💡 Output is streaming in real-time. Click Cancel to stop the command.
⛓️ Attack Chain Analysis
Correlated vulnerabilities and potential attack paths
⛓️
No attack chains detected yet.
Complete reconnaissance and vulnerability scanning to identify potential attack paths.
🗺️ Network Map
Discovered hosts with OS detection
🗺️
No hosts discovered yet
Run a network range scan to discover hosts
Scanning network...
Currently scanning:
Discovered Hosts ()
☠️ Command & Control Post-Exploitation Framework
Active Listeners
📡
No listeners configured
Create a listener to receive agent callbacks
Connected Agents ( active)
🤖
No agents connected
Deploy a payload to establish agent connections
Payload Generator
Quick Payloads
Task Queue
📋
No tasks in queue
Interact with an agent to queue tasks
📋 Scan History ( scans)
📋
No scan history yet
Run scans from the Phase Tools or Terminal to see them here
🔐 Credentials ( total)
📁
No Project Selected
Create or select a project to manage credentials
🔑
No credentials captured yet
Add credentials manually or capture them during attacks
| Username | Password/Hash | Domain | Host | Service | Source | Actions |
|---|---|---|---|---|---|---|
📝 Project Notes ( notes)
📁
No Project Selected
Create or select a project to take notes
📝
No notes yet
Add notes to document your findings and observations
🚩 CTF Agent AI-Powered Capture The Flag Assistant
🎯 Challenge Context
⚡ Quick Prompts
🚩
CTF Agent Ready
I'm your AI-powered CTF assistant. Set your challenge context on the left, then ask me anything about solving CTF challenges!