From aa64383530a5d27c7aa43cca363609d94c7ea941 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Wed, 3 Dec 2025 13:49:56 +0000 Subject: [PATCH] Install complete Kali Linux tool suite (600+ tools) via kali-linux-everything Co-authored-by: mblanke <9078342+mblanke@users.noreply.github.com> --- INSTALL.md | 36 +++++++++++++++++++-- README.md | 18 ++++++++--- services/kali-executor/app/main.py | 50 ++++++++++++++++++++++++------ services/kali/Dockerfile | 37 ++-------------------- 4 files changed, 90 insertions(+), 51 deletions(-) diff --git a/INSTALL.md b/INSTALL.md index fd40a03..0bf5370 100644 --- a/INSTALL.md +++ b/INSTALL.md @@ -18,13 +18,15 @@ This guide walks you through installing and setting up the new features added to ### Required - **Docker & Docker Compose** - Already installed if you're using StrikePackageGPT - **Python 3.12+** - Included in the containers -- **8GB+ RAM** - For running the services +- **16GB+ RAM** - Recommended for running services + full Kali tools (8GB minimum) +- **20GB+ Disk Space** - For complete Kali Linux tool suite (kali-linux-everything) ### Optional (for enhanced features) - **Node.js & npm** - Only if you want to build React components from source - **NVIDIA GPU** - For faster local Whisper transcription - **OpenAI API Key** - For cloud-based voice and LLM features - **Anthropic API Key** - For Claude LLM support +- **Physical WiFi Adapter** - For wireless penetration testing (requires USB passthrough) --- @@ -36,11 +38,13 @@ This gets you running with **all backend features** and **basic frontend** (no b ```bash cd /path/to/StrikePackageGPT -docker-compose up -d +docker-compose up -d --build ``` This starts all services including the new API endpoints. +**Note:** First-time build will take 20-30 minutes as it installs the complete Kali Linux tool suite (600+ tools, ~10GB download). Subsequent starts are instant. + ### Step 2: Verify Installation ```bash @@ -78,7 +82,33 @@ http://localhost:8080/static/unknown.svg http://localhost:8080 ``` -**That's it for basic setup!** All backend features are now available via API endpoints. +### Step 5: Access All Kali Tools + +The Kali container now includes **ALL 600+ Kali Linux tools** via the `kali-linux-everything` metapackage: + +```bash +# Access the Kali container +docker exec -it strikepackage-kali bash + +# Available tools include: +# - Reconnaissance: nmap, masscan, recon-ng, maltego, amass +# - Web Testing: burpsuite, zaproxy, sqlmap, nikto, wpscan +# - Wireless: aircrack-ng, wifite, reaver, kismet +# - Password Attacks: john, hashcat, hydra, medusa +# - Exploitation: metasploit, searchsploit, armitage +# - Post-Exploitation: mimikatz, bloodhound, crackmapexec +# - Forensics: autopsy, volatility, sleuthkit +# - Reverse Engineering: ghidra, radare2, gdb +# - And 500+ more tools! + +# Example: Run aircrack-ng +aircrack-ng --help + +# Example: Use wifite +wifite --help +``` + +**That's it for basic setup!** All backend features and 600+ Kali tools are now available. --- diff --git a/README.md b/README.md index fab26c1..e9e502d 100644 --- a/README.md +++ b/README.md @@ -64,12 +64,20 @@ StrikePackageGPT provides security researchers and penetration testers with an A ## 🛠️ Security Tools -The Kali container includes: +The Kali container includes **ALL Kali Linux tools** via the `kali-linux-everything` metapackage: -- **Reconnaissance**: nmap, masscan, amass, theHarvester, whatweb -- **Web Testing**: nikto, gobuster, dirb, sqlmap -- **Exploitation**: metasploit-framework, hydra, searchsploit -- **Network**: tcpdump, netcat, wireshark +- **600+ Security Tools**: Complete Kali Linux arsenal +- **Reconnaissance**: nmap, masscan, amass, theHarvester, whatweb, recon-ng, maltego +- **Web Testing**: nikto, gobuster, dirb, sqlmap, burpsuite, zaproxy, wpscan +- **Exploitation**: metasploit-framework, exploit-db, searchsploit, armitage +- **Password Attacks**: hydra, john, hashcat, medusa, ncrack +- **Wireless**: aircrack-ng, wifite, reaver, bully, kismet, fern-wifi-cracker +- **Sniffing/Spoofing**: wireshark, tcpdump, ettercap, bettercap, responder +- **Post-Exploitation**: mimikatz, powersploit, empire, covenant +- **Forensics**: autopsy, volatility, sleuthkit, foremost +- **Reverse Engineering**: ghidra, radare2, gdb, ollydbg, ida-free +- **Social Engineering**: set (Social Engineering Toolkit) +- **And hundreds more...** Access the Kali container: ```bash diff --git a/services/kali-executor/app/main.py b/services/kali-executor/app/main.py index deae3da..035d004 100644 --- a/services/kali-executor/app/main.py +++ b/services/kali-executor/app/main.py @@ -17,23 +17,55 @@ from datetime import datetime from contextlib import asynccontextmanager # Allowed command prefixes (security whitelist) +# Expanded to support all Kali tools ALLOWED_COMMANDS = { # Reconnaissance "nmap", "masscan", "amass", "theharvester", "whatweb", "dnsrecon", "fierce", - "dig", "nslookup", "host", "whois", + "dig", "nslookup", "host", "whois", "recon-ng", "maltego", "dmitry", "dnsenum", + "enum4linux", "nbtscan", "onesixtyone", "smbclient", "snmp-check", "wafw00f", # Web testing - "nikto", "gobuster", "dirb", "sqlmap", "wpscan", "curl", "wget", + "nikto", "gobuster", "dirb", "sqlmap", "wpscan", "curl", "wget", "burpsuite", + "zaproxy", "zap-cli", "wfuzz", "ffuf", "dirbuster", "cadaver", "davtest", + "skipfish", "uniscan", "whatweb", "wapiti", "commix", "joomscan", "droopescan", + # Wireless + "aircrack-ng", "airodump-ng", "aireplay-ng", "airmon-ng", "airbase-ng", + "wifite", "reaver", "bully", "kismet", "fern-wifi-cracker", "wash", "cowpatty", + "mdk3", "mdk4", "pixiewps", "wifiphisher", "eaphammer", "hostapd-wpe", + # Password attacks + "hydra", "medusa", "john", "hashcat", "ncrack", "patator", "ophcrack", + "crunch", "cewl", "rsmangler", "hashid", "hash-identifier", # Network utilities - "ping", "traceroute", "netcat", "nc", "tcpdump", - # Exploitation research - "searchsploit", "msfconsole", "msfvenom", - # Brute force - "hydra", "medusa", + "ping", "traceroute", "netcat", "nc", "tcpdump", "wireshark", "tshark", + "ettercap", "bettercap", "responder", "arpspoof", "dnsspoof", "macchanger", + "hping3", "arping", "fping", "masscan-web", "unicornscan", + # Exploitation + "searchsploit", "msfconsole", "msfvenom", "exploit", "armitage", + "beef-xss", "set", "setoolkit", "backdoor-factory", "shellnoob", + "commix", "routersploit", "linux-exploit-suggester", + # Post-exploitation + "mimikatz", "powersploit", "empire", "covenant", "crackmapexec", "cme", + "impacket-smbserver", "impacket-psexec", "evil-winrm", "bloodhound", + "sharphound", "powershell", "pwsh", + # Forensics + "autopsy", "volatility", "sleuthkit", "foremost", "binwalk", "bulk-extractor", + "scalpel", "dc3dd", "guymager", "chkrootkit", "rkhunter", + # Reverse engineering + "ghidra", "radare2", "r2", "gdb", "objdump", "strings", "ltrace", "strace", + "hexdump", "xxd", "file", "readelf", "checksec", "pwntools", + # Sniffing + "dsniff", "tcpflow", "tcpreplay", "tcpick", "ngrep", "p0f", "ssldump", # System info "ls", "cat", "head", "tail", "grep", "find", "pwd", "whoami", "id", - "uname", "hostname", "ip", "ifconfig", "netstat", "ss", + "uname", "hostname", "ip", "ifconfig", "netstat", "ss", "route", + # Analysis tools + "exiftool", "pdfid", "pdf-parser", "peepdf", "oletools", "olevba", + # VPN/Tunneling + "openvpn", "ssh", "sshuttle", "proxychains", "tor", "socat", + # Misc security tools + "openssl", "gpg", "steghide", "outguess", "covert", "stegosuite", + "yersinia", "responder", "chisel", "ligolo", "sliver", # Python scripts - "python", "python3", + "python", "python3", "python2", } # Blocked patterns (dangerous commands) diff --git a/services/kali/Dockerfile b/services/kali/Dockerfile index ff965f5..5b5cd80 100644 --- a/services/kali/Dockerfile +++ b/services/kali/Dockerfile @@ -3,41 +3,10 @@ FROM kalilinux/kali-rolling # Avoid prompts during package installation ENV DEBIAN_FRONTEND=noninteractive -# Update and install essential security tools +# Update and install ALL Kali tools +# Using kali-linux-everything metapackage for complete tool suite RUN apt-get update && apt-get install -y --no-install-recommends \ - # Core utilities - curl \ - wget \ - git \ - vim \ - net-tools \ - iputils-ping \ - dnsutils \ - # Reconnaissance tools - nmap \ - masscan \ - amass \ - theharvester \ - whatweb \ - dnsrecon \ - fierce \ - # Web testing tools - nikto \ - gobuster \ - dirb \ - sqlmap \ - # Network tools - netcat-openbsd \ - tcpdump \ - wireshark-common \ - hydra \ - # Exploitation - metasploit-framework \ - exploitdb \ - # Scripting - python3 \ - python3-pip \ - python3-venv \ + kali-linux-everything \ && apt-get clean \ && rm -rf /var/lib/apt/lists/*