whatmatters

command module
v0.0.0-...-f253ad0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 28, 2025 License: MIT Imports: 13 Imported by: 0

README ΒΆ

🐾 ArmyK9 - AI-Developed Cybersecurity Tools

Welcome to ArmyK9, a collection of AI-developed tools designed to automate various aspects of cybersecurity monitoring. Whether you're a πŸ›‘οΈ penetration tester, πŸ§ͺ security researcher, or an πŸ’Ό IT professional, these tools can assist in tracking vulnerabilities and gaining a clearer understanding of your organization's security posture.

πŸ“¦ Overview

This repository contains scripts and utilities that help automate the process of collecting exploit information, making it easier for organizations to stay informed about relevant vulnerabilities. The primary focus is on:

  • 🐞 Vulnerability listing
  • 🧭 Assisting in determining security posture
  • πŸ“Š Data collection for vulnerability assessments

πŸ“ Key Files

  • whatmatters.go 🧠: Automates the collection of Remote Code Execution (RCE) exploits from the past 12 months, using RSS feeds from popular exploit code publishers like ExploitDB and PacketStormSecurity. It downloads relevant exploit code into a folder, making it easier to track emerging threats.

  • exploits_list.go πŸ–₯️: Generates a 1-page HTML listing of the retrieved exploits, organized into a clean table format. The report includes clickable links to detailed information for each exploit, allowing quick review of vulnerabilities published over a given period.

🎯 Purpose

These tools were designed with a dual-purpose mindset:

  • πŸ•΅οΈ On the offensive side, they help penetration testers automate the collection of relevant exploit code.
  • πŸ›‘οΈ On the defensive side, they allow organizations to keep track of recently published RCE exploits and assess whether their systems are vulnerable.

The tools are especially useful for smaller organizations with πŸͺ™ limited budgets for high-end cybersecurity solutions. By automating exploit collection, they help maintain an up-to-date view of potential vulnerabilities without expensive infrastructure.

πŸ› οΈ Installation Guide for WhatMatters

Important Notes:

  • ⏱️ This tool downloads only RCE-related exploit codes from the last 12 months.
  • πŸ“‚ Files are renamed based on category, title, and programming language.
  • ⚠️ Some files may contain single-line payloads and may not compile OOTB.
  • 🧠 Use ChatGPT to help fix any non-compiling code before using it.
🧬 Steps to Install and Compile:
  1. Clone the repository:

    git clone https://github.com/armyk9/whatmatters.git
    
  2. Initialize the Go Module:

    go mod init whatmatters
    
  3. Install GoQuery:

    go get github.com/PuerkitoBio/goquery
    
  4. Install GoFeed:

    go get github.com/mmcdole/gofeed
    
  5. Compile the Application:

    πŸͺŸ For Windows:
    go build -o whatmatters.exe whatmatters.go
    go build -o exploits_list.exe exploits_list.go
    
    🐧 For Linux:
    go build -o whatmatters whatmatters.go
    go build -o exploits_list exploits_list.go
    

❓ Why WhatMatters?

A friend of mine, who serves as a Cybersecurity Manager at a local bank 🏦, recently shared his concerns about the lack of timely visibility into newly published exploits. To address this, I created a tool that scrapes exploit databases and delivers real-time insights into potential threats 🚨 β€” powered by ChatGPT.

πŸ“œ License

This project is licensed under the MIT License. See the LICENSE file for details.

Documentation ΒΆ

The Go Gopher

There is no documentation for this package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL