Atsukiiii01/Kamui
GitHub: Atsukiiii01/Kamui
一款面向红队的 Nmap C2 仪表板,通过自动化规避技术和非线性界面实现隐蔽侦察。
Stars: 3 | Forks: 3
# KAMUI // 幽灵协议
**KAMUI** 不仅仅是另一个 Nmap 封装工具。它是一个专为红队行动设计的侧重隐蔽性的命令与控制 (C2) 接口。它将复杂的扫描逻辑抽象到一个非线性仪表板中,允许快速重配置目标和自动绕过防火墙。
采用“零检测”代码结构构建,以规避静态分析。
### ⚡ 功能特性
* **幽灵协议 (Ghost Protocol):** 自动化规避引擎,通过链式组合 IP 诱饵、欺骗、数据包分片和错误校验和来绕过 IDS/防火墙。
* **C2 仪表板:** 非线性终端界面。可以按任意顺序更改目标、端口或扫描模式,而无需重启工具。
* **智能配置:** 一键自动化:
* `VULN` - CVE 检测
* `AUTH` - 弱凭证审计
* `SAFE` - 非侵入式发现
* `BANNER` - 服务指纹识别
* **混合界面:** 同时包含原始**终端仪表板**(用于 SSH 会话)和**图形界面**(用于桌面使用)。
### 📥 部署
**1. 前置条件**
您的系统需要安装 **Python 3** 和 **Nmap** 引擎。
* **Kali / Linux:** `sudo apt install nmap python3`
* **macOS:** `brew install nmap python3`
* **Windows:** [下载 Nmap 安装程序](https://nmap.org/download.html)
**2. 安装**
克隆仓库并安装 GUI 依赖 (FreeSimpleGUI)。
```
git clone https://github.com/Atsukiiii01/Kamui.git
cd kamui
pip install -r requirements.txt
INITIALIZATION
You have two ways to run KAMUI, depending on your environment.
OPTION A: The C2 Dashboard (Terminal)
Best for speed, SSH sessions, and "Hacker Mode." No mouse required.
python kamui_dashboard.py
:- Navigation: Press numbers 1-6 to edit settings.
:- Back: Press ENTER on any menu to return to the dashboard.
:- Launch: Press 0 to execute the attack.
OPTION B: The Graphical Interface (GUI)
Best for desktop use with a visual progress bar and mouse controls.
python kamui_gui_final.py
:- Usage: Select your mode, check the "Ghost Protocol" boxes for evasion, and click INITIATE.
💀 GHOST EVASION GUIDETo bypass firewalls, enable Ghost Evasion in the menu (Option 5).
Setting,Effect
Decoy (-D),"Floods the target with fake traffic from random IPs, hiding your true IP."
Spoof (-S),Masquerades your packets as coming from a different trusted host.
Fragment (-f),Splits packets into tiny chunks to slip past simple packet filters.
BadSum,Sends packets with invalid checksums (useful for mapping firewall rules).
⚠️ DISCLAIMER
KAMUI is engineered for authorized security auditing and educational purposes only. Using this tool against systems without explicit permission is illegal. The creator (atsukiiii01) assumes no liability for misuse.
"We are ghosts. We are nowhere and everywhere."
```
标签:AES-256, C2控制台, CLI仪表盘, CTI, GitHub, GUI安全工具, IDS规避, IP欺骗, Nmap封装, Python安全工具, Scrypt密钥派生, 二进制分析平台, 后渗透, 命令控制, 密码管理, 战术自动化, 插件系统, 数据包分片, 数据采集, 服务指纹识别, 漏洞评估, 网络扫描器, 诱饵技术, 逆向工具, 防御绕过, 防火墙绕过, 零依赖, 静态分析规避