kali_network_exploitation
Execute network exploitation and post-exploitation operations using tools like nc, socat, scapy, or chisel to assess target systems and identify vulnerabilities.
Instructions
Network exploitation and post-exploitation tools
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| tool | Yes | Tool to use (nc, socat, scapy, chisel, etc.) | nc |
| target | No | Target host:port | |
| options | No | Additional options |