knowledge-service / knowledge_base.json
MrA7A's picture
Update knowledge_base.json
17c7f17 verified
[
{
"text": "nmap -sV -O 192.168.1.0/24",
"source": "successful_command"
},
{
"text": "sqlmap -u http://example.com/login --dbs",
"source": "successful_command"
},
{
"text": "subfinder -d example.com",
"source": "successful_command"
},
{
"text": "gobuster dir -u http://example.com -w /path/to/wordlist.txt",
"source": "successful_command"
},
{
"text": "SQL injection vulnerability detected",
"source": "vulnerability_pattern"
},
{
"text": "XSS vulnerability in search parameter",
"source": "vulnerability_pattern"
},
{
"text": "Open port 22 (SSH) detected, potential brute-force target",
"source": "vulnerability_pattern"
},
{
"text": "Outdated Apache version found, check CVEs for version X.Y.Z",
"source": "vulnerability_pattern"
},
{
"text": "Directory listing enabled on /admin",
"source": "vulnerability_pattern"
},
{
"text": "Weak credentials found for service XYZ",
"source": "vulnerability_pattern"
},
{
"text": "windows/x64/meterpreter/reverse_tcp",
"source": "payload_windows"
},
{
"text": "windows/meterpreter/reverse_tcp",
"source": "payload_windows"
},
{
"text": "linux/x64/meterpreter/reverse_tcp",
"source": "payload_linux"
},
{
"text": "linux/x86/meterpreter/reverse_tcp",
"source": "payload_linux"
},
{
"text": "<script>alert('XSS');</script>",
"source": "payload_web"
},
{
"text": "' OR 1=1--",
"source": "payload_web"
},
{
"text": "UNION SELECT null,null,null,version()-- -",
"source": "payload_web"
},
{
"text": "Command not found: Try installing the required package. Use `sudo apt install <package_name>` or `pip install <package_name>`.",
"source": "error_correction"
},
{
"text": "Permission denied: Try running with sudo or check file permissions.",
"source": "error_correction"
},
{
"text": "Connection refused: Target host or port might be down or blocked by firewall.",
"source": "error_correction"
},
{
"text": "No targets specified: Ensure you provide a valid IP address or URL.",
"source": "error_correction"
},
{
"text": "Shodan API Key not configured: Set the SHODAN_API_KEY environment variable.",
"source": "error_correction"
},
{
"text": "Always start with basic network scanning (nmap).",
"source": "recon_tip"
},
{
"text": "Enumerate subdomains for larger attack surface.",
"source": "recon_tip"
},
{
"text": "Check for open ports and services, then research known vulnerabilities for those services.",
"source": "recon_tip"
},
{
"text": "Use OSINT tools to gather information about the target organization and its employees.",
"source": "recon_tip"
},
{
"text": "After finding a vulnerability, check ExploitDB and Metasploit for existing exploits.",
"source": "exploit_tip"
},
{
"text": "Always verify payload delivery and listener setup.",
"source": "exploit_tip"
},
{
"text": "Prioritize remote code execution (RCE) vulnerabilities.",
"source": "exploit_tip"
}
]