Skip to content

Update dependencies #56

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 9 commits into
base: Your-Momma-Beeotch
Choose a base branch
from
7 changes: 7 additions & 0 deletions .devcontainer/devcontainer.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
{
"tasks": {
"test": "pytest",
"build": "pip install -r requirements.txt",
"launch": "python app.py"
}
}
26 changes: 9 additions & 17 deletions Dockerfile
Original file line number Diff line number Diff line change
@@ -1,25 +1,17 @@
# Use a slim Python base image
# Use the official Python image from Docker Hub
FROM python:3.9-slim

# Set the working directory
# Set the working directory in the container to /app
WORKDIR /app

# Create a non-root user and switch to it
RUN useradd -m appuser
USER appuser

# Copy project files
# Copy the current directory contents into the container at /app
COPY . /app

# Install dependencies
RUN pip install --no-cache-dir -r requirements.txt

# Expose the Gradio default port
EXPOSE 7860
# Upgrade pip to the latest version
RUN pip install --upgrade pip

# Set environment variables for API keys
ENV OPENAI_API_KEY=${OPENAI_API_KEY}
ENV HUGGINGFACE_API_KEY=${HUGGINGFACE_API_KEY}
# Install the dependencies specified in requirements.txt
RUN pip install --no-cache-dir -r requirements.txt

# Command to start the Gradio app
CMD ["python", "src/frontend/archive_gui.py"]
# Define the command to run the application using Gunicorn
CMD ["gunicorn", "-w", "4", "-b", "0.0.0.0:8000", "app:app"]
86 changes: 86 additions & 0 deletions Wiki
Original file line number Diff line number Diff line change
Expand Up @@ -224,3 +224,89 @@ We welcome contributions to Project Red Sword. If you'd like to contribute, plea
6. **Open a Pull Request**: Open a pull request to merge your changes into the main repository. Provide a clear description of the changes you have made.

By contributing to the Project Red Sword, you help improve the framework and make it more robust and effective for the cybersecurity community.

## New Components

### Advanced Decryption
The `AdvancedDecryption` module provides advanced decryption capabilities, including encryption downgrading and decryption of encrypted data. It ensures compatibility with existing decryption logic and integrates with new components.

### Advanced Malware Analysis
The `AdvancedMalwareAnalysis` module offers advanced malware analysis capabilities, including sandboxing, reverse engineering, and behavioral analysis. It ensures compatibility with existing malware analysis logic and integrates with new components.

### Advanced Social Engineering
The `AdvancedSocialEngineering` module provides advanced social engineering capabilities, including phishing, spear phishing, and whaling attacks. It ensures compatibility with existing social engineering logic and integrates with new components.

### AI Red Teaming
The `AIRedTeaming` module offers AI-powered red teaming capabilities, simulating advanced attacks and identifying vulnerabilities. It ensures compatibility with existing red teaming logic and integrates with new components.

### Alerts and Notifications
The `AlertsNotifications` module provides alerts and notifications capabilities, including email notifications for device connections, disconnections, and other events. It ensures compatibility with existing alerts and notifications logic and integrates with new components.

### APT Simulation
The `APTSimulation` module simulates advanced persistent threats (APTs), including targeted attacks, spear phishing, and watering hole attacks. It ensures compatibility with existing APT simulation logic and integrates with new components.

### Automated Incident Response
The `AutomatedIncidentResponse` module offers automated incident response capabilities, including handling malware, phishing, and data breach incidents. It ensures compatibility with existing incident response logic and integrates with new components.

### Blockchain Logger
The `BlockchainLogger` module provides blockchain-based logging capabilities, ensuring the integrity and immutability of logs. It ensures compatibility with existing blockchain logging logic and integrates with new components.

### C2 Dashboard
The `C2Dashboard` module offers a command and control dashboard for managing and monitoring operations. It ensures compatibility with existing C2 dashboard logic and integrates with new components.

### Cloud Exploitation
The `CloudExploitation` module provides cloud exploitation capabilities, including cloud storage hacking, cloud computing hacking, and cloud security hacking. It ensures compatibility with existing cloud exploitation logic and integrates with new components.

### Custom Dashboards
The `CustomDashboards` module offers customizable dashboards for various security operations, including MITM Stingray, device fingerprinting, advanced social engineering, zero-day exploits, and more. It ensures compatibility with existing custom dashboards logic and integrates with new components.

### Dark Web Scraper
The `DarkWebScraper` module provides dark web scraping capabilities, collecting intelligence from dark web sources. It ensures compatibility with existing dark web scraper logic and integrates with new components.

### Data Exfiltration
The `DataExfiltration` module offers data exfiltration capabilities, including HTTP, FTP, and cloud exfiltration methods. It ensures compatibility with existing data exfiltration logic and integrates with new components.

### Data Visualization
The `DataVisualization` module provides data visualization capabilities, including plotting device information, network traffic, system logs, threat detection, and defcon level status. It ensures compatibility with existing data visualization logic and integrates with new components.

### Device Fingerprinting
The `DeviceFingerprinting` module offers device fingerprinting capabilities, collecting and analyzing device fingerprints. It ensures compatibility with existing device fingerprinting logic and integrates with new components.

### Exploit Payloads
The `ExploitPayloads` module provides exploit payload generation capabilities, including polymorphic, encrypted, and specific vulnerability payloads. It ensures compatibility with existing exploit payloads logic and integrates with new components.

### Fuzzing Engine
The `FuzzingEngine` module offers fuzz testing capabilities, including mutation, generation, and protocol-based fuzzing. It ensures compatibility with existing fuzzing engine logic and integrates with new components.

### IoT Exploitation
The `IoTExploitation` module provides IoT exploitation capabilities, including device hacking, network hacking, and data hacking. It ensures compatibility with existing IoT exploitation logic and integrates with new components.

### Machine Learning AI
The `MachineLearningAI` module offers machine learning and AI capabilities, including training models, making predictions, and improving the accuracy and efficiency of the framework. It ensures compatibility with existing machine learning AI logic and integrates with new components.

### MITM Stingray
The `MITMStingray` module provides MITM Stingray capabilities, including intercepting mobile device communications, collecting sensitive data, and analyzing threats using real-time threat intelligence and decryption. It ensures compatibility with existing MITM Stingray logic and integrates with new components.

### Network Exploitation
The `NetworkExploitation` module offers network exploitation capabilities, including DNS tunneling, ICMP tunneling, and TCP/IP stack exploitation. It ensures compatibility with existing network exploitation logic and integrates with new components.

### Predictive Analytics
The `PredictiveAnalytics` module provides predictive analytics capabilities, including predicting potential threats and vulnerabilities. It ensures compatibility with existing predictive analytics logic and integrates with new components.

### Real-Time Monitoring
The `RealTimeMonitoring` module offers real-time monitoring capabilities, including monitoring data exfiltration, detecting anomalies, and triggering alerts. It ensures compatibility with existing real-time monitoring logic and integrates with new components.

### Real-Time Threat Intelligence
The `RealTimeThreatIntelligence` module provides real-time threat intelligence capabilities, including fetching threat data, analyzing threats, and updating attack simulations. It ensures compatibility with existing real-time threat intelligence logic and integrates with new components.

### Threat Intelligence
The `ThreatIntelligence` module offers threat intelligence capabilities, including fetching data from multiple sources, processing data, and generating attack simulations. It ensures compatibility with existing threat intelligence logic and integrates with new components.

### Vulnerability Scanner
The `VulnerabilityScanner` module provides vulnerability scanning capabilities, including scanning targets, detecting vulnerabilities, and reporting vulnerabilities. It ensures compatibility with existing vulnerability scanner logic and integrates with new components.

### Wireless Exploitation
The `WirelessExploitation` module offers wireless exploitation capabilities, including Wi-Fi hacking, Bluetooth hacking, and RFID hacking. It ensures compatibility with existing wireless exploitation logic and integrates with new components.

### Zero-Day Exploits
The `ZeroDayExploits` module provides zero-day exploit capabilities, including identifying vulnerabilities, developing exploits, and deploying exploits. It ensures compatibility with existing zero-day exploits logic and integrates with new components.
65 changes: 64 additions & 1 deletion app.py
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,27 @@
from modules.automated_incident_response import AutomatedIncidentResponse
from modules.ai_red_teaming import AIRedTeaming
from modules.blockchain_logger import BlockchainLogger
from modules.advanced_decryption import AdvancedDecryption
from modules.advanced_malware_analysis import AdvancedMalwareAnalysis
from modules.advanced_social_engineering import AdvancedSocialEngineering
from modules.alerts_notifications import AlertsNotifications
from modules.apt_simulation import APTSimulation
from modules.c2_dashboard import C2Dashboard
from modules.cloud_exploitation import CloudExploitation
from modules.custom_dashboards import CustomDashboards
from modules.dark_web_scraper import DarkWebScraper
from modules.data_exfiltration import DataExfiltration
from modules.data_visualization import DataVisualization
from modules.device_fingerprinting import DeviceFingerprinting
from modules.exploit_payloads import ExploitPayloads
from modules.fuzzing_engine import FuzzingEngine
from modules.iot_exploitation import IoTExploitation
from modules.machine_learning_ai import MachineLearningAI
from modules.mitm_stingray import MITMStingray
from modules.network_exploitation import NetworkExploitation
from modules.vulnerability_scanner import VulnerabilityScanner
from modules.wireless_exploitation import WirelessExploitation
from modules.zero_day_exploits import ZeroDayExploits

pn.extension(design="bootstrap", sizing_mode="stretch_width")

Expand Down Expand Up @@ -191,6 +212,27 @@ async def process_inputs(class_names: List[str], image_url: str):
automated_incident_response = AutomatedIncidentResponse()
ai_red_teaming = AIRedTeaming()
blockchain_logger = BlockchainLogger()
advanced_decryption = AdvancedDecryption()
advanced_malware_analysis = AdvancedMalwareAnalysis()
advanced_social_engineering = AdvancedSocialEngineering()
alerts_notifications = AlertsNotifications(smtp_server="smtp.example.com", smtp_port=587, smtp_user="[email protected]", smtp_password="password")
apt_simulation = APTSimulation()
c2_dashboard = C2Dashboard()
cloud_exploitation = CloudExploitation()
custom_dashboards = CustomDashboards()
dark_web_scraper = DarkWebScraper()
data_exfiltration = DataExfiltration()
data_visualization = DataVisualization()
device_fingerprinting = DeviceFingerprinting()
exploit_payloads = ExploitPayloads()
fuzzing_engine = FuzzingEngine()
iot_exploitation = IoTExploitation()
machine_learning_ai = MachineLearningAI()
mitm_stingray = MITMStingray(interface="wlan0")
network_exploitation = NetworkExploitation()
vulnerability_scanner = VulnerabilityScanner()
wireless_exploitation = WirelessExploitation()
zero_day_exploits = ZeroDayExploits()

# Update the dashboard to display real-time insights and analytics
dashboard = pn.Column(
Expand All @@ -200,7 +242,28 @@ async def process_inputs(class_names: List[str], image_url: str):
predictive_analytics.render(),
automated_incident_response.render(),
ai_red_teaming.render(),
blockchain_logger.render()
blockchain_logger.render(),
advanced_decryption.render(),
advanced_malware_analysis.render(),
advanced_social_engineering.render(),
alerts_notifications.render(),
apt_simulation.render(),
c2_dashboard.render(),
cloud_exploitation.render(),
custom_dashboards.render(),
dark_web_scraper.render(),
data_exfiltration.render(),
data_visualization.render(),
device_fingerprinting.render(),
exploit_payloads.render(),
fuzzing_engine.render(),
iot_exploitation.render(),
machine_learning_ai.render(),
mitm_stingray.render(),
network_exploitation.render(),
vulnerability_scanner.render(),
wireless_exploitation.render(),
zero_day_exploits.render()
)

main.append(dashboard)
Loading
Loading