diff --git a/README.md b/README.md index 4334a20..8d54438 100644 --- a/README.md +++ b/README.md @@ -161,16 +161,17 @@ GHOSTCREW supports integration with the following security tools through the MCP 5. **Certificate Transparency** - SSL certificate transparency logs for subdomain discovery (no executable needed) 6. **FFUF Fuzzer** - Fast web fuzzing tool for discovering hidden content 7. **HTTPx** - Fast HTTP toolkit and port scanning tool -8. **Katana** - Fast web crawling with JavaScript parsing tool -9. **Masscan** - High-speed network port scanner -10. **Metasploit** - Penetration testing framework with exploit execution, payload generation, and session management -11. **Nmap Scanner** - Network discovery and security auditing tool -12. **Nuclei Scanner** - Template-based vulnerability scanner -13. **Scout Suite** - Cloud security auditing tool -14. **shuffledns** - High-speed DNS brute-forcing and resolution tool -15. **SQLMap** - Automated SQL injection detection and exploitation tool -16. **SSL Scanner** - Analysis tool for SSL/TLS configurations and security issues -17. **Wayback URLs** - Tool for discovering historical URLs from the Wayback Machine archive +8. **Hydra** - Password brute-force attacks and credential testing tool +9. **Katana** - Fast web crawling with JavaScript parsing tool +10. **Masscan** - High-speed network port scanner +11. **Metasploit** - Penetration testing framework with exploit execution, payload generation, and session management +12. **Nmap Scanner** - Network discovery and security auditing tool +13. **Nuclei Scanner** - Template-based vulnerability scanner +14. **Scout Suite** - Cloud security auditing tool +15. **shuffledns** - High-speed DNS brute-forcing and resolution tool +16. **SQLMap** - Automated SQL injection detection and exploitation tool +17. **SSL Scanner** - Analysis tool for SSL/TLS configurations and security issues +18. **Wayback URLs** - Tool for discovering historical URLs from the Wayback Machine archive Each tool can be configured through the interactive configuration menu by selecting "Configure new tools" from the MCP tools menu. @@ -179,7 +180,6 @@ Each tool can be configured through the interactive configuration menu by select - BloodHound - CrackMapExec - Gobuster -- Hydra - Responder - Bettercap diff --git a/config/constants.py b/config/constants.py index 2b8bac7..d03f13b 100644 --- a/config/constants.py +++ b/config/constants.py @@ -55,8 +55,8 @@ EXIT_OPTION = f"{Fore.RED}Exit{Style.RESET_ALL}" KB_PROMPT = f"{Fore.YELLOW}Use knowledge base to enhance answers? (yes/no, default: no): {Style.RESET_ALL}" MCP_PROMPT = f"{Fore.YELLOW}Configure or connect MCP tools? (yes/no, default: no): {Style.RESET_ALL}" TOOL_SELECTION_PROMPT = f"{Fore.YELLOW}Enter numbers to connect to (comma-separated, default: all): {Style.RESET_ALL}" -MULTI_LINE_PROMPT = f"{Fore.MAGENTA}(Enter multi-line mode. Type '###' to end input){Style.RESET_ALL}" -MULTI_LINE_END_MARKER = "###" +MULTI_LINE_PROMPT = f"{Fore.MAGENTA}(Enter multi-line mode. Press Enter on empty line to submit){Style.RESET_ALL}" +MULTI_LINE_END_MARKER = "" # Error Messages ERROR_NO_API_KEY = "API key not set" diff --git a/knowledge/wordlist.txt b/knowledge/wordlist.txt index 470d954..ee25af5 100644 --- a/knowledge/wordlist.txt +++ b/knowledge/wordlist.txt @@ -11,6 +11,7 @@ index.php robots.txt .htaccess uploads +testpass images js css diff --git a/tools/configure_mcp.py b/tools/configure_mcp.py index 7c7f6b0..6c6f9c4 100644 --- a/tools/configure_mcp.py +++ b/tools/configure_mcp.py @@ -147,6 +147,16 @@ MCP_SERVERS = [ "env_var": "HTTPX_PATH", "homepage": "https://www.npmjs.com/package/gc-httpx-mcp" }, + { + "name": "Hydra", + "key": "Hydra", + "command": "npx", + "args": ["-y", "gc-hydra-mcp"], + "description": "MCP server for password brute-force attacks and credential testing using the Hydra tool.", + "exe_name": "hydra.exe", + "env_var": "HYDRA_PATH", + "homepage": "https://www.npmjs.com/package/gc-hydra-mcp" + }, { "name": "Katana", "key": "Katana", diff --git a/ui/menu_system.py b/ui/menu_system.py index f0c87d7..75809c7 100644 --- a/ui/menu_system.py +++ b/ui/menu_system.py @@ -49,12 +49,12 @@ class MenuSystem: def get_multi_line_input() -> Optional[str]: """Get multi-line input from user.""" print(f"{Fore.CYAN}Entering multi-line mode. Type your query across multiple lines.{Style.RESET_ALL}") - print(f"{Fore.CYAN}Type '{MULTI_LINE_END_MARKER}' to end input.{Style.RESET_ALL}") + print(f"{Fore.CYAN}Press Enter on empty line to submit.{Style.RESET_ALL}") lines = [] while True: line = input() - if line == MULTI_LINE_END_MARKER: + if line == "": # Empty line ends input break lines.append(line)