enotkrutoy
commited on
Commit
•
a5bc01c
1
Parent(s):
5e8d176
Update README.md
Browse files
README.md
CHANGED
@@ -9,4 +9,32 @@ app_file: app.py
|
|
9 |
pinned: false
|
10 |
---
|
11 |
|
12 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9 |
pinned: false
|
10 |
---
|
11 |
|
12 |
+
# WhiteRabbitNeo Llama 3 WhiteRabbitNeo 8B V2.0
|
13 |
+
|
14 |
+
This project uses the WhiteRabbitNeo model in combination with Hugging Face Spaces for building a Red Team tool for reconnaissance, vulnerability scanning, and exploit generation.
|
15 |
+
|
16 |
+
### Features
|
17 |
+
|
18 |
+
- **Reconnaissance Mode**: Enter a domain (e.g., `example.com`) to begin infrastructure analysis and data collection.
|
19 |
+
- **Vulnerability Scanning**: Provide a service version (e.g., `Apache 2.4.49`) to search for associated vulnerabilities and CVEs.
|
20 |
+
- **Exploit Generation**: Describe a vulnerability and generate an exploit script in Python, Bash, or PowerShell.
|
21 |
+
|
22 |
+
### How to Use
|
23 |
+
|
24 |
+
1. **Reconnaissance**:
|
25 |
+
- Enter a domain name (e.g., `example.com`) and click "Start Reconnaissance".
|
26 |
+
- WhiteRabbitNeo will perform automated reconnaissance on the target.
|
27 |
+
|
28 |
+
2. **Vulnerability Scanning**:
|
29 |
+
- Enter information about the service (e.g., `Apache 2.4.49`), and the tool will search for related CVEs.
|
30 |
+
|
31 |
+
3. **Exploit Generation**:
|
32 |
+
- Describe the vulnerability and select the language for the exploit (Python, Bash, PowerShell).
|
33 |
+
- The tool will generate a working exploit script for you.
|
34 |
+
|
35 |
+
### Setup Instructions
|
36 |
+
|
37 |
+
1. Clone the repository to your local machine or directly to Hugging Face Spaces.
|
38 |
+
2. Install dependencies from `requirements.txt` using:
|
39 |
+
```bash
|
40 |
+
pip install -r requirements.txt
|