2025-12-02 16:29:41 -05:00

StrikePackageGPT

AI-powered security analysis platform combining LLM capabilities with professional penetration testing tools.

License Python Docker

🎯 Overview

StrikePackageGPT provides security researchers and penetration testers with an AI assistant specialized in:

  • Reconnaissance - OSINT, subdomain enumeration, port scanning strategies
  • Vulnerability Analysis - CVE research, misconfiguration detection
  • Exploit Research - Safe research and documentation of exploits
  • Report Generation - Professional security assessment reports
  • 🆕 Bidirectional Command Capture - Run commands in CLI, see results in dashboard

🚀 Quick Start

Prerequisites

  • Docker & Docker Compose
  • 8GB+ RAM recommended (for local LLM)
  • (Optional) OpenAI or Anthropic API key

Installation

  1. Clone the repository

    git clone https://github.com/mblanke/StrikePackageGPT.git
    cd StrikePackageGPT
    
  2. Configure environment (optional)

    cp .env.example .env
    # Edit .env to add API keys if using cloud LLMs
    
  3. Start the services

    docker-compose up -d
    
  4. Pull a local model (first time only)

    docker exec -it strikepackage-ollama ollama pull llama3.2
    
  5. Access the dashboard

    Open http://localhost:8080 in your browser

📦 Services

Service Port Description
Dashboard 8080 Web UI with Chat, Terminal, and Scans tabs
HackGPT API 8001 Security-focused API with scan management
Kali Executor 8002 Docker SDK command execution
LLM Router 8000 Multi-provider LLM gateway
Ollama 11434 Local LLM inference
Kali - Security tools container

🛠️ Security Tools

The Kali container includes ALL Kali Linux tools via the kali-linux-everything metapackage:

  • 600+ Security Tools: Complete Kali Linux arsenal
  • Reconnaissance: nmap, masscan, amass, theHarvester, whatweb, recon-ng, maltego
  • Web Testing: nikto, gobuster, dirb, sqlmap, burpsuite, zaproxy, wpscan
  • Exploitation: metasploit-framework, exploit-db, searchsploit, armitage
  • Password Attacks: hydra, john, hashcat, medusa, ncrack
  • Wireless: aircrack-ng, wifite, reaver, bully, kismet, fern-wifi-cracker
  • Sniffing/Spoofing: wireshark, tcpdump, ettercap, bettercap, responder
  • Post-Exploitation: mimikatz, powersploit, empire, covenant
  • Forensics: autopsy, volatility, sleuthkit, foremost
  • Reverse Engineering: ghidra, radare2, gdb, ollydbg, ida-free
  • Social Engineering: set (Social Engineering Toolkit)
  • And hundreds more...

Access the Kali container:

docker exec -it strikepackage-kali bash

🔄 Bidirectional Command Capture

New Feature! Commands run directly in the Kali container are now automatically captured and visible in the dashboard:

# Connect to container
docker exec -it strikepackage-kali bash

# Run commands normally - they're automatically logged
nmap -sV 192.168.1.0/24

# Use 'capture' for full output capture
capture sqlmap -u "http://example.com?id=1" --batch

# View recent commands
recent

# All commands appear in dashboard history! 🎉

Benefits:

  • Use CLI for speed, GUI for visualization
  • Perfect for advanced users who prefer terminal
  • Unified history across all command sources
  • Network map includes manually-run scans
  • Complete audit trail for reporting

See BIDIRECTIONAL_CAPTURE.md for full documentation.

🤖 LLM Providers

StrikePackageGPT supports multiple LLM providers:

Provider Models API Key Required
Ollama llama3.2, codellama, mistral No (local)
OpenAI gpt-4o, gpt-4o-mini Yes
Anthropic claude-sonnet-4-20250514, claude-3-5-haiku Yes

📖 Usage Examples

Chat with the AI

Ask security-related questions in natural language:

  • "Explain how to use nmap for service detection"
  • "What are common web application vulnerabilities?"
  • "How do I enumerate subdomains for a target?"

Terminal Access

Execute commands directly in the Kali container from the Terminal tab:

  • Real-time command output
  • Command history with up/down arrows
  • Whitelisted tools for security

Security Scans

Launch and monitor scans from the Scans tab:

  • nmap - Port scanning and service detection
  • nikto - Web server vulnerability scanning
  • gobuster - Directory and DNS enumeration
  • sqlmap - SQL injection testing
  • whatweb - Web technology fingerprinting

Quick Analysis

Use the sidebar buttons to start guided analysis:

  • 🔍 Reconnaissance - Plan your information gathering
  • 🛡️ Vulnerability Scan - Assess potential weaknesses
  • 💉 Exploit Research - Research known vulnerabilities
  • 📄 Generate Report - Create professional documentation

This tool is intended for authorized security testing only. Always:

  • Obtain written permission before testing any systems
  • Follow responsible disclosure practices
  • Comply with all applicable laws and regulations
  • Use in isolated lab environments when learning

The developers are not responsible for misuse of this software.

🔧 Development

See Claude.md for development guidelines.

# Rebuild after changes
docker-compose up -d --build

# View logs
docker-compose logs -f

# Stop all services
docker-compose down

📄 License

MIT License - See LICENSE for details.

🤝 Contributing

Contributions welcome! Please read the development guidelines in Claude.md before submitting PRs.

Description
No description provided
Readme 328 KiB
Languages
Python 45.4%
HTML 38.4%
PowerShell 8.2%
Shell 7.1%
Dockerfile 0.9%