Rootless-Ghost/Network-Security-Toolkit

GitHub: Rootless-Ghost/Network-Security-Toolkit

统一红队与蓝队网络安全的工具包,提供共享核心与攻防一体的能力。

Stars: 0 | Forks: 0

# Network-Security-Toolkit ### 统一红队/蓝队网络安全工具包 [![Python](https://img.shields.io/badge/Python-3.8+-3776AB?style=flat-square&logo=python&logoColor=white)](https://python.org) [![Poetry](https://img.shields.io/badge/Poetry-Package_Manager-60A5FA?style=flat-square&logo=poetry&logoColor=white)](https://python-poetry.org) [![License](https://img.shields.io/badge/License-MIT-green?style=flat-square)](LICENSE) [![Version](https://img.shields.io/badge/Version-1.0.0-9D1AF7?style=flat-square)]() [![MITRE ATT&CK](https://img.shields.io/badge/MITRE-ATT%26CK_Mapped-red?style=flat-square)](https://attack.mitre.org) [![Authorized Use Only](https://img.shields.io/badge/Use-Authorized_Testing_Only-red?style=flat-square)]() ⚠️ **AUTHORIZED SECURITY TESTING ONLY** ⚠️ PathFinder is designed for use against networks you own or have explicit permission to test. Unauthorized use is illegal. ## 概述 This toolkit provides a unified approach to network security assessment by combining offensive and defensive perspectives: ## 组件 | Component | Role | Description | |-----------|------|-------------| | `NetworkMapper` | Core library | Network discovery, topology mapping, path analysis, visualization | | `PathFinder` | Red team | Attack path analysis, lateral movement detection, Shodan integration | | `PathGuard` | Blue team | Defensive analysis, hardening recommendations, baseline change detection | The yin-yang design philosophy enables security professionals to use the same codebase for both offensive security testing and defensive security improvements. ## 功能 ### NetworkMapper(共享核心) - Network topology discovery and mapping - Host and service enumeration - Path analysis between network nodes - Standardized data structures with full JSON serialization - Interactive HTML and dark-theme PNG visualization ### PathFinder(红队) - Attack path mapping with CVSS-weighted graph traversal - Shodan API integration for external attack surface discovery - 15 vulnerability signatures across common services - MITRE ATT&CK lateral movement technique mapping (T1021.001–T1563) - Exfiltration channel identification with stealth scoring - Stealth scanning with jitter, decoys, and randomized host ordering - Attack visualization with criticality scoring ### PathGuard(蓝队) - Choke point analysis using betweenness, degree, and closeness centrality - 13 hardening rules mapped to CIS Controls and NIST SP 800-53 - Baseline manager with CRITICAL/WARN/INFO change detection - Vulnerability prioritization: CVSS × network position weighting - 10 security control deployment guides (NGFW, IDS, WAF, PAM, EDR, SIEM, MFA, and more) - Prioritized remediation roadmap generation ## 安装 ### 使用 Poetry(推荐) ``` git clone https://github.com/Rootless-Ghost/network-security-toolkit.git cd network-security-toolkit # 使用 Poetry 安装(推荐) poetry install poetry shell ``` ## 用法 ``` # 发现并映射网络 network-mapper discover 192.168.1.0/24 -s -o topo.json --html map.html # 红队分析(需要授权确认) pathfinder scan 192.168.1.0/24 --stealth -o topo.json pathfinder analyze topo.json --html attack.html --report pf-report.json # 蓝队分析 pathguard analyze topo.json --report pg-report.json pathguard baseline --topology topo.json --save --name baseline-2026-04-15 pathguard remediate topo.json --report roadmap.json ``` ## 要求 - Python 3.x - Poetry - Nmap - Optional: Shodan API key (PathFinder external recon) ## 项目结构 network-security-toolkit/ ├── pyproject.toml ← Poetry config, 3 CLI entry points ├── network_mapper/ ← Core shared library (6 modules) ├── pathfinder/ ← Red team tool (9 modules) └── pathguard/ ← Blue team tool (8 modules) ## 许可证 This project is licensed under the MIT License — see the [LICENSE](LICENSE) file for details.
**Built by [Rootless-Ghost](https://github.com/Rootless-Ghost)**
标签:Cloudflare, CTI, CVSS, HTML可视化, JSON序列化, Maven构建, MITRE ATT&CK, Mutation, PNG可视化, Poetry, Python, 加固建议, 反取证, 变更检测, 可视化, 基线检测, 安全评估, 拓扑映射, 授权安全测试, 攻击路径映射, 数据展示, 无后门, 服务枚举, 本地模型, 横向移动检测, 红队, 网络发现, 网络安全工具包, 网络攻防, 路径分析, 逆向工具, 防御分析