-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- pandas was used to load the dataset web.json in store.py; now the dataset schema is changed and it is loaded without pandas - requests was used in web_search.py tool, since ollama has httpx as dependency I used it (httpx) also in the web search tool - spacy is only used for chunking, even if this can't be removed only basic spacy functionality is needed, so switched to spacy[lookups] - rich was included in the requirements-api.txt even if it wasn't used in the backend
- Loading branch information
1 parent
9f05141
commit 524166d
Showing
12 changed files
with
121 additions
and
443 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,17 +1,12 @@ | ||
fastapi~=0.111.0 | ||
ollama~=0.3.1 | ||
qdrant-client~=1.9.0 | ||
spacy~=3.7.5 | ||
uvicorn | ||
python-dotenv~=1.0.1 | ||
requests~=2.32.3 | ||
rich~=13.7.1 | ||
numpy~=1.26.4 | ||
fastapi[standard] | ||
ollama | ||
qdrant-client | ||
python-dotenv | ||
pydantic_settings | ||
httpx | ||
tool-parse | ||
docker | ||
pandas~=2.2.2 | ||
tqdm~=4.66.4 | ||
newspaper3k | ||
psutil | ||
lxml_html_clean | ||
spacy[lookups] | ||
psutil | ||
uvicorn |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,8 +6,6 @@ | |
Memory | ||
) | ||
from src.core.tools import ( | ||
ExploitDB, | ||
Terminal, | ||
Search, | ||
TOOL_REGISTRY | ||
) | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
[ | ||
{ | ||
"category": "Web", | ||
"activity": "code_writing", | ||
"input": "While experimenting with SQLi I found the following ways to bypass a client-side filter:\nOR: OORR\nAND: AANDND\nSELECT: SESELECTLECT\nUNION: UNUNIONION\nORDER BY: OORRDER BY\n\nWrite the tamper script for sqlmap to use this filter bypass techniques.", | ||
"router": { | ||
"default": 1, | ||
"reasoning": 1, | ||
"tool": 0 | ||
} | ||
}, | ||
{ | ||
"category": "Web", | ||
"activity": "tool_usage", | ||
"input": "I am doing a CTF, i recorded this request with burp:\nPOST /adminLogin007.php HTTP/1.1\nHost: 10.10.232.63\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate, br\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 36\nOrigin: http://10.10.232.63\nConnection: keep-alive\nReferer: http://10.10.232.63/adminLogin007.php\nCookie: PHPSESSID=ooi4eckq3k748ed6ed2f6m0bhv\nUpgrade-Insecure-Requests: 1\n\nmail=dev%40injectics.thm&pass=123456\n\nI want to brute force the password, the succcessufll logi nshould redirect me to a admin dashboard, when wrong password is used I can see a div with class alert alert-danger and \"Invalid email or password.\" as content. Write the hydra command.", | ||
"router": { | ||
"default": 1, | ||
"reasoning": 1, | ||
"tool": 0 | ||
} | ||
}, | ||
{ | ||
"category": "Web", | ||
"activity": "general", | ||
"input": "in a CTF, once I gained access to JetBrains TeamCity, I need to get remote access (ex. via RCE). Can you find a vulnerability?", | ||
"router": { | ||
"default": 0, | ||
"reasoning": 0, | ||
"tool": 1 | ||
} | ||
}, | ||
{ | ||
"category": "OS", | ||
"activity": "code_reading", | ||
"input": "I can execute the following script as sudo, however I can't edit it. \n```\necho \"Enter your feedback:\"\nread feedback\n\n\nif [[ \"$feedback\" != *\"\\`\"* && \"$feedback\" != *\")\"* && \"$feedback\" != *\"\\$(\"* && \"$feedback\" != *\"|\"* && \"$feedback\" != *\"&\"* && \"$feedback\" != *\";\"* && \"$feedback\" != *\"?\"* && \"$feedback\" != *\"!\"* && \"$feedback\" != *\"\\\\\"* ]]; then\n echo \"It is This:\"\n eval \"echo $feedback\"\n\n echo \"$feedback\" >> /var/log/feedback.txt\n echo \"Feedback successfully saved.\"\nelse\n echo \"Invalid input. Please provide a valid input.\" \nfi\n```\n\nIs there any way I can exploit it?", | ||
"router": { | ||
"default": 0, | ||
"reasoning": 1, | ||
"tool": 0 | ||
} | ||
}, | ||
{ | ||
"category": "OS", | ||
"activity": "general", | ||
"input": "with this information how can I do privilege escalation?\n\n**Permissions**\nUser jake may run the following commands on smag:\n (ALL : ALL) NOPASSWD: /usr/bin/apt-get\n \n\n**PATH**\n/home/jake/bin:/home/jake/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games\n- user home and home/bin is under path", | ||
"router": { | ||
"default": 0, | ||
"reasoning": 1, | ||
"tool": 1 | ||
} | ||
} | ||
] |
Oops, something went wrong.