tools:
- name: nuclei_scan
description: Run Nuclei vulnerability scanner against a target
run:
kind: shell
cmd: "nuclei -c {{concurrency}} -t {{target}} -severity {{severity}}"
args:
target:
type: string
description: "Target URL or IP address (e.g., https://example.com)"
required: true
severity:
type: string
description: "Severity filter (critical, high, medium, low, info)"
required: false
default: "high"
concurrency:
type: int
description: "Number of concurrent requests (1-100)"
required: false
default: 10
- name: nmap_scan
description: Run Nmap network scanner for port discovery
run:
kind: shell
cmd: "nmap {{scan_type}} -p {{ports}} {{target}}"
args:
target:
type: string
description: "Target IP address or hostname"
required: true
scan_type:
type: string
description: "Scan type flag (-sS, -sT, -sV, -sA, etc.)"
required: false
default: "-sV"
ports:
type: string
description: "Port range to scan (e.g., 1-1000, 80,443, -)"
required: false
default: "-"
- name: subfinder_enum
description: Discover subdomains using Subfinder
run:
kind: shell
cmd: "subfinder -d {{domain}} -silent {{recursive}}"
args:
domain:
type: string
description: "Target domain to enumerate (e.g., example.com)"
required: true
recursive:
type: string
description: "Enable recursive enumeration (-recursive flag or empty)"
required: false
default: ""
- name: amass_enum
description: Perform attack surface mapping with OWASP Amass
run:
kind: shell
cmd: "amass enum -d {{domain}} {{passive}}"
args:
domain:
type: string
description: "Target domain for attack surface mapping"
required: true
passive:
type: string
description: "Passive mode flag (-passive or empty for active)"
required: false
default: "-passive"