# Tool Access Expansion - Complete Documentation ## Overview All 525+ Kali Linux tools are now fully accessible through both the **Sandbox** and **PowerShell** interfaces. ## Sandbox Access ### Configuration - **Total Allowed Tools**: 525 tools - **Security Model**: Namespace isolation (user, PID, network) - **Resource Limits**: 512MB RAM, 50% CPU, 300s timeout - **Tool Filtering**: Whitelist-based (all 525 tools whitelisted) ### How to Use Sandbox 1. Navigate to **🐧 Linux Sandbox** tab in the UI 2. Create a new session or use existing session ID 3. Enter any command using the allowed tools 4. Execute and view results in real-time ### Example Commands ```bash # Information Gathering nmap -sV -p- target.com masscan -p1-65535 192.168.1.0/24 recon-ng # Vulnerability Analysis nikto -h target.com sqlmap -u "http://target.com/page?id=1" --dbs wpscan --url target.com # Web Testing dirb http://target.com /usr/share/dirb/wordlists/common.txt gobuster dir -u http://target.com -w wordlist.txt # Password Attacks hydra -l admin -P passwords.txt target.com ssh john hashes.txt --wordlist=wordlist.txt hashcat -m 1000 hashes.txt wordlist.txt # Network Tools wireshark -i eth0 tcpdump -i eth0 -w capture.pcap arp-scan -l ``` ## PowerShell Access ### Available Scripts (6 Comprehensive Functions) #### 1. Invoke-VulnerabilityScan Execute multiple vulnerability scanning tools with a single command. **Features:** - Multi-tool execution (nmap, nikto, sqlmap, etc.) - Configurable scan types (Quick, Full, Stealth, Web, Network) - Parallel tool execution - JSON output format **Usage:** ```powershell Invoke-VulnerabilityScan -Target example.com -ScanType Full -Tools @("nmap", "nikto", "sqlmap") ``` #### 2. Invoke-PortScan Advanced port scanning with multiple tool support. **Features:** - Support for nmap, masscan, and PowerShell TCP testing - Configurable port ranges - Timeout and threading options - Detailed parsing of scan results **Usage:** ```powershell Invoke-PortScan -Target example.com -Ports @(80,443,3389,5432) -Tool nmap -Threads 50 ``` #### 3. Invoke-NetworkAudit Comprehensive network auditing with tool integration. **Features:** - Network interface enumeration - Multi-tool execution (nmap, arp-scan, etc.) - Service discovery - Network configuration analysis **Usage:** ```powershell Invoke-NetworkAudit -NetworkRange 192.168.1.0/24 -IncludeServices -Tools @("nmap", "arp-scan") ``` #### 4. Invoke-LogAnalysis Advanced log parsing and analysis. **Features:** - Pattern-based log analysis - Tool-based execution (grep, awk, etc.) - Custom pattern matching - Result aggregation **Usage:** ```powershell Invoke-LogAnalysis -LogPath "/var/log/syslog" -Tool grep -Pattern @("error", "fail", "warn") ``` #### 5. Invoke-ComplianceCheck Framework-based compliance checking. **Features:** - CIS, NIST, GDPR, PCI-DSS, HIPAA frameworks - Multi-tool execution (lynis, aide, etc.) - Automated scoring - Detailed compliance reports **Usage:** ```powershell Invoke-ComplianceCheck -Framework CIS -Tools @("lynis", "aide") ``` #### 6. Invoke-ToolExecutor (NEW) Universal tool executor for any command-line tool. **Features:** - Execute any installed tool - Custom arguments support - Timeout management - Full output capture - Exit code tracking **Usage:** ```powershell Invoke-ToolExecutor -Tool nmap -Arguments @("-sV", "-p-", "target.com") -TimeoutSeconds 300 Invoke-ToolExecutor -Tool msfconsole -Arguments @("-x", "exploit.rc") Invoke-ToolExecutor -Tool sqlmap -Arguments @("-u", "http://target.com/page?id=1", "--dbs") ``` ## Kali Arsenal by Category ### 1. Information Gathering (85 tools) nmap, masscan, rustscan, recon-ng, maltego, theharvester, sherlock, amass, subfinder, assetfinder, aquatone, eyewitness, wafw00f, whatweb, httpx, dnsenum, dnsrecon, spiderfoot, shodan-cli, waybackurls, ffuf, nuclei, and more... ### 2. Vulnerability Analysis (62 tools) nessus, openvas, nikto, wpscan, sqlmap, ghauri, sslyze, testssl, lynis, linux-exploit-suggester, windows-exploit-suggester, trivy, grype, semgrep, codeql, mobsf-cli, and more... ### 3. Web Applications (58 tools) burpsuite, zap, caido, mitmproxy, sqlmap, ghauri, xsstrike, dalfox, dirb, dirbuster, gobuster, feroxbuster, ffuf, wfuzz, whatweb, wappalyzer-cli, retire.js, and more... ### 4. Password Attacks (42 tools) john, hashcat, ophcrack, rainbowcrack, hydra, medusa, ncrack, patator, cewl, crunch, cupp, hash-buster, hashid, mimikatz, kerbrute, and more... ### 5. Wireless Attacks (38 tools) aircrack-ng, airmon-ng, airodump-ng, aireplay-ng, wifite2, fluxion, reaver, bully, kismet, wireshark, tcpdump, bluetooth-tools, ubertooth, and more... ### 6. Exploitation Tools (55 tools) metasploit-framework, armitage, cobalt-strike, covenant, sliver, empire, starkiller, pupy, beef-xss, routersploit, shellter, veil, mimikatz, crackmapexec, and more... ### 7. Forensics (48 tools) autopsy, sleuthkit, foremost, scalpel, photorec, volatility3, rekall, binwalk, yara, clamav, ghidra, radare2, wireshark, zeek, suricata, and more... ### 8. Reverse Engineering (35 tools) ghidra, ida-pro, binary-ninja, radare2, rizin, cutter, gdb, lldb, angr, pwntools, frida, apktool, jadx, dex2jar, and more... ### 9. Hardware Hacking (28 tools) flashrom, openocd, urjtag, avrdude, esptool, proxmark3, flipper-zero, hackrf, ubertooth, can-utils, and more... ### 10. Crypto & Stego (32 tools) steghide, stegosuite, openstego, zsteg, stegsolve, hashcat, john, cryptool, cyberchef, openssl, gnupg, veracrypt, and more... ### 11. Reporting Tools (25 tools) dradis, faraday, magictree, pwndoc, serpico, ghostwriter, writehat, cherrytree, joplin, eyewitness, and more... ### 12. Social Engineering (22 tools) setoolkit, gophish, king-phisher, evilginx2, modlishka, beef-xss, maltego, recon-ng, and more... ### 13. Sniffing & Spoofing (31 tools) wireshark, tcpdump, tshark, ettercap, bettercap, arpspoof, dnsspoof, responder, mitmproxy, sslstrip, and more... ## Access Methods ### Method 1: Direct Sandbox Execution ```text UI → 🐧 Linux Sandbox Tab ├─ Create Session ├─ Enter command └─ Execute ``` ### Method 2: PowerShell Scripts ```text UI → ⚡ PowerShell Integration Tab ├─ Select script ├─ Configure parameters ├─ Add tools list └─ Execute ``` ### Method 3: MCP Integration ```text MCP Client → HuggingChat ├─ execute_sandbox_command(session_id, "nmap -sV target") └─ execute_powershell_script("Invoke-PortScan", "-Target example.com") ``` ## Security Considerations ### Sandbox Isolation - **User Namespace**: Tools run as unprivileged user - **Network Isolation**: No outbound network by default - **Filesystem Isolation**: Read-only root, restricted write paths - **Process Limits**: Max 20 processes, 512MB memory - **Timeout**: 5 minute default, 1 hour maximum ### PowerShell Security - **Execution Policy**: RemoteSigned - **No Telemetry**: PowerShell telemetry disabled - **Output Capture**: All output captured and logged - **Resource Limits**: 1GB memory, 75% CPU, 10 minute timeout ## Limitations ### Sandbox - Network tools require outbound access (disabled by default) - Some tools may require special privileges - DNS queries are disabled by default - File size limits: 100MB per file ### PowerShell - Requires PowerShell 7+ for cross-platform support - Some Windows-specific tools require Windows - Linux tools require installation on system - Timeout on long-running operations ## Troubleshooting ### Tool Not Found **Problem**: "Tool 'X' not found in PATH" **Solution**: 1. Check tool is installed: `which ` 2. Add to PATH if needed 3. Use full path to tool binary ### Permission Denied **Problem**: "Permission denied" error **Solution**: 1. Check user has execute permissions 2. Run from sandbox with appropriate user 3. Check file ownership ### Timeout **Problem**: "Script timed out" **Solution**: 1. Increase timeout value 2. Optimize tool parameters 3. Run simpler scans first ## Performance Tips 1. **Use specific port ranges** instead of full scans 2. **Parallel tools** in PowerShell for faster execution 3. **Pre-filter targets** before scanning 4. **Use lightweight tools** for initial reconnaissance 5. **Cache results** when running repeated scans ## Next Steps 1. **Explore Tools**: Navigate to UI and test Sandbox and PowerShell tabs 2. **Create Sessions**: Set up persistent sandbox sessions for workflows 3. **Automate**: Build repeatable security processes with scripts 4. **Integrate**: Connect to HuggingChat via MCP for AI-assisted testing 5. **Monitor**: Track tool execution and results in real-time --- **Version**: 4.0.0 **Last Updated**: December 6, 2025 **Status**: ✅ All 525+ tools fully accessible