-assisted offensive security toolbox for authorized testing.

GooseStrike Core (Docker-ready)

  • ๐Ÿ”ง Nmap, Metasploit, SQLMap, Hydra, ZAP
  • ๐Ÿง  AI exploit assistant (Claude, HackGPT-ready)
  • ๐Ÿ“š Offline CVE mirroring with update_cve.sh
  • ๐Ÿ—‚ ASCII banner, logo, branding kit (PDF)
  • ๐Ÿ“œ CVE scan + JSON match script
  • ๐Ÿ“ฆ goosestrike-cve-enabled.zip (download link)
  • ๐Ÿง  hackgpt-ai-stack.zip with README + architecture

Coming next (roadmap you requested)

Task Status
๐Ÿณ Build docker-compose.goosestrike-full.yml โณ In progress
๐Ÿง  HackGPT API container (linked to n8n) โณ Next up
๐ŸŒ Local CVE API server Pending
๐Ÿงฌ Claude + HackGPT fallback system Pending
๐Ÿ”„ n8n workflow .json import Pending
๐ŸŽฏ Target "prioritizer" AI agent Pending
๐Ÿงญ SVG architecture diagram Pending
๐Ÿ–ฅ Dashboard frontend (Armitage-style) Optional
๐Ÿ” C2 bridging to Mythic/Sliver Optional

Assets & Vulnerabilities

Scan History

MITRE ATT&CK Suggestions

Task Queue

Alerts

Waiting for n8n webhooks...

Queue Tool Task

Tasks land in db/tasks.db and runners pick them up.

Password Cracking Helper

Hashcat/John/Rainbow jobs reuse the password_cracker runner.