mirror of
https://github.com/mblanke/StrikePackageGPT.git
synced 2026-03-01 14:20:21 -05:00
Install complete Kali Linux tool suite (600+ tools) via kali-linux-everything
Co-authored-by: mblanke <9078342+mblanke@users.noreply.github.com>
This commit is contained in:
36
INSTALL.md
36
INSTALL.md
@@ -18,13 +18,15 @@ This guide walks you through installing and setting up the new features added to
|
|||||||
### Required
|
### Required
|
||||||
- **Docker & Docker Compose** - Already installed if you're using StrikePackageGPT
|
- **Docker & Docker Compose** - Already installed if you're using StrikePackageGPT
|
||||||
- **Python 3.12+** - Included in the containers
|
- **Python 3.12+** - Included in the containers
|
||||||
- **8GB+ RAM** - For running the services
|
- **16GB+ RAM** - Recommended for running services + full Kali tools (8GB minimum)
|
||||||
|
- **20GB+ Disk Space** - For complete Kali Linux tool suite (kali-linux-everything)
|
||||||
|
|
||||||
### Optional (for enhanced features)
|
### Optional (for enhanced features)
|
||||||
- **Node.js & npm** - Only if you want to build React components from source
|
- **Node.js & npm** - Only if you want to build React components from source
|
||||||
- **NVIDIA GPU** - For faster local Whisper transcription
|
- **NVIDIA GPU** - For faster local Whisper transcription
|
||||||
- **OpenAI API Key** - For cloud-based voice and LLM features
|
- **OpenAI API Key** - For cloud-based voice and LLM features
|
||||||
- **Anthropic API Key** - For Claude LLM support
|
- **Anthropic API Key** - For Claude LLM support
|
||||||
|
- **Physical WiFi Adapter** - For wireless penetration testing (requires USB passthrough)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -36,11 +38,13 @@ This gets you running with **all backend features** and **basic frontend** (no b
|
|||||||
|
|
||||||
```bash
|
```bash
|
||||||
cd /path/to/StrikePackageGPT
|
cd /path/to/StrikePackageGPT
|
||||||
docker-compose up -d
|
docker-compose up -d --build
|
||||||
```
|
```
|
||||||
|
|
||||||
This starts all services including the new API endpoints.
|
This starts all services including the new API endpoints.
|
||||||
|
|
||||||
|
**Note:** First-time build will take 20-30 minutes as it installs the complete Kali Linux tool suite (600+ tools, ~10GB download). Subsequent starts are instant.
|
||||||
|
|
||||||
### Step 2: Verify Installation
|
### Step 2: Verify Installation
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
@@ -78,7 +82,33 @@ http://localhost:8080/static/unknown.svg
|
|||||||
http://localhost:8080
|
http://localhost:8080
|
||||||
```
|
```
|
||||||
|
|
||||||
**That's it for basic setup!** All backend features are now available via API endpoints.
|
### Step 5: Access All Kali Tools
|
||||||
|
|
||||||
|
The Kali container now includes **ALL 600+ Kali Linux tools** via the `kali-linux-everything` metapackage:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Access the Kali container
|
||||||
|
docker exec -it strikepackage-kali bash
|
||||||
|
|
||||||
|
# Available tools include:
|
||||||
|
# - Reconnaissance: nmap, masscan, recon-ng, maltego, amass
|
||||||
|
# - Web Testing: burpsuite, zaproxy, sqlmap, nikto, wpscan
|
||||||
|
# - Wireless: aircrack-ng, wifite, reaver, kismet
|
||||||
|
# - Password Attacks: john, hashcat, hydra, medusa
|
||||||
|
# - Exploitation: metasploit, searchsploit, armitage
|
||||||
|
# - Post-Exploitation: mimikatz, bloodhound, crackmapexec
|
||||||
|
# - Forensics: autopsy, volatility, sleuthkit
|
||||||
|
# - Reverse Engineering: ghidra, radare2, gdb
|
||||||
|
# - And 500+ more tools!
|
||||||
|
|
||||||
|
# Example: Run aircrack-ng
|
||||||
|
aircrack-ng --help
|
||||||
|
|
||||||
|
# Example: Use wifite
|
||||||
|
wifite --help
|
||||||
|
```
|
||||||
|
|
||||||
|
**That's it for basic setup!** All backend features and 600+ Kali tools are now available.
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
18
README.md
18
README.md
@@ -64,12 +64,20 @@ StrikePackageGPT provides security researchers and penetration testers with an A
|
|||||||
|
|
||||||
## 🛠️ Security Tools
|
## 🛠️ Security Tools
|
||||||
|
|
||||||
The Kali container includes:
|
The Kali container includes **ALL Kali Linux tools** via the `kali-linux-everything` metapackage:
|
||||||
|
|
||||||
- **Reconnaissance**: nmap, masscan, amass, theHarvester, whatweb
|
- **600+ Security Tools**: Complete Kali Linux arsenal
|
||||||
- **Web Testing**: nikto, gobuster, dirb, sqlmap
|
- **Reconnaissance**: nmap, masscan, amass, theHarvester, whatweb, recon-ng, maltego
|
||||||
- **Exploitation**: metasploit-framework, hydra, searchsploit
|
- **Web Testing**: nikto, gobuster, dirb, sqlmap, burpsuite, zaproxy, wpscan
|
||||||
- **Network**: tcpdump, netcat, wireshark
|
- **Exploitation**: metasploit-framework, exploit-db, searchsploit, armitage
|
||||||
|
- **Password Attacks**: hydra, john, hashcat, medusa, ncrack
|
||||||
|
- **Wireless**: aircrack-ng, wifite, reaver, bully, kismet, fern-wifi-cracker
|
||||||
|
- **Sniffing/Spoofing**: wireshark, tcpdump, ettercap, bettercap, responder
|
||||||
|
- **Post-Exploitation**: mimikatz, powersploit, empire, covenant
|
||||||
|
- **Forensics**: autopsy, volatility, sleuthkit, foremost
|
||||||
|
- **Reverse Engineering**: ghidra, radare2, gdb, ollydbg, ida-free
|
||||||
|
- **Social Engineering**: set (Social Engineering Toolkit)
|
||||||
|
- **And hundreds more...**
|
||||||
|
|
||||||
Access the Kali container:
|
Access the Kali container:
|
||||||
```bash
|
```bash
|
||||||
|
|||||||
@@ -17,23 +17,55 @@ from datetime import datetime
|
|||||||
from contextlib import asynccontextmanager
|
from contextlib import asynccontextmanager
|
||||||
|
|
||||||
# Allowed command prefixes (security whitelist)
|
# Allowed command prefixes (security whitelist)
|
||||||
|
# Expanded to support all Kali tools
|
||||||
ALLOWED_COMMANDS = {
|
ALLOWED_COMMANDS = {
|
||||||
# Reconnaissance
|
# Reconnaissance
|
||||||
"nmap", "masscan", "amass", "theharvester", "whatweb", "dnsrecon", "fierce",
|
"nmap", "masscan", "amass", "theharvester", "whatweb", "dnsrecon", "fierce",
|
||||||
"dig", "nslookup", "host", "whois",
|
"dig", "nslookup", "host", "whois", "recon-ng", "maltego", "dmitry", "dnsenum",
|
||||||
|
"enum4linux", "nbtscan", "onesixtyone", "smbclient", "snmp-check", "wafw00f",
|
||||||
# Web testing
|
# Web testing
|
||||||
"nikto", "gobuster", "dirb", "sqlmap", "wpscan", "curl", "wget",
|
"nikto", "gobuster", "dirb", "sqlmap", "wpscan", "curl", "wget", "burpsuite",
|
||||||
|
"zaproxy", "zap-cli", "wfuzz", "ffuf", "dirbuster", "cadaver", "davtest",
|
||||||
|
"skipfish", "uniscan", "whatweb", "wapiti", "commix", "joomscan", "droopescan",
|
||||||
|
# Wireless
|
||||||
|
"aircrack-ng", "airodump-ng", "aireplay-ng", "airmon-ng", "airbase-ng",
|
||||||
|
"wifite", "reaver", "bully", "kismet", "fern-wifi-cracker", "wash", "cowpatty",
|
||||||
|
"mdk3", "mdk4", "pixiewps", "wifiphisher", "eaphammer", "hostapd-wpe",
|
||||||
|
# Password attacks
|
||||||
|
"hydra", "medusa", "john", "hashcat", "ncrack", "patator", "ophcrack",
|
||||||
|
"crunch", "cewl", "rsmangler", "hashid", "hash-identifier",
|
||||||
# Network utilities
|
# Network utilities
|
||||||
"ping", "traceroute", "netcat", "nc", "tcpdump",
|
"ping", "traceroute", "netcat", "nc", "tcpdump", "wireshark", "tshark",
|
||||||
# Exploitation research
|
"ettercap", "bettercap", "responder", "arpspoof", "dnsspoof", "macchanger",
|
||||||
"searchsploit", "msfconsole", "msfvenom",
|
"hping3", "arping", "fping", "masscan-web", "unicornscan",
|
||||||
# Brute force
|
# Exploitation
|
||||||
"hydra", "medusa",
|
"searchsploit", "msfconsole", "msfvenom", "exploit", "armitage",
|
||||||
|
"beef-xss", "set", "setoolkit", "backdoor-factory", "shellnoob",
|
||||||
|
"commix", "routersploit", "linux-exploit-suggester",
|
||||||
|
# Post-exploitation
|
||||||
|
"mimikatz", "powersploit", "empire", "covenant", "crackmapexec", "cme",
|
||||||
|
"impacket-smbserver", "impacket-psexec", "evil-winrm", "bloodhound",
|
||||||
|
"sharphound", "powershell", "pwsh",
|
||||||
|
# Forensics
|
||||||
|
"autopsy", "volatility", "sleuthkit", "foremost", "binwalk", "bulk-extractor",
|
||||||
|
"scalpel", "dc3dd", "guymager", "chkrootkit", "rkhunter",
|
||||||
|
# Reverse engineering
|
||||||
|
"ghidra", "radare2", "r2", "gdb", "objdump", "strings", "ltrace", "strace",
|
||||||
|
"hexdump", "xxd", "file", "readelf", "checksec", "pwntools",
|
||||||
|
# Sniffing
|
||||||
|
"dsniff", "tcpflow", "tcpreplay", "tcpick", "ngrep", "p0f", "ssldump",
|
||||||
# System info
|
# System info
|
||||||
"ls", "cat", "head", "tail", "grep", "find", "pwd", "whoami", "id",
|
"ls", "cat", "head", "tail", "grep", "find", "pwd", "whoami", "id",
|
||||||
"uname", "hostname", "ip", "ifconfig", "netstat", "ss",
|
"uname", "hostname", "ip", "ifconfig", "netstat", "ss", "route",
|
||||||
|
# Analysis tools
|
||||||
|
"exiftool", "pdfid", "pdf-parser", "peepdf", "oletools", "olevba",
|
||||||
|
# VPN/Tunneling
|
||||||
|
"openvpn", "ssh", "sshuttle", "proxychains", "tor", "socat",
|
||||||
|
# Misc security tools
|
||||||
|
"openssl", "gpg", "steghide", "outguess", "covert", "stegosuite",
|
||||||
|
"yersinia", "responder", "chisel", "ligolo", "sliver",
|
||||||
# Python scripts
|
# Python scripts
|
||||||
"python", "python3",
|
"python", "python3", "python2",
|
||||||
}
|
}
|
||||||
|
|
||||||
# Blocked patterns (dangerous commands)
|
# Blocked patterns (dangerous commands)
|
||||||
|
|||||||
@@ -3,41 +3,10 @@ FROM kalilinux/kali-rolling
|
|||||||
# Avoid prompts during package installation
|
# Avoid prompts during package installation
|
||||||
ENV DEBIAN_FRONTEND=noninteractive
|
ENV DEBIAN_FRONTEND=noninteractive
|
||||||
|
|
||||||
# Update and install essential security tools
|
# Update and install ALL Kali tools
|
||||||
|
# Using kali-linux-everything metapackage for complete tool suite
|
||||||
RUN apt-get update && apt-get install -y --no-install-recommends \
|
RUN apt-get update && apt-get install -y --no-install-recommends \
|
||||||
# Core utilities
|
kali-linux-everything \
|
||||||
curl \
|
|
||||||
wget \
|
|
||||||
git \
|
|
||||||
vim \
|
|
||||||
net-tools \
|
|
||||||
iputils-ping \
|
|
||||||
dnsutils \
|
|
||||||
# Reconnaissance tools
|
|
||||||
nmap \
|
|
||||||
masscan \
|
|
||||||
amass \
|
|
||||||
theharvester \
|
|
||||||
whatweb \
|
|
||||||
dnsrecon \
|
|
||||||
fierce \
|
|
||||||
# Web testing tools
|
|
||||||
nikto \
|
|
||||||
gobuster \
|
|
||||||
dirb \
|
|
||||||
sqlmap \
|
|
||||||
# Network tools
|
|
||||||
netcat-openbsd \
|
|
||||||
tcpdump \
|
|
||||||
wireshark-common \
|
|
||||||
hydra \
|
|
||||||
# Exploitation
|
|
||||||
metasploit-framework \
|
|
||||||
exploitdb \
|
|
||||||
# Scripting
|
|
||||||
python3 \
|
|
||||||
python3-pip \
|
|
||||||
python3-venv \
|
|
||||||
&& apt-get clean \
|
&& apt-get clean \
|
||||||
&& rm -rf /var/lib/apt/lists/*
|
&& rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user