attackmate


Nameattackmate JSON
Version 0.2.1 PyPI version JSON
download
home_pageNone
SummaryAttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
upload_time2024-06-21 20:11:02
maintainerNone
docs_urlNone
authorNone
requires_python>=3.7
licenseGPL-3.0
keywords pentest attack orchestration hacking simulating attackchain
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            AttackMate <img alt="Logo" src="/images/AttackMate_logo.svg" align="right" height="90">
==========
[![Build Status](https://aecidjenkins.ait.ac.at/buildStatus/icon?job=AECID%2FAECID%2Fattackmate%2Fmain)]( "https://aecidjenkins.ait.ac.at/job/AECID/job/AECID/job/attackmate/job/main/")

AttackMate is a tool to automate cyber attack scenarios that supports scripting of attack techniques across all phases of the Cyber Kill Chain. AttackMate's design principles aim to integrate with penetration testing and attack emulation frameworks such as Metasploit and Sliver Framework and enables simple execution of commands via shell or ssh. For example, AttackMate enables to execute Metasploit modules or generate payloads and run commands in Metasploit sessions. Moreover, it is able to generate Sliver implants, automatize Sliver to send C2 commands, and configure and compile LD_PRELOAD-rootkits. AttackMate also offers a simple interface to automate shell or ssh interaction, run commands in background mode, transfer files via sftp, and start http clients or servers. All attack steps may be scheduled, chained, and repeatedly executed using a simple configuration file that supports variable declarations and conditional workflows.


![AttackMate Schema](docs/source/images/attackmate-schema.png "AttackMate Schema")


## Requirements

* python >= 3.10
* libmagic

## Installation

Manually:

```
$ git clone https://github.com/ait-aecid/attackmate.git
$ cd attackmate
$ pip3 install .
```

Using pip:

```
$ pip3 install attackmate
```

## Execute

```
$ attackmate playbook.yml
```

![AttackMate Demo](docs/source/images/Demo.gif "AttackMate Demo")

## Documentation

Please take a look at our documentation for how to install and use attackmate:

* [Installation](https://aeciddocs.ait.ac.at/attackmate/current/installation/index.html)
* [Documentation](https://aeciddocs.ait.ac.at/attackmate/current)
* [Command Reference](https://aeciddocs.ait.ac.at/attackmate/current/playbook/commands/index.html)
* [Example Playbooks](https://aeciddocs.ait.ac.at/attackmate/current/playbook/examples.html)

## Disclaimer

AttackMate is purely for educational and academic purposes. The software is provided "as is"
and the authors are not responsible for any damage or mishaps that may occur during its use.

Do not attempt to use AttackMate to violate the law. Misuse of the provided software and
information may result in criminal charges.

## Security

AttackMate should only be executed against own test or training systems.
For this reason, every software bug is treated equally, regardless of
whether it is security relevant or not.

*Please note that AttackMate could easily be executed in a dangerous way. For example, by
parsing the RESULT_STDOUT of a malicious server. The server response could lead to
a command injection. Keep that in mind!

## License

[GPL-3.0](LICENSE)

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "attackmate",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": null,
    "keywords": "Pentest, Attack, Orchestration, Hacking, Simulating, Attackchain",
    "author": null,
    "author_email": "Wolfgang Hotwagner <wolfgang.hotwagner@ait.ac.at>",
    "download_url": "https://files.pythonhosted.org/packages/63/9d/3a50b25abea2a1a15caa7c57e68c8923d8c4783594e4b22addf0752df17c/attackmate-0.2.1.tar.gz",
    "platform": null,
    "description": "AttackMate <img alt=\"Logo\" src=\"/images/AttackMate_logo.svg\" align=\"right\" height=\"90\">\n==========\n[![Build Status](https://aecidjenkins.ait.ac.at/buildStatus/icon?job=AECID%2FAECID%2Fattackmate%2Fmain)]( \"https://aecidjenkins.ait.ac.at/job/AECID/job/AECID/job/attackmate/job/main/\")\n\nAttackMate is a tool to automate cyber attack scenarios that supports scripting of attack techniques across all phases of the Cyber Kill Chain. AttackMate's design principles aim to integrate with penetration testing and attack emulation frameworks such as Metasploit and Sliver Framework and enables simple execution of commands via shell or ssh. For example, AttackMate enables to execute Metasploit modules or generate payloads and run commands in Metasploit sessions. Moreover, it is able to generate Sliver implants, automatize Sliver to send C2 commands, and configure and compile LD_PRELOAD-rootkits. AttackMate also offers a simple interface to automate shell or ssh interaction, run commands in background mode, transfer files via sftp, and start http clients or servers. All attack steps may be scheduled, chained, and repeatedly executed using a simple configuration file that supports variable declarations and conditional workflows.\n\n\n![AttackMate Schema](docs/source/images/attackmate-schema.png \"AttackMate Schema\")\n\n\n## Requirements\n\n* python >= 3.10\n* libmagic\n\n## Installation\n\nManually:\n\n```\n$ git clone https://github.com/ait-aecid/attackmate.git\n$ cd attackmate\n$ pip3 install .\n```\n\nUsing pip:\n\n```\n$ pip3 install attackmate\n```\n\n## Execute\n\n```\n$ attackmate playbook.yml\n```\n\n![AttackMate Demo](docs/source/images/Demo.gif \"AttackMate Demo\")\n\n## Documentation\n\nPlease take a look at our documentation for how to install and use attackmate:\n\n* [Installation](https://aeciddocs.ait.ac.at/attackmate/current/installation/index.html)\n* [Documentation](https://aeciddocs.ait.ac.at/attackmate/current)\n* [Command Reference](https://aeciddocs.ait.ac.at/attackmate/current/playbook/commands/index.html)\n* [Example Playbooks](https://aeciddocs.ait.ac.at/attackmate/current/playbook/examples.html)\n\n## Disclaimer\n\nAttackMate is purely for educational and academic purposes. The software is provided \"as is\"\nand the authors are not responsible for any damage or mishaps that may occur during its use.\n\nDo not attempt to use AttackMate to violate the law. Misuse of the provided software and\ninformation may result in criminal charges.\n\n## Security\n\nAttackMate should only be executed against own test or training systems.\nFor this reason, every software bug is treated equally, regardless of\nwhether it is security relevant or not.\n\n*Please note that AttackMate could easily be executed in a dangerous way. For example, by\nparsing the RESULT_STDOUT of a malicious server. The server response could lead to\na command injection. Keep that in mind!\n\n## License\n\n[GPL-3.0](LICENSE)\n",
    "bugtrack_url": null,
    "license": "GPL-3.0",
    "summary": "AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.",
    "version": "0.2.1",
    "project_urls": null,
    "split_keywords": [
        "pentest",
        " attack",
        " orchestration",
        " hacking",
        " simulating",
        " attackchain"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "6ce14ef9aee824ddce6b18655bcc3523cfd639cd536cb17fe812c5888c137c56",
                "md5": "1545bdf5e3816b95f93b04f0ee874ecd",
                "sha256": "4a7561fe79477a5f82dea00299dc36e35e123c1470643c3bc3242f76519d600a"
            },
            "downloads": -1,
            "filename": "attackmate-0.2.1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "1545bdf5e3816b95f93b04f0ee874ecd",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.7",
            "size": 69020,
            "upload_time": "2024-06-21T20:10:59",
            "upload_time_iso_8601": "2024-06-21T20:10:59.843523Z",
            "url": "https://files.pythonhosted.org/packages/6c/e1/4ef9aee824ddce6b18655bcc3523cfd639cd536cb17fe812c5888c137c56/attackmate-0.2.1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "639d3a50b25abea2a1a15caa7c57e68c8923d8c4783594e4b22addf0752df17c",
                "md5": "52a72127f9b90991dfe46c66c26b8933",
                "sha256": "708ab955d3ee4fe9b2f6fea786f4ea178729c47707761c50f0bf66da41052bf6"
            },
            "downloads": -1,
            "filename": "attackmate-0.2.1.tar.gz",
            "has_sig": false,
            "md5_digest": "52a72127f9b90991dfe46c66c26b8933",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 55073,
            "upload_time": "2024-06-21T20:11:02",
            "upload_time_iso_8601": "2024-06-21T20:11:02.751985Z",
            "url": "https://files.pythonhosted.org/packages/63/9d/3a50b25abea2a1a15caa7c57e68c8923d8c4783594e4b22addf0752df17c/attackmate-0.2.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-06-21 20:11:02",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "attackmate"
}
        
Elapsed time: 0.91323s