Salta ai contenuti

Security Tools

How OpenSploit orchestrates 25+ security tools via MCP Docker containers, organized by pentest phase.

Questi contenuti non sono ancora disponibili nella tua lingua.

OpenSploit orchestrates 25+ security tools via the Model Context Protocol (MCP). Tools run in Docker containers and are downloaded on-demand when first used.

How Tools Work

  1. Tool Registry RAG - Agents discover tools by querying a semantic search system
  2. On-Demand Download - Tool containers are pulled from the registry when needed
  3. MCP Communication - OpenSploit communicates with tools via JSON-RPC over stdio
  4. Container Isolation - Each tool runs in its own Docker container

Tool Categories

Reconnaissance

ToolDescription
nmapPort scanning, service detection, OS fingerprinting
web-fingerprintWeb technology detection (CMS, frameworks, servers)
whatwebWeb technology fingerprinting

Enumeration

ToolDescription
ffufWeb fuzzing, directory bruteforcing
gobusterDirectory and DNS bruteforcing
niktoWeb server vulnerability scanning
nucleiTemplate-based vulnerability scanning
wpscanWordPress vulnerability scanning
cve-lookupCVE research via NVD API

Exploitation

ToolDescription
sqlmapSQL injection testing and exploitation
hydraPassword brute-forcing
metasploitExploitation framework
curlHTTP requests, RCE injection
sshRemote command execution
netcatReverse shell listener
payloadBinary compilation, reverse shells
nosqlmapNoSQL injection testing

Post-Exploitation

ToolDescription
privescPrivilege escalation enumeration
tunnelSSH port forwarding, SOCKS proxy
mysqlMySQL database queries
mongodbMongoDB client
johnPassword cracking

Tool Selection Hierarchy

OpenSploit prioritizes tools based on specificity:

  1. Skills (Level 1) - Composite workflows that orchestrate multiple tools
  2. Specialized Tools (Level 2) - Purpose-built tools for specific tasks
  3. General-Purpose Tools (Level 3) - Flexible tools like curl, netcat

Privileged Containers

Some tools require elevated privileges for raw socket access:

┌─────────────────────────────────────────────────────────────┐
│ ⚠️ PRIVILEGED CONTAINER REQUIRED │
│ │
│ Tool: nmap (port_scan with SYN scan) │
│ Target: 10.10.10.1 │
│ │
│ This tool requires elevated privileges for: │
│ • Raw socket access (SYN scans, OS detection) │
│ • Network interface access │
│ │
│ Container isolation still applies. │
│ This action will be logged. │
│ │
│ [Deny] [Allow] │
└─────────────────────────────────────────────────────────────┘

Enabling/Disabling Tools

Configure tool availability in your config:

{
"tools": {
"metasploit": false,
"sqlmap": true
}
}

Tool Output Management

Large tool outputs (>5000 characters) are stored externally to prevent context overflow. The agent receives a summary with a reference ID for retrieving the full output when needed.

Output storage location: ~/.opensploit/outputs/{session}/