[ { "text": "nmap -sV -O 192.168.1.0/24", "source": "successful_command" }, { "text": "sqlmap -u http://example.com/login --dbs", "source": "successful_command" }, { "text": "subfinder -d example.com", "source": "successful_command" }, { "text": "gobuster dir -u http://example.com -w /path/to/wordlist.txt", "source": "successful_command" }, { "text": "SQL injection vulnerability detected", "source": "vulnerability_pattern" }, { "text": "XSS vulnerability in search parameter", "source": "vulnerability_pattern" }, { "text": "Open port 22 (SSH) detected, potential brute-force target", "source": "vulnerability_pattern" }, { "text": "Outdated Apache version found, check CVEs for version X.Y.Z", "source": "vulnerability_pattern" }, { "text": "Directory listing enabled on /admin", "source": "vulnerability_pattern" }, { "text": "Weak credentials found for service XYZ", "source": "vulnerability_pattern" }, { "text": "windows/x64/meterpreter/reverse_tcp", "source": "payload_windows" }, { "text": "windows/meterpreter/reverse_tcp", "source": "payload_windows" }, { "text": "linux/x64/meterpreter/reverse_tcp", "source": "payload_linux" }, { "text": "linux/x86/meterpreter/reverse_tcp", "source": "payload_linux" }, { "text": "", "source": "payload_web" }, { "text": "' OR 1=1--", "source": "payload_web" }, { "text": "UNION SELECT null,null,null,version()-- -", "source": "payload_web" }, { "text": "Command not found: Try installing the required package. Use `sudo apt install ` or `pip install `.", "source": "error_correction" }, { "text": "Permission denied: Try running with sudo or check file permissions.", "source": "error_correction" }, { "text": "Connection refused: Target host or port might be down or blocked by firewall.", "source": "error_correction" }, { "text": "No targets specified: Ensure you provide a valid IP address or URL.", "source": "error_correction" }, { "text": "Shodan API Key not configured: Set the SHODAN_API_KEY environment variable.", "source": "error_correction" }, { "text": "Always start with basic network scanning (nmap).", "source": "recon_tip" }, { "text": "Enumerate subdomains for larger attack surface.", "source": "recon_tip" }, { "text": "Check for open ports and services, then research known vulnerabilities for those services.", "source": "recon_tip" }, { "text": "Use OSINT tools to gather information about the target organization and its employees.", "source": "recon_tip" }, { "text": "After finding a vulnerability, check ExploitDB and Metasploit for existing exploits.", "source": "exploit_tip" }, { "text": "Always verify payload delivery and listener setup.", "source": "exploit_tip" }, { "text": "Prioritize remote code execution (RCE) vulnerabilities.", "source": "exploit_tip" } ]