README
ΒΆ
πΎ ArmyK9 - AI-Developed Cybersecurity Tools
Welcome to ArmyK9, a collection of AI-developed tools designed to automate various aspects of cybersecurity monitoring. Whether you're a π‘οΈ penetration tester, π§ͺ security researcher, or an πΌ IT professional, these tools can assist in tracking vulnerabilities and gaining a clearer understanding of your organization's security posture.
π¦ Overview
This repository contains scripts and utilities that help automate the process of collecting exploit information, making it easier for organizations to stay informed about relevant vulnerabilities. The primary focus is on:
- π Vulnerability listing
- π§ Assisting in determining security posture
- π Data collection for vulnerability assessments
π Key Files
-
whatmatters.goπ§ : Automates the collection of Remote Code Execution (RCE) exploits from the past 12 months, using RSS feeds from popular exploit code publishers like ExploitDB and PacketStormSecurity. It downloads relevant exploit code into a folder, making it easier to track emerging threats. -
exploits_list.goπ₯οΈ: Generates a 1-page HTML listing of the retrieved exploits, organized into a clean table format. The report includes clickable links to detailed information for each exploit, allowing quick review of vulnerabilities published over a given period.
π― Purpose
These tools were designed with a dual-purpose mindset:
- π΅οΈ On the offensive side, they help penetration testers automate the collection of relevant exploit code.
- π‘οΈ On the defensive side, they allow organizations to keep track of recently published RCE exploits and assess whether their systems are vulnerable.
The tools are especially useful for smaller organizations with πͺ limited budgets for high-end cybersecurity solutions. By automating exploit collection, they help maintain an up-to-date view of potential vulnerabilities without expensive infrastructure.
π οΈ Installation Guide for WhatMatters
Important Notes:
- β±οΈ This tool downloads only RCE-related exploit codes from the last 12 months.
- π Files are renamed based on category, title, and programming language.
- β οΈ Some files may contain single-line payloads and may not compile OOTB.
- π§ Use ChatGPT to help fix any non-compiling code before using it.
𧬠Steps to Install and Compile:
-
Clone the repository:
git clone https://github.com/armyk9/whatmatters.git -
Initialize the Go Module:
go mod init whatmatters -
Install GoQuery:
go get github.com/PuerkitoBio/goquery -
Install GoFeed:
go get github.com/mmcdole/gofeed -
Compile the Application:
πͺ For Windows:
go build -o whatmatters.exe whatmatters.go go build -o exploits_list.exe exploits_list.goπ§ For Linux:
go build -o whatmatters whatmatters.go go build -o exploits_list exploits_list.go
β Why WhatMatters?
A friend of mine, who serves as a Cybersecurity Manager at a local bank π¦, recently shared his concerns about the lack of timely visibility into newly published exploits. To address this, I created a tool that scrapes exploit databases and delivers real-time insights into potential threats π¨ β powered by ChatGPT.
π License
This project is licensed under the MIT License. See the LICENSE file for details.
Documentation
ΒΆ
There is no documentation for this package.