messages listlengths 3 3 | system stringclasses 4
values | user stringlengths 9 104 | response stringlengths 6 2k | metadata unknown |
|---|---|---|---|---|
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is 0d1n?"
},
{
"role": "assistan... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is 0d1n? | 0d1n is a web application security testing tool. Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.
Homepage: https://github.com/CoolerVoid/0d1n
Category: blackarch-webapp | {
"tool_name": "0d1n",
"category": "blackarch-webapp",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "How do I install 0d1n on BlackArch?"
},
{
"role": "assistant",
"cont... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | How do I install 0d1n on BlackArch? | sudo pacman -S 0d1n | {
"tool_name": "0d1n",
"category": "blackarch-webapp",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the most useful 0d1n command-line options?"
},
{
"role": "assistant",
... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the most useful 0d1n command-line options? | No parsed docs were found for 0d1n. Start with:
- 0d1n --help
- man 0d1n
- <command> -h (if supported by the tool) | {
"tool_name": "0d1n",
"category": "blackarch-webapp",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_fallback_help"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | What is the 0d1n command to get usage help for 0d1n? | 0d1n --help
man 0d1n | {
"tool_name": "0d1n",
"category": "blackarch-webapp",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_fallback_help"
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "Tell me about the 0trace tool"
},
{
"... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | Tell me about the 0trace tool | 0trace is a network and vulnerability scanning tool. A hop enumeration tool.
Homepage: http://jon.oberheide.org/0trace/
Category: blackarch-scanner | {
"tool_name": "0trace",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "Install 0trace on Arch Linux"
},
{
"role": "assistant",
"content": "... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | Install 0trace on Arch Linux | sudo pacman -S 0trace | {
"tool_name": "0trace",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the main flags for 0trace?"
},
{
"role": "assistant",
"content": "Us... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the main flags for 0trace? | Usage: 0trace hop enumeration tool. 0trace was originally announced on | {
"tool_name": "0trace",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Give me the 0trace command for: get usage help for 0trace | 0trace --help
man 0trace | {
"tool_name": "0trace",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_fallback_help"
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is 3proxy?"
},
{
"role": "assist... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is 3proxy? | 3proxy is a proxy and traffic interception tool. Tiny free proxy server.
Homepage: https://github.com/3proxy/3proxy
Category: blackarch-proxy | {
"tool_name": "3proxy",
"category": "blackarch-proxy",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "How do I install 3proxy on BlackArch?"
},
{
"role": "assistant",
"co... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | How do I install 3proxy on BlackArch? | sudo pacman -S 3proxy | {
"tool_name": "3proxy",
"category": "blackarch-proxy",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | run 3proxy using 3proxy | 3proxy [path_to_config_file] --install | {
"tool_name": "3proxy",
"category": "blackarch-proxy",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Use 3proxy to run 3proxy | 3proxy --remove | {
"tool_name": "3proxy",
"category": "blackarch-proxy",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | How do I use 3proxy to run 3proxy? | /etc/3proxy/conf/add3proxyuser.sh username password [day_limit] [bandwidth] | {
"tool_name": "3proxy",
"category": "blackarch-proxy",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | How do I use 3proxy to run 3proxy? | # Load and start service
sudo launchctl load /Library/LaunchDaemons/org.3proxy.3proxy.plist
# Stop service
sudo launchctl stop org.3proxy.3proxy
# Start service
sudo launchctl start org.3proxy.3proxy
# Unload and disable service
sudo launchctl unload /Library/LaunchDaemons/org.3proxy.3proxy.plist | {
"tool_name": "3proxy",
"category": "blackarch-proxy",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | How do I use 3proxy to run 3proxy? | 3proxy uses 2 configuration files: | {
"tool_name": "3proxy",
"category": "blackarch-proxy",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Show me how to run 3proxy with 3proxy | 3proxy - tiny free proxy server | {
"tool_name": "3proxy",
"category": "blackarch-proxy",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the main flags for 3proxy?"
},
{
"role": "assistant",
"content": "Us... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the main flags for 3proxy? | Usage: 3proxy [path_to_config_file] --install
Important flags/options:
- --install
- --remove
- --help | {
"tool_name": "3proxy",
"category": "blackarch-proxy",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is 3proxy-win32 used for in penetration ... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is 3proxy-win32 used for in penetration testing? | 3proxy-win32 is a Windows security testing and post-exploitation tool. Tiny free proxy server.
Homepage: http://3proxy.ru/
Category: blackarch-windows | {
"tool_name": "3proxy-win32",
"category": "blackarch-windows",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "How do I install 3proxy-win32 on BlackArch?"
},
{
"role": "assistant",
... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | How do I install 3proxy-win32 on BlackArch? | sudo pacman -S 3proxy-win32 | {
"tool_name": "3proxy-win32",
"category": "blackarch-windows",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the most useful 3proxy-win32 command-line options?"
},
{
"role": "assist... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the most useful 3proxy-win32 command-line options? | Important flags/options:
- -Ne / -Ni options added to specify external / internal NAT address for SOCKSv5
- -g option is added for grace delay to reduce CPU load, | {
"tool_name": "3proxy-win32",
"category": "blackarch-windows",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Show me how to get usage help for 3proxy-win32 with 3proxy-win32 | 3proxy-win32 --help
man 3proxy-win32 | {
"tool_name": "3proxy-win32",
"category": "blackarch-windows",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_fallback_help"
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is 42zip used for in penetration testing... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is 42zip used for in penetration testing? | 42zip is a denial of service testing tool. Recursive Zip archive bomb.
Homepage: http://blog.fefe.de/?ts=b6cea88d
Category: blackarch-dos | {
"tool_name": "42zip",
"category": "blackarch-dos",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "Set up 42zip on BlackArch Linux"
},
{
"role": "assistant",
"content"... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | Set up 42zip on BlackArch Linux | sudo pacman -S 42zip | {
"tool_name": "42zip",
"category": "blackarch-dos",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the main flags for 42zip?"
},
{
"role": "assistant",
"content": "No ... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the main flags for 42zip? | No parsed docs were found for 42zip. Start with:
- 42zip --help
- man 42zip
- <command> -h (if supported by the tool) | {
"tool_name": "42zip",
"category": "blackarch-dos",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_fallback_help"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Use 42zip to get usage help for 42zip | 42zip --help
man 42zip | {
"tool_name": "42zip",
"category": "blackarch-dos",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_fallback_help"
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is a2sv used for in penetration testing?... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is a2sv used for in penetration testing? | a2sv is a network and vulnerability scanning tool. Auto Scanning to SSL Vulnerability.
Homepage: https://github.com/hahwul/a2sv
Category: blackarch-scanner | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "What is the command to install a2sv?"
},
{
"role": "assistant",
"con... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | What is the command to install a2sv? | sudo pacman -S a2sv | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Run a2sv to run a2sv | - CVE-2007-1858] Anonymous Cipher
- CVE-2012-4929] CRIME(SPDY)
- CVE-2014-0160] CCS Injection
- CVE-2014-0224] HeartBleed
- CVE-2014-3566] SSLv3 POODLE
- CVE-2015-0204] FREAK Attack
- CVE-2015-4000] LOGJAM Attack
- CVE-2016-0800] SSLv2 DROWN | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Run a2sv to run a2sv | - PLAN] SSL ACCF
- PLAN] SSL Information Analysis | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | How do I use a2sv to run a2sv? | $ git clone https://github.com/hahwul/a2sv.git
$ cd a2sv | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Run a2sv to run a2sv | $ pip install argparse
$ pip install netaddr
$ apt-get install openssl | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Run a2sv to run a2sv | $ python a2sv.py -h | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Show me how to run a2sv with a2sv | usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
[-d DISPLAY] [-u] [-v]
optional arguments:
-h, --helpshow this help message and exit
-t TARGET, --target TARGET
Target URL and IP Address
$ e.g -t 127.0.0.1
-tf TARGETFILE, --targetfile TARGETFILE
Target file(list) URL and IP Address
$ e.g -tf... | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Give me the a2sv command for: run a2sv | $ python a2sv.py -t 127.0.0.1
$ python a2sv.py -t 127.0.0.1 -m heartbleed
$ python a2sv.py -t 127.0.0.1 -d n
$ python a2sv.py -t 127.0.0.1 -p 8111
$ python a2sv.py -tf target_list.txt | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Use a2sv to run a2sv | $ python a2sv.py -u
$ python a2sv.py --update | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | What is the a2sv command to run a2sv? | a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE] | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "Show me a2sv options and flags"
},
{
"role": "assistant",
"content": "Usage: ... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | Show me a2sv options and flags | Usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
Important flags/options:
- -h, --helpshow this help message and exit
- -t TARGET, --target TARGET
- -tf TARGETFILE, --targetfile TARGETFILE
- -p PORT, --port PORT Custom Port / Default: 443
- -m MODULE, --module MODULE
- -d DISPLAY, --display DISPLAY
... | {
"tool_name": "a2sv",
"category": "blackarch-scanner",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "Tell me about the abcd tool"
},
{
"ro... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | Tell me about the abcd tool | abcd is a disassembly and binary analysis tool. ActionScript ByteCode Disassembler.
Homepage: https://github.com/MITRECND/abcd
Category: blackarch-disassembler | {
"tool_name": "abcd",
"category": "blackarch-disassembler",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "Install abcd on Arch Linux"
},
{
"role": "assistant",
"content": "su... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | Install abcd on Arch Linux | sudo pacman -S abcd | {
"tool_name": "abcd",
"category": "blackarch-disassembler",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "Show me abcd options and flags"
},
{
"role": "assistant",
"content": "No pars... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | Show me abcd options and flags | No parsed docs were found for abcd. Start with:
- abcd --help
- man abcd
- <command> -h (if supported by the tool) | {
"tool_name": "abcd",
"category": "blackarch-disassembler",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_fallback_help"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | How do I use abcd to get usage help for abcd? | abcd --help
man abcd | {
"tool_name": "abcd",
"category": "blackarch-disassembler",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_fallback_help"
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is above?"
},
{
"role": "assista... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is above? | above is a network traffic sniffing and analysis tool. Network Protocols Sniffer.
Homepage: https://github.com/casterbyte/Above
Category: blackarch-sniffer | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "Set up above on BlackArch Linux"
},
{
"role": "assistant",
"content"... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | Set up above on BlackArch Linux | sudo pacman -S above | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | How do I use above to run above? | usage: above.py [-h] [--interface INTERFACE] [--timer TIMER] [--output OUTPUT] [--input INPUT] [--passive-arp] [--search-vlan]
options:
-h, --help show this help message and exit
--interface INTERFACE
Interface for traffic listening
--timer TIMER Time in seconds t... | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | What is the above command to run above? | caster@kali:~$ sudo apt update && sudo apt install above | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Run above to run above | :~$ sudo apt-get install python3-scapy python3-colorama python3-setuptools
:~$ git clone https://github.com/caster0x00/above
:~$ cd above/
:~/above$ sudo python3 setup.py install | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | What is the above command to run above? | # Install python3 first
brew install python3
# Then install required dependencies
sudo pip3 install scapy colorama setuptools
# Clone the repo
git clone https://github.com/caster0x00/above
cd above/
sudo python3 setup.py install | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | run above using above | caster@kali:~$ sudo above --interface eth0 --timer 120 | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | What is the above command to run above? | caster@kali:~$ sudo above --interface eth0 --timer 120
___ __
/ | / /_ ____ _ _____
/ /| | / __ \/ __ \ | / / _ \
/ ___ |/ /_/ / /_/ / |/ / __/
/_/ |_/_.___/\____/|___/\___/
Above: Network Security Sniffer
Developer: Mahama Bazarov (Caster)
... | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Run above to run above | caster@kali:~$ sudo above --interface eth0 --timer 120 --output above.pcap | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | How do I use above to run above? | caster@kali:~$ above --input hsrp.cap | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Give me the above command for: run above | caster@kali:~$ sudo above --input hsrp.cap
___ __
/ | / /_ ____ _ _____
/ /| | / __ \/ __ \ | / / _ \
/ ___ |/ /_/ / /_/ / |/ / __/
/_/ |_/_.___/\____/|___/\___/
Above: Network Security Sniffer
Developer: Mahama Bazarov (Caster)
Contact:... | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Use above to run above | caster@kali:~$ sudo above --interface eth0 --passive-arp
[+] Starting Host Discovery...
[*] IP and MAC addresses will be saved to 'above_passive_arp.txt' | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the most useful above command-line options?"
},
{
"role": "assistant",
... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the most useful above command-line options? | Usage: above.py [-h] [--interface INTERFACE] [--timer TIMER] [--output OUTPUT] [--input INPUT] [--passive-arp] [--search-vlan]
Important flags/options:
- -h, --help show this help message and exit
- --interface INTERFACE
- --timer TIMER Time in seconds to capture packets, default: not set
- --output ... | {
"tool_name": "above",
"category": "blackarch-sniffer",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is abuse-ssl-bypass-waf?"
},
{
"... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is abuse-ssl-bypass-waf? | abuse-ssl-bypass-waf is a web application security testing tool. Bypassing WAF by abusing SSL/TLS Ciphers.
Homepage: https://github.com/LandGrey/abuse-ssl-bypass-waf
Category: blackarch-webapp | {
"tool_name": "abuse-ssl-bypass-waf",
"category": "blackarch-webapp",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "Set up abuse-ssl-bypass-waf on BlackArch Linux"
},
{
"role": "assistant"... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | Set up abuse-ssl-bypass-waf on BlackArch Linux | sudo pacman -S abuse-ssl-bypass-waf | {
"tool_name": "abuse-ssl-bypass-waf",
"category": "blackarch-webapp",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | How do I use abuse-ssl-bypass-waf to run abuse-ssl-bypass-waf? | abuse-ssl-bypass-waf | {
"tool_name": "abuse-ssl-bypass-waf",
"category": "blackarch-webapp",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the most useful abuse-ssl-bypass-waf command-line options?"
},
{
"role":... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the most useful abuse-ssl-bypass-waf command-line options? | Important flags/options:
- -thread | {
"tool_name": "abuse-ssl-bypass-waf",
"category": "blackarch-webapp",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What does acccheck do?"
},
{
"role": ... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What does acccheck do? | acccheck is a password cracking and hash breaking tool. A password dictionary attack tool that targets windows authentication via the SMB protocol.
Homepage: http://labs.portcullis.co.uk/tools/acccheck/
Category: blackarch-cracker | {
"tool_name": "acccheck",
"category": "blackarch-cracker",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "What is the command to install acccheck?"
},
{
"role": "assistant",
... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | What is the command to install acccheck? | sudo pacman -S acccheck | {
"tool_name": "acccheck",
"category": "blackarch-cracker",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the most useful acccheck command-line options?"
},
{
"role": "assistant"... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the most useful acccheck command-line options? | Usage: acccheck | Portcullis Labs | {
"tool_name": "acccheck",
"category": "blackarch-cracker",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Show me how to get usage help for acccheck with acccheck | acccheck --help
man acccheck | {
"tool_name": "acccheck",
"category": "blackarch-cracker",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_fallback_help"
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is ace?"
},
{
"role": "assistant... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is ace? | ace is a VoIP security testing tool. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface.
Homepage: https://ucsniff.sourceforge.net/ace.html
Category: blackarch-... | {
"tool_name": "ace",
"category": "blackarch-voip",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "How do I install ace on BlackArch?"
},
{
"role": "assistant",
"conte... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | How do I install ace on BlackArch? | sudo pacman -S ace | {
"tool_name": "ace",
"category": "blackarch-voip",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Give me the ace command for: run ace | ACE v1.0: Automated Corporate (Data) Enumerator<br> | {
"tool_name": "ace",
"category": "blackarch-voip",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Show me how to run ace with ace | ace [-i interface] [ -m mac address ] [ -t tftp server ip address | -c cdp mode | -v voice vlan id | -r vlan interface | -d verbose mode ]<br><br> | {
"tool_name": "ace",
"category": "blackarch-voip",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Run ace to run ace | ace -t <TFTP-Server-IP> -m <MAC-Address><br><br> | {
"tool_name": "ace",
"category": "blackarch-voip",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "Show me ace options and flags"
},
{
"role": "assistant",
"content": "Usage: a... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | Show me ace options and flags | Usage: ace [-i interface] [ -m mac address ] [ -t tftp server ip address | -c cdp mode | -v voice vlan id | -r vlan interface | -d verbose mode ]
Important flags/options:
- -d (Optional) Verbose | debug mode | {
"tool_name": "ace",
"category": "blackarch-voip",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is aclpwn?"
},
{
"role": "assist... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is aclpwn? | aclpwn is a exploit development and execution tool. Active Directory ACL exploitation with BloodHound.
Homepage: https://github.com/fox-it/aclpwn.py
Category: blackarch-exploitation | {
"tool_name": "aclpwn",
"category": "blackarch-exploitation",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "Install aclpwn on Arch Linux"
},
{
"role": "assistant",
"content": "... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | Install aclpwn on Arch Linux | sudo pacman -S aclpwn | {
"tool_name": "aclpwn",
"category": "blackarch-exploitation",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the main flags for aclpwn?"
},
{
"role": "assistant",
"content": "No... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the main flags for aclpwn? | No parsed docs were found for aclpwn. Start with:
- aclpwn --help
- man aclpwn
- <command> -h (if supported by the tool) | {
"tool_name": "aclpwn",
"category": "blackarch-exploitation",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_fallback_help"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Use aclpwn to get usage help for aclpwn | aclpwn --help
man aclpwn | {
"tool_name": "aclpwn",
"category": "blackarch-exploitation",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_fallback_help"
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What does activedirectoryenum do?"
},
{
... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What does activedirectoryenum do? | activedirectoryenum is a reconnaissance and information gathering tool. Enumerate AD through LDAP.
Homepage: https://github.com/CasperGN/ActiveDirectoryEnumeration
Category: blackarch-recon | {
"tool_name": "activedirectoryenum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "Set up activedirectoryenum on BlackArch Linux"
},
{
"role": "assistant",... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | Set up activedirectoryenum on BlackArch Linux | sudo pacman -S activedirectoryenum | {
"tool_name": "activedirectoryenum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Give me the activedirectoryenum command for: run activedirectoryenum | $ python -m ade --exploit cve-2020-1472
Exploit for: cve-2020-1472 can be found at: https://github.com/dirkjanm/CVE-2020-1472 | {
"tool_name": "activedirectoryenum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Run activedirectoryenum to run activedirectoryenum | pacman -S activedirectoryenum | {
"tool_name": "activedirectoryenum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "Show me activedirectoryenum options and flags"
},
{
"role": "assistant",
"con... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | Show me activedirectoryenum options and flags | Usage: ade [-h] [--dc DC] [-o OUT_FILE] [-u USER] [-s] [-smb] [-kp] [-bh] [-spn] [-sysvol] [--all] [--no-creds] [--dry-run]
Important flags/options:
- -h, --help show this help message and exit
- --dc DC Hostname of the Domain Controller
- -o OUT_FILE, --out-file OUT_FILE
- -u USER, --user USER... | {
"tool_name": "activedirectoryenum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "Tell me about the ad-ldap-enum tool"
},
{... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | Tell me about the ad-ldap-enum tool | ad-ldap-enum is a reconnaissance and information gathering tool. An LDAP based Active Directory user and group enumeration tool.
Homepage: https://github.com/CroweCybersecurity/ad-ldap-enum
Category: blackarch-recon | {
"tool_name": "ad-ldap-enum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "What is the command to install ad-ldap-enum?"
},
{
"role": "assistant",
... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | What is the command to install ad-ldap-enum? | sudo pacman -S ad-ldap-enum | {
"tool_name": "ad-ldap-enum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | What is the ad-ldap-enum command to run ad-ldap-enum? | python -m pip install -r requirements.txt | {
"tool_name": "ad-ldap-enum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Show me how to run ad-ldap-enum with ad-ldap-enum | Quick examples: | {
"tool_name": "ad-ldap-enum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Give me the ad-ldap-enum command for: run ad-ldap-enum | ad-ldap-enum | {
"tool_name": "ad-ldap-enum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | What is the ad-ldap-enum command to run ad-ldap-enum? | ad-ldap-enum.py [-h] (-n | -u USERNAME | -dn DISTINGUISHED_NAME) [-k] [-p PASSWORD] [-P] [--ccache CCACHE_FILE] | {
"tool_name": "ad-ldap-enum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the most useful ad-ldap-enum command-line options?"
},
{
"role": "assist... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the most useful ad-ldap-enum command-line options? | Usage: ad-ldap-enum.py [-h] (-n | -u USERNAME | -dn DISTINGUISHED_NAME) [-k] [-p PASSWORD] [-P] [--ccache CCACHE_FILE]
Important flags/options:
- -l LDAP_SERVER [--port PORT] -d DOMAIN [-a ALT_DOMAIN] [-e] [-4] [-6]
- -h, --help show this help message and exit
- -n, --null Use anonymous/null authe... | {
"tool_name": "ad-ldap-enum",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What is ad-miner?"
},
{
"role": "assi... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What is ad-miner? | ad-miner is a reconnaissance and information gathering tool. Active Directory audit tool that extract data from Bloodhound to uncover security weaknesses and generate an HTML report
Homepage: https://github.com/Mazars-Tech/AD_Miner
Category: blackarch-recon | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "Install ad-miner on Arch Linux"
},
{
"role": "assistant",
"content":... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | Install ad-miner on Arch Linux | sudo pacman -S ad-miner | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | run ad-miner using ad-miner | pipx install 'git+https://github.com/AD-Security/AD_Miner.git' | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Give me the ad-miner command for: run ad-miner | docker build -t ad-miner . | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Show me how to run ad-miner with ad-miner | docker run -v ${PWD}:/tmp ad-miner AD-miner -b bolt://host.docker.internal:7687 -u neo4j -p mypassword -cf YOUR_PREFIX | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Show me how to run ad-miner with ad-miner | docker run -v ${PWD}:/tmp --network host ad-miner AD-miner -b bolt://localhost:7687 -u neo4j -p mypassword -cf YOUR_PREFIX | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Use ad-miner to run ad-miner | AD-miner [-h] [-b BOLT] [-u USERNAME] [-p PASSWORD] [-e EXTRACT_DATE] [-r RENEWAL_PASSWORD] [-a] [-c] [-l LEVEL] -cf CACHE_PREFIX [-ch NB_CHUNKS] [-co NB_CORES] [--rdp] [--evolution EVOLUTION] [--cluster CLUSTER] | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Use ad-miner to run ad-miner | AD-miner -cf My_Report -u neo4j -p mypassword | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | What is the ad-miner command to run ad-miner? | AD-miner -c -cf My_Report -u neo4j -p mypassword | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Give me the ad-miner command for: run ad-miner | AD-miner -c -cf My_Report -b bolt://server1:7687 -u neo4j -p mypassword --cluster server1:7687:32,server2:7687:16 | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | Give me the ad-miner command for: run ad-miner | AD-miner -c -cf My_Report -b bolt://server:7687 -u neo4j -p mypassword -r 180 | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps... | You are a penetration testing tool expert specializing in BlackArch Linux tools. Provide the exact CLI command(s) to accomplish the requested task, including all necessary flags, arguments, and options. Assume the tool is already installed. If the task requires multiple steps, number them. | run ad-miner using ad-miner | AD-miner -c -cf My_Report -b bolt://server:7687 -u neo4j -p mypassword -r 180 --evolution evolution_folder/ | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_use_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the main flags for ad-miner?"
},
{
"role": "assistant",
"content": "... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the main flags for ad-miner? | Usage: AD-miner [-h] [-b BOLT] [-u USERNAME] [-p PASSWORD] [-e EXTRACT_DATE] [-r RENEWAL_PASSWORD] [-a] [-c] [-l LEVEL] -cf CACHE_PREFIX [-ch NB_CHUNKS] [-co NB_CORES] [--rdp] [--evolution EVOLUTION] [--cluster CLUSTER]
Important flags/options:
- -h, --help show this help message and exit
- -b BOLT, --bolt B... | {
"tool_name": "ad-miner",
"category": "blackarch-recon",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
[
{
"role": "system",
"content": "You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough."
},
{
"role": "user",
"content": "What does adape-script do?"
},
{
"rol... | You are a cybersecurity tool expert. Explain what the given tool does, its primary use cases, key features, and the category of security testing it belongs to. Be concise but thorough. | What does adape-script do? | adape-script is a Windows security testing and post-exploitation tool. Active Directory Assessment and Privilege Escalation Script.
Homepage: https://github.com/hausec/ADAPE-Script
Category: blackarch-windows | {
"tool_name": "adape-script",
"category": "blackarch-windows",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_what_is"
} |
[
{
"role": "system",
"content": "You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux."
},
{
"role": "user",
"content": "How do I install adape-script on BlackArch?"
},
{
"role": "assistant",
... | You are a BlackArch Linux system administrator. Provide the exact commands to install and set up the requested security tool on BlackArch/Arch Linux. | How do I install adape-script on BlackArch? | sudo pacman -S adape-script | {
"tool_name": "adape-script",
"category": "blackarch-windows",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_install"
} |
[
{
"role": "system",
"content": "You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does."
},
{
"role": "user",
"content": "What are the main flags for adape-script?"
},
{
"role": "assistant",
"content... | You are a CLI tool expert. Describe the most important flags and options for the given tool, with a brief explanation of what each one does. | What are the main flags for adape-script? | Usage: `Set-ExecutionPolicy Bypass ` | {
"tool_name": "adape-script",
"category": "blackarch-windows",
"source": "blackarch_tools",
"augmentation_kind": "none",
"row_kind": "tool_flags_docs",
"doc_sources": [
"github_readme",
"homepage"
]
} |
BlackArch CLI Tools Dataset
What This Dataset Is
A supervised fine-tuning (SFT) dataset that teaches a language model how to use the ~2,850 CLI tools in the BlackArch Linux repository — what each tool does, how to install it, which flags matter, and practical command examples. Coverage spans 49 tool categories from web application testing to reverse engineering to wireless exploitation.
Sources
| Source | Type | Content |
|---|---|---|
| BlackArch tools data | Fetched + cached | Pipe-delimited tool index (name|version|description|category|url) — ~2,855 entries |
Embedded MAJOR_TOOLS corpus (86 tools) |
Static | 5–25 hand-written (question, command) pairs per tool, covering the most common operations, flag combinations, and output modes |
GitHub README fetches (up to --max-fetches) |
Fetched + cached | Fenced code blocks extracted from each tool's README for supplemental command examples |
Major tools with embedded usage (86)
nmap, masscan, sqlmap, nikto, gobuster, ffuf, hashcat, john, hydra, metasploit-framework, aircrack-ng, wifite, wireshark, tcpdump, responder, impacket, crackmapexec, netexec, bloodhound, certipy, evil-winrm, enum4linux, enum4linux-ng, subfinder, amass, theharvester, nuclei, feroxbuster, rustscan, dirb, wpscan, burpsuite, zaproxy, bettercap, ettercap, volatility3, binwalk, foremost, steghide, exiftool, radare2, ghidra, gdb, socat, chisel, proxychains, ligolo-ng, mimikatz, searchsploit, set, reaver, hashid, hash-identifier, netcat, wfuzz, smbclient, smbmap, ldapsearch, rpcclient, commix, xsstrike, whatweb, wafw00f, dnsenum, fierce, dnsrecon, cewl, crunch, medusa, patator, sslscan, lynis, chkrootkit, rkhunter, yersinia, hping3, slowloris, dirsearch, arjun, paramspider, katana, httpx, waybackurls, gau, pspy, linpeas, winpeas
Each major tool has 5–25 curated Q&A pairs covering common invocations, important flag combinations, output parsing, and typical penetration testing workflows.
Tool categories (49)
The BlackArch repository organizes tools into categories. The dataset includes category-aware overview rows using these category descriptions:
| Category | Description |
|---|---|
blackarch-webapp |
Web application security testing |
blackarch-scanner |
Network and vulnerability scanning |
blackarch-recon |
Reconnaissance and information gathering |
blackarch-exploitation |
Exploitation frameworks and tools |
blackarch-cracker |
Password cracking and brute forcing |
blackarch-windows |
Windows-specific security tools |
blackarch-networking |
Network utilities and analysis |
blackarch-forensic |
Digital forensics and incident response |
blackarch-fuzzer |
Protocol and application fuzzing |
blackarch-crypto |
Cryptography analysis and attacks |
blackarch-wireless |
Wireless network auditing |
blackarch-binary |
Binary analysis and exploitation |
blackarch-social |
Social engineering |
blackarch-reversing |
Reverse engineering |
blackarch-malware |
Malware analysis |
blackarch-proxy |
Traffic interception and proxying |
blackarch-stego |
Steganography |
blackarch-dos |
Denial-of-service testing |
| ...and 31 more | (hardware, radio, automobile, drone, firmware, NFC, IDS, AI, etc.) |
System prompts
SYSTEM_TOOL_USE— Penetration testing tool expert on BlackArch Linux. Exact commands with flags and arguments. Explains what the command does and expected output format. Assumes BlackArch or Arch Linux withblackarchrepo enabled.SYSTEM_TOOL_EXPLAIN— Tool expert. What the tool does, primary use cases, notable features, and how it compares to alternatives in the same category.SYSTEM_TOOL_INSTALL— BlackArch Linux sysadmin. Exactpacman -Scommands with repo prerequisites. AUR alternatives when applicable.
Row kinds
| Kind | Description | Volume (base) |
|---|---|---|
tool_what_is |
"What is {tool}?" → description, category, homepage | ~2,855 |
tool_install |
"How do I install {tool}?" → pacman -S command |
~2,855 |
tool_use_major |
Practical task → exact command (from embedded corpus) | ~780 |
tool_use_readme |
Task inferred from README → code block command | ~350+ |
category_overview |
"What tools are available for {category}?" → list with descriptions | ~49 |
Augmentation
none— Direct from tool index, embedded corpus, or README extraction.oversample— Same assistant answer, user prompt reformulated with a different template from the question bank (use/explain/install/category templates).
Scale
| Mode | Typical Row Count |
|---|---|
Base (no --augment) |
~6,200 |
--augment --target-rows 1000000 |
1,000,000 |
What This Dataset Is NOT
- Not a BlackArch installation guide. It teaches individual tool usage, not how to set up BlackArch itself (partitioning, bootloader, desktop environment, repo configuration). Use the BlackArch install guide for that.
- Not GUI tool documentation. The dataset focuses on CLI tools only. GUI-centric tools (Burp Suite, Ghidra, Wireshark) appear with their CLI interfaces and flags, not their graphical workflows. If a tool is purely GUI-based with no CLI invocation, its rows are limited to "what is" and "install" kinds.
- Not exhaustive flag documentation. Major tools have 5–25 example invocations covering common workflows. Obscure flags, deprecated options, and niche modes are not systematically covered. Consult
--helpor man pages for full flag reference. - Not tool output training data. The dataset teaches what commands to run, not how to parse or interpret their output. A model trained on this data can produce the right
nmapcommand but won't have seen actual scan results, hash cracking output, or exploit session transcripts. - Not version-pinned. Tool versions come from the BlackArch tools index at fetch time. Commands may reference flags that were added or removed in different versions. The dataset does not track version compatibility.
- Not cross-distro. Installation commands use
pacman -Sexclusively. Kali Linux (apt), Parrot OS, or manual compilation instructions are not included. - Not a penetration testing methodology. It teaches tool invocation, not engagement methodology (scoping, rules of engagement, reporting, evidence handling). For methodology, refer to standards like PTES, OWASP, or OSSTMM.
- Not safety-filtered. Real attack tool commands appear without refusal patterns, ethical disclaimers, or usage warnings. The dataset assumes the reader/model operator applies their own responsible-use constraints.
- Not a substitute for practice labs. Knowing the command syntax does not equal knowing when and why to use a tool in context. Pair this training data with hands-on lab environments for effective skill development.
- Downloads last month
- 51