2.2.0 - 2026-03-05 #54
samugit83
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Added
container.pause()). Zero changes to scan scripts; processes resume exactly where they left offcontainer.unpause()), logs resume streaming instantlyPausedstatus indicator and spinner during stoppingPOST /{recon,gvm,github-hunt}/{projectId}/{pause,resume}) and 9 new webapp API proxy routes (pause/resume/stop × 3 pipelines)192.168.1.1), IPv6 (2001:db8::1), and CIDR ranges (10.0.0.0/24,192.168.1.0/28) with a max /24 (256 hosts) limit per CIDR192-168-1-1)ip-targets.{project_id}) withip_mode: true, Subdomain nodes (real PTR hostnames or IP-based mocks), IP nodes with WHOIS data, and all downstream relationships(key, user_id, project_id), allowing the same IP/subdomain to exist in different projects without conflictswebapp/src/lib/validation.tsmodule with regex validators for IPs, CIDRs, domains, ports, status codes, HTTP headers, GitHub tokens, and more. Validation runs on form submitipModeandtargetIpsfields added to Prisma schema with database migrationCHISEL_SERVER_URLhostname (no API polling needed)CHISEL_SERVER_URLandCHISEL_AUTHenv vars added to.env.exampleanddocker-compose.yml_query_chisel_tunnel()utility inagentic/utils.pywithget_session_config_prompt()integrationagentChiselTunnelEnabledPrisma field with database migrationphishing_social_engineering) — third classified attack path with a mandatory 6-step workflow: target platform selection, handler setup, payload generation, verification, delivery, and session callback:exploit/multi/script/web_deliverysupporting Python, PHP, PowerShell, Regsvr32 (AppLocker bypass), pubprn, SyncAppvPublishingServer, and PSH Binary targetsexploit/windows/misc/hta_serverfor browser-based payload deliveryexecute_codewith per-project SMTP configuration (host, port, user, password, sender, TLS) — agent asks at runtime if no SMTP settings are configureddocker cpcommand reported in chatphishing_social_engineering_prompts.pywithPHISHING_SOCIAL_ENGINEERING_TOOLS(full workflow) andPHISHING_PAYLOAD_FORMAT_GUIDANCE(OS-specific format decision tree and msfvenom quick reference)phishing_social_engineeringadded toKNOWN_ATTACK_PATHSset andAttackPathClassificationvalidatorentrypoint.shwhenNGROK_AUTHTOKENenv var is set_query_ngrok_tunnel()utility inagentic/utils.pythat queries ngrok API, discovers the public TCP endpoint, and resolves the hostname to an IP for targets with limited DNSget_session_config_prompt()auto-detects LHOST/LPORT from ngrok when enabled — injects a status banner, dual LHOST/LPORT table (handler vs payload), and enforces REVERSE-only payloads through ngrokis_session_config_complete()short-circuits to complete when ngrok tunnel is activeNGROK_AUTHTOKENadded to.env.exampleanddocker-compose.yml(kali-sandbox env + port 4040 exposed)PhishingSectioncomponent with SMTP configuration textarea for per-project email delivery settings#ec4899accent color for phishing sessions in the AI Assistant drawer20260228120000_add_ngrok_tunnel(agentNgrokTunnelEnabled),20260228130000_add_phishing_smtp_config(phishingSmtpConfig), and20260305145750_add_ip_mode(ipMode, targetIps) database migrationskali_shell/command-whispererAPI endpointstart_msf_prewarmcall from WebSocket initializationsessions -Ksoft-reset on firstmetasploit_consoleusemsf_restarttool now visible to the AI agent for manual use when a clean state is neededChanged
is_host_in_scope()reordered to checkallowed_hostsbeforeroot_domainscope, fixing IP-mode where the fake root domain caused all real hostnames to be filtered out. AddedinputURL fallback for redirect chainsip_modeis activeREADME.ATTACK_PATHS.md) — comprehensive rewrite of Category 3 (Social Engineering / Phishing) with implementation details, 6-step workflow diagram, payload matrix, module reference, delivery methods, SMTP configuration guide, post-exploitation flow, and implementation file reference tableFixed
443and stale8080fromhttps_portsinbuild_targets_from_naabu()This discussion was created from the release 2.2.0 - 2026-03-05.
Beta Was this translation helpful? Give feedback.
All reactions