Skip to content

Commit 0fe16fa

Browse files
Update README.md to include all new dashboards and functionalities (#80)
Update `README.md` to include new dashboards and functionalities. * **Recent Updates and Changes**: Add a section detailing new dashboards and functionalities, including advanced connection methods, real-time threat intelligence, predictive analytics, automated incident response, AI red teaming, blockchain logger, advanced decryption, advanced malware analysis, advanced social engineering, alerts and notifications, APT simulation, cloud exploitation, custom dashboards, dark web scraper, data exfiltration, data visualization, device fingerprinting, exploit payloads, fuzzing engine, IoT exploitation, machine learning AI, MITM Stingray, network exploitation, vulnerability scanner, wireless exploitation, and zero-day exploits. * **Detailed and Comprehensive Instructions**: Add sections for prerequisites, installation steps, running the application, Docker deployment, cloud deployment (AWS, Azure, Google Cloud, DigitalOcean), and file structure. * **API Key for Free Text Service**: Include the updated API key for Textbelt. * **Option to Send Either Exploit to the Target**: Add instructions and example code for sending either exploit to the target. --- For more details, open the [Copilot Workspace session](https://copilot-workspace.githubnext.com/ProjectZeroDays/Project-Red-Sword/pull/80?shareId=b85843bc-4517-4023-859f-fc8eb065aaef).
2 parents 3ac354c + 7a21059 commit 0fe16fa

File tree

1 file changed

+276
-0
lines changed

1 file changed

+276
-0
lines changed

README.md

Lines changed: 276 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -551,3 +551,279 @@ The following connections have been made to ensure all apps, dashboards, modules
551551
44. **modules/windows_control.py**: Connects to the appropriate models for Windows control.
552552
45. **modules/wireless_exploitation.py**: Connects to the appropriate models for wireless exploitation.
553553
46. **modules/zero_day_exploits.py**: Connects to the appropriate models for zero-day exploits.
554+
555+
## Recent Updates and Changes
556+
557+
### New Dashboards and Functionalities
558+
559+
We have recently added several new dashboards and functionalities to the Project Red Sword framework. These updates include:
560+
561+
1. **Advanced Connection Methods**: Added a new dashboard for managing advanced connection methods, including reverse shells and other advanced techniques.
562+
2. **Real-Time Threat Intelligence**: Enhanced the real-time threat intelligence dashboard with new visualizations and data sources.
563+
3. **Predictive Analytics**: Added a new dashboard for predictive analytics, utilizing machine learning algorithms to predict potential threats and vulnerabilities.
564+
4. **Automated Incident Response**: Developed a new dashboard for automated incident response, allowing for quick response and containment of security incidents.
565+
5. **AI Red Teaming**: Integrated AI-powered red teaming capabilities into a new dashboard, enabling advanced attack simulations and vulnerability identification.
566+
6. **Blockchain Logger**: Added a new dashboard for blockchain-based logging, providing immutable logs and audit trails for security events and incidents.
567+
7. **Advanced Decryption**: Developed a new dashboard for advanced decryption capabilities, allowing for secure decryption of sensitive data.
568+
8. **Advanced Malware Analysis**: Enhanced the advanced malware analysis dashboard with new tools and techniques for analyzing and reverse engineering malware.
569+
9. **Advanced Social Engineering**: Added a new dashboard for advanced social engineering attacks, including phishing, spear phishing, and whaling attacks.
570+
10. **Alerts and Notifications**: Developed a new dashboard for managing alerts and notifications, providing real-time updates on security events and incidents.
571+
11. **APT Simulation**: Added a new dashboard for simulating advanced persistent threats (APTs), allowing for comprehensive testing of the framework's defenses.
572+
12. **Cloud Exploitation**: Enhanced the cloud exploitation dashboard with new tools and techniques for exploiting vulnerabilities in cloud environments.
573+
13. **Custom Dashboards**: Developed customizable dashboards to provide tailored security insights and metrics.
574+
14. **Dark Web Scraper**: Added a new dashboard for scraping and indexing the dark web, providing valuable intelligence on emerging threats and vulnerabilities.
575+
15. **Data Exfiltration**: Enhanced the data exfiltration dashboard with new techniques for secure data extraction.
576+
16. **Data Visualization**: Developed new visualizations for data analysis, including charts, graphs, and status indicators.
577+
17. **Device Fingerprinting**: Added a new dashboard for device fingerprinting, allowing for the collection and analysis of device information.
578+
18. **Exploit Payloads**: Enhanced the exploit payloads dashboard with new techniques for generating polymorphic and encrypted payloads.
579+
19. **Fuzzing Engine**: Added a new dashboard for the fuzzing engine, allowing for comprehensive fuzz testing of targets.
580+
20. **IoT Exploitation**: Enhanced the IoT exploitation dashboard with new tools and techniques for exploiting vulnerabilities in IoT devices.
581+
21. **Machine Learning AI**: Developed a new dashboard for machine learning AI, providing advanced capabilities for threat detection and analysis.
582+
22. **MITM Stingray**: Added a new dashboard for managing MITM Stingray operations, including interception and analysis of network traffic.
583+
23. **Network Exploitation**: Enhanced the network exploitation dashboard with new tools and techniques for exploiting network vulnerabilities.
584+
24. **Vulnerability Scanner**: Added a new dashboard for the vulnerability scanner, providing comprehensive scanning and reporting of vulnerabilities.
585+
25. **Wireless Exploitation**: Enhanced the wireless exploitation dashboard with new tools and techniques for exploiting wireless vulnerabilities.
586+
26. **Zero Day Exploits**: Added a new dashboard for managing zero-day exploits, including identification and deployment of exploits.
587+
588+
### Detailed and Comprehensive Instructions
589+
590+
#### Prerequisites
591+
592+
- Python 3.8+
593+
- Docker (for containerized deployment)
594+
- AWS CLI, Azure CLI, Google Cloud SDK, or DigitalOcean CLI (for cloud deployment)
595+
596+
#### Installation
597+
598+
1. **Clone the repository:**
599+
600+
```bash
601+
git clone https://github.com/your-repo/project-red-sword.git
602+
cd project-red-sword
603+
```
604+
605+
2. **Install Python dependencies:**
606+
607+
```bash
608+
pip install -r requirements.txt
609+
```
610+
611+
3. **Set up environment variables:**
612+
613+
Create a `.env` file in the root directory and add your API keys:
614+
615+
```bash
616+
OPENAI_API_KEY=your-openai-api-key
617+
HUGGINGFACE_API_KEY=your-huggingface-api-key
618+
```
619+
620+
#### Running the Application
621+
622+
To run the application locally, use the following command:
623+
624+
```bash
625+
python app.py
626+
```
627+
628+
#### Docker Deployment
629+
630+
1. **Build the Docker image:**
631+
632+
```bash
633+
docker build -t project-red-sword .
634+
```
635+
636+
2. **Run the Docker container:**
637+
638+
```bash
639+
docker run -p 7860:7860 project-red-sword
640+
```
641+
642+
#### Cloud Deployment
643+
644+
##### AWS Deployment
645+
646+
1. **Build the Docker image:**
647+
648+
```bash
649+
docker build -t project-red-sword .
650+
```
651+
652+
2. **Push the Docker image to AWS ECR:**
653+
654+
```bash
655+
aws ecr get-login-password --region YOUR_AWS_REGION | docker login --username AWS --password-stdin YOUR_AWS_ACCOUNT_ID.dkr.ecr.YOUR_AWS_REGION.amazonaws.com
656+
aws ecr create-repository --repository-name project-red-sword || echo "Repository already exists."
657+
docker tag project-red-sword:latest YOUR_AWS_ACCOUNT_ID.dkr.ecr.YOUR_AWS_REGION.amazonaws.com/project-red-sword
658+
docker push YOUR_AWS_ACCOUNT_ID.dkr.ecr.YOUR_AWS_REGION.amazonaws.com/project-red-sword
659+
```
660+
661+
3. **Deploy to AWS Elastic Beanstalk:**
662+
663+
```bash
664+
eb init -p docker project-red-sword --region YOUR_AWS_REGION
665+
eb create project-red-sword-env
666+
```
667+
668+
##### Azure Deployment
669+
670+
1. **Build the Docker image:**
671+
672+
```bash
673+
docker build -t project-red-sword .
674+
```
675+
676+
2. **Push the Docker image to Azure ACR:**
677+
678+
```bash
679+
az acr login --name YOUR_AZURE_ACR_NAME
680+
az acr create --resource-group YOUR_RESOURCE_GROUP --name YOUR_AZURE_ACR_NAME --sku Basic || echo "Registry already exists."
681+
docker tag project-red-sword:latest YOUR_AZURE_ACR_NAME.azurecr.io/project-red-sword
682+
docker push YOUR_AZURE_ACR_NAME.azurecr.io/project-red-sword
683+
```
684+
685+
3. **Deploy to Azure App Service:**
686+
687+
```bash
688+
az webapp create --resource-group YOUR_RESOURCE_GROUP --plan YOUR_APP_SERVICE_PLAN --name YOUR_APP_NAME --deployment-container-image-name YOUR_AZURE_ACR_NAME.azurecr.io/project-red-sword:latest
689+
```
690+
691+
##### Google Cloud Deployment
692+
693+
1. **Build the Docker image:**
694+
695+
```bash
696+
docker build -t project-red-sword .
697+
```
698+
699+
2. **Push the Docker image to Google Container Registry:**
700+
701+
```bash
702+
gcloud auth configure-docker
703+
docker tag project-red-sword gcr.io/YOUR_PROJECT_ID/project-red-sword
704+
docker push gcr.io/YOUR_PROJECT_ID/project-red-sword
705+
```
706+
707+
3. **Deploy to Google Kubernetes Engine:**
708+
709+
```bash
710+
kubectl apply -f google-k8s.yaml
711+
```
712+
713+
##### DigitalOcean Deployment
714+
715+
1. **Build the Docker image:**
716+
717+
```bash
718+
docker build -t project-red-sword .
719+
```
720+
721+
2. **Deploy to DigitalOcean:**
722+
723+
```bash
724+
doctl auth init
725+
doctl apps create --spec digitalocean-app.yaml
726+
```
727+
728+
#### File Structure
729+
730+
The Project Red Sword repository is organized into several directories, each containing specific modules and components. Here is an overview of the file structure:
731+
732+
```
733+
project-red-sword/
734+
├── app.py
735+
├── requirements.txt
736+
├── .env
737+
├── modules/
738+
│ ├── ai_red_teaming.py
739+
│ ├── alerts_notifications.py
740+
│ ├── apt_simulation.py
741+
│ ├── advanced_decryption.py
742+
│ ├── advanced_malware_analysis.py
743+
│ ├── advanced_social_engineering.py
744+
│ ├── blockchain_logger.py
745+
│ ├── cloud_exploitation.py
746+
│ ├── cloud_native_applications.py
747+
│ ├── data_exfiltration.py
748+
│ ├── data_visualization.py
749+
│ ├── device_control.py
750+
│ ├── device_fingerprinting.py
751+
│ ├── edge_computing.py
752+
│ ├── exploit_payloads.py
753+
│ ├── fuzzing_engine.py
754+
│ ├── ios_control.py
755+
│ ├── iot_exploitation.py
756+
│ ├── linux_control.py
757+
│ ├── machine_learning_ai.py
758+
│ ├── macos_control.py
759+
│ ├── microservices_architecture.py
760+
│ ├── mitm_stingray.py
761+
│ ├── network_exploitation.py
762+
│ ├── predictive_analytics.py
763+
│ ├── quantum_computing.py
764+
│ ├── real_time_monitoring.py
765+
│ ├── real_time_threat_intelligence.py
766+
│ ├── serverless_computing.py
767+
│ ├── threat_intelligence.py
768+
│ ├── vulnerability_scanner.py
769+
│ ├── windows_control.py
770+
│ ├── wireless_exploitation.py
771+
│ ├── zero_day_exploits.py
772+
├── exploits/
773+
│ ├── exploits2.py
774+
│ ├── ios_framework_extracted/
775+
│ │ ├── iOS Zero-Click Framework (Updated)/
776+
│ │ │ ├── exploits.py
777+
├── database/
778+
│ ├── models.py
779+
├── backend/
780+
│ ├── code_parser.py
781+
│ ├── pipeline_manager.py
782+
├── c2_dashboard.py
783+
├── chatbot/
784+
│ ├── app.py
785+
│ ├── chatbot.py
786+
├── dashboard/
787+
│ ├── dashboard.py
788+
```
789+
790+
#### API Key for Free Text Service
791+
792+
You can get the API key for the free text service from Textbelt. Replace 'textbelt' in the send_sms function with your actual API key.
793+
794+
```python
795+
def send_sms(to_phone_number, message):
796+
url = 'https://textbelt.com/text'
797+
data = {
798+
'phone': to_phone_number,
799+
'message': message,
800+
'key': '6c6ba6cbbed7e162c975b3d2f8b0b391f8c5f97aQeDibGwKd8KbMQiMV1DSuUkaW'
801+
}
802+
try:
803+
response = requests.post(url, data=data)
804+
response.raise_for_status()
805+
return response.json()
806+
except requests.RequestException as e:
807+
return {'success': False, 'message': str(e)}
808+
```
809+
810+
#### Option to Send Either Exploit to the Target
811+
812+
The Project Red Sword framework now includes an option to send either exploit to the target. This feature allows you to choose between different exploits based on the target system and the desired outcome.
813+
814+
```python
815+
# Example of sending either exploit to the target
816+
from exploits.dia_framework_extracted.DIA_Framework.src.exploits import exploits
817+
818+
# Choose the exploit to send
819+
exploit_choice = input("Enter the exploit to send (1 for Exploit A, 2 for Exploit B): ")
820+
821+
if exploit_choice == '1':
822+
result = exploits.deploy_exploit_a(ip='192.168.1.1', port=22, phone='1234567890', email='user@example.com', user='admin')
823+
elif exploit_choice == '2':
824+
result = exploits.deploy_exploit_b(ip='192.168.1.1', port=22, phone='1234567890', email='user@example.com', user='admin')
825+
else:
826+
print("Invalid choice. Please enter 1 or 2.")
827+
828+
print(result)
829+
```

0 commit comments

Comments
 (0)