Nemo Agent V1
åºäº Claude Code çèªåšåæžéæµè¯ AgentïŒç®æ æ¯èŸŸå°äžé«çº§çœç»å®å šäžå®¶æ°Žå¹³ã
Ask AI about Nemo Agent V1
Powered by Claude · Grounded in docs
I know everything about Nemo Agent V1. Ask me about installation, configuration, usage, or troubleshooting.
0/500
Reviews
Documentation
Nemo Agent
åºäº Claude Code çèªåšåæžéæµè¯ AgentïŒèŸŸå°äžé«çº§çœç»å®å šäžå®¶æ°Žå¹³ã
é¢ç®è°åºŠåéšä»œæç€ºè¯(åŠïŒZone/1-4)æ¯é对第äºå±è Ÿè®¯äºé»å®¢æŸæºèœæžéææèµè§åå®å¶çïŒå·¥å ·åºå®å®è£ äº/opt/workspaceç®åœïŒæªå å«åšé¡¹ç®äžïŒåŠè¥äœ¿çšè¯·æ ¹æ®skillèªè¡äžèœœã
ç¹æ§
- å€ LLM å¹¶è¡ïŒæ¯æ 1-3 䞪 LLM å¹¶è¡è§£é¢ïŒæé«æåç
- åå±è°åºŠïŒå¹³å°å®äŸç®¡ç + æ¬å° Docker 容åšïŒèªåšæ¢å€äžæä»»å¡
- èªåšåè°åºŠïŒä»ç«èµå¹³å°èªåšè·åææïŒç®¡çå šçåœåšæ
- æ²çéçŠ»ïŒæ¯äžªææè¿è¡åšç¬ç« Docker 容åšäž
- 宿¶çæ§ïŒWeb UIïŒSSE æšéïŒå®æ¶æ¥çè§£é¢è¿çšäžç»æ
- ç¬è®°ç³»ç»ïŒèªåšè®°åœä¿¡æ¯æ¶éãæšçåæãæç»ç»æ
- VNC å¯è§ïŒæ¯æ VNC æ¥çæµè§åšæäœè¿çš
- æèœæ ïŒ50+ æèœç®åœïŒèŠç Web/CVE/å çœ/äº/AI å®å š
- æŒæŽç¥è¯åºïŒ1123+ æŒæŽæ¬å°ç¥è¯åºïŒvulnerability-wikiïŒ+ 317 æŒæŽç¯å¢çŽ¢åŒïŒvulhubïŒ
- èµåºéè¿ïŒZone 1ïŒWebïŒâ Zone 2ïŒ+CVE/äºïŒâ Zone 3ïŒ+å çœïŒ
æ¶æ
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â CTF å¹³å° API â
â (讀è¯: Agent-Token, é¢ç: â€3 req/s) â
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â
âŒ
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â task/scheduler.py â
â ææè°åºŠåš (åå±ç®¡ç) â
â â
â ââââââââââââââââââââââââ ââââââââââââââââââââââââââââââââ â
â â å¹³å°å®äŸç®¡ç â â æ¬å°å®¹åšç®¡ç â â
â â start/stop instance â â Docker 容åšçåœåšæ â â
â â get_hint â â 容åšå¥åº·æ£æ¥äžèªåšæ¢å€ â â
â â submit_flag â â æ»å®¹åšéå¯ â â
â ââââââââââââââââââââââââ ââââââââââââââââââââââââââââââââ â
â â
â ç¶ææä¹
å: subjects.json (线çšå®å
š, æä»¶é) â
â é¢çæ§å¶: PlatformClient._rate_limit (0.5séŽé) â
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â
âŒ
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â Docker å®¹åš (æ¯ææ N 䞪 LLM) â
â ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â â Claude Agent + MCP æå¡ ââ
â â âââââââââââââââââââ âââââââââââââââââââââââââââââââââââââ
â â â Jupyter Kernel â â toolset å·¥å
·åº âââ
â â â (ä»£ç æ²çæ§è¡) â â terminalâbrowserâcompetitionânoteâââ
â â âââââââââââââââââââ âââââââââââââââââââââââââââââââââââââ
â â âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â â â MCP æå¡: sandbox (Jupyter å
æ ž, FastMCP HTTP) âââ
â â âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â â âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â â â å®å
šå·¥å
·: nmapâsqlmapâhydraâffufâkatanaâfscanânucleiâââ
â â â Java: JNDIExploitâJYsoâshiro_cliâysoserialâmarshalsecââ
â â â å
çœ: frpâchiselâstowawayânxcâmimikatzâxray âââ
â â â äºå®å
š: cloudswordâcfâlc âââ
â â âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â â âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â â â æèœæ : auxiliaryâinternalâvulhubâvulnerability-wiki âââ
â â â ç¥è¯åº: vulnerability-wiki(1123+)âvulhub(317) âââ
â â âââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â
âŒ
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â web-ui (Django, ç«¯å£ 8003) â
â 宿¶ä»ªè¡šç(SSE) â ç¬è®° â Jupyter â è®€è¯ â
â (æ æ°æ®åº, JSON æä»¶é©±åš) â
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
ææ¯æ
| å±çº§ | ææ¯ | çšé |
|---|---|---|
| AI æ¡æ¶ | Claude Code (MCP) | AI Agent æ žå¿åŒæ |
| åŒåè¯èš | Python 3.10+ | äž»èŠåŒåè¯èš |
| æ§è¡ç¯å¢ | Jupyter (ipykernel) | Python ä»£ç æ²çæ§è¡ |
| MCP æå¡ | FastMCP (HTTP) | Jupyter å æ žç®¡ç |
| æµè§åšèªåšå | Playwright | çœé¡µäº€äºãæªåŸãåšæåæ |
| Web UI | Django 5.0+ | 宿¶çæ§ïŒSSEïŒãç¬è®°/Notebook æ¥çåš |
| 容åšå | Docker | æ²çé犻ãå¹¶è¡ä»»å¡ |
| è¿çšç®¡ç | libtmux | Tmux äŒè¯ç®¡ç |
| è¿çšæ¡é¢ | VNC (xfce4) | å¯è§åæµè§åšæäœïŒå¯éïŒ |
å¿«éåŒå§
1. æå»º Docker éå
docker build -t nemo-agent/sandbox:1.0 .
2. é 眮ç¯å¢åé
cd task
cp .env.example .env
# çŒèŸ .envïŒé
眮 LLM API åç«èµå¹³å°
äž»èŠé 眮项ïŒ
# LLM API é
眮 (1-3䞪ïŒè³å°é
眮äžäžª)
LLM-1-ANTHROPIC_BASE_URL=https://open.bigmodel.cn/api/anthropic
LLM-1-ANTHROPIC_AUTH_TOKEN=your_token
LLM-1-ANTHROPIC_MODEL=GLM-5
# ç«èµå¹³å°
COMPETITION_API_URL=http://192.168.52.1:8888
AGENT_TOKEN=your_agent_token_here
# è°åºŠåæ°
MAX_LLM=1 # æ¯é¢å¹¶è¡ LLM æ° (1-3)
MAX_PARALLEL=3 # æå€§å¹¶è¡æææ°
TIMEOUT_SECONDS=3600 # åé¢è¶
æ¶ (ç§)
FETCH_INTERVAL=60 # å¹³å°è·åéŽé (ç§)
3. å¯åšè°åºŠåš
cd task
python3 scheduler.py
è°åºŠåšäŒèªåšïŒ
- ä»ç«èµå¹³å°è·åææå衚
- å¯åšå¹³å°èµé¢å®äŸïŒè·åå ¥å£å°å
- 䞺æ¯é¢å建 Docker 容åšïŒå«æè¿°åæç€ºïŒ
- çæ§è¶ æ¶ã容åšå¥åº·ãå¹³å°å®äŸç¶æ
- äžæéå¯åèªåšæ¢å€ïŒé建平å°å®äŸ + æ¬å°å®¹åšïŒ
- è®°åœç»æå°
data/subjects.json
4. æ¥ç Web UI
cd web-ui
python3 manage.py runserver 0.0.0.0:8003
é»è®€ç»åœïŒçšæ·å nemoïŒå¯ç nemoïŒéè¿ WEB_UI_USERNAME / WEB_UI_PASSWORD ç¯å¢åéé
眮ïŒã
äœ¿çšæ¹åŒ
è°åºŠåšæš¡åŒïŒæšèïŒ
èªåšä»ç«èµå¹³å°è·åææå¹¶è§£é¢ïŒ
cd task
python3 scheduler.py
# 忬¡è¿è¡ïŒäžåŸªç¯ïŒ
python3 scheduler.py --once
åäžè§£é¢æš¡åŒ
æåšæå®ç®æ è¿è¡è§£é¢ïŒ
cd task
python3 solver.py --target http://target:port --challenge_code xxx --competition
åæ°è¯ŽæïŒ
--target: ç®æ URL æ IP:端å£--challenge_code: é¢ç®ä»£ç ïŒçšäºå ³èç¬è®°--competition: å¯çšç«èµæš¡åŒïŒèªåšæäº€çæ¡ïŒ
æåšå¯åš Agent
cd claude-code
# 1. å¯åšæµè§åšæå¡
python3 meta-tooling/service/browser.py --port 9222 &
# 2. å¯åš MCP æå¡
python3 meta-tooling/service/python_executor_mcp.py --port 8000 &
# 3. å¯åš Agent
claude --print --dangerously-skip-permissions \
"äœ¿çš pentest-agent è§£å³ http://ç®æ :ç«¯å£ ç CTF ææ"
æ žå¿åèœ
åå±è°åºŠç®¡ç
è°åºŠåšç®¡ç䞀䞪å±çº§ïŒ
| å±çº§ | è莣 | API |
|---|---|---|
| å¹³å°å®äŸ | èµé¢é¶æºå¯åãç¶ææ¥è¯¢ | start_instance / stop_instance |
| æ¬å°å®¹åš | è§£é¢ Agent è¿è¡ç¯å¢ | Docker 容åšç®¡ç |
é坿¢å€æºå¶ïŒè°åºŠåšäžæåéå¯ïŒ_maintain_containers äŒïŒ
- æ£æ¥å¹³å°å®äŸæ¯åŠå掻ïŒå·²åæ¢åå°è¯éå¯
- æ£æ¥æ¬å°å®¹åšæ¯åŠè¿è¡ïŒäž¢å€±åé建
- å¹¶è¡è®¡æ°åºäºæä¹
åç
subjects.jsonïŒç¡®ä¿äžè¶ é
challenge_code
é¢ç®çå¯äžæ è¯ç¬ŠïŒå ³è Jupyter äŒè¯åç¬è®°ååšãæ¥æºïŒç«èµå¹³å° / çšæ·æå® / URL çæã
Note ç¬è®°ç³»ç»
| ç±»å | æä»¶ | çšé |
|---|---|---|
| info | {code}-info.md | ä¿¡æ¯æ¶é |
| infer | {code}-infer.md | æšçåæ |
| result | {code}-result.md | æç»ç»æ |
ç¬è®°ååšè·¯åŸïŒç± NOTE_PATH ç¯å¢åéé
眮ïŒé»è®€ /opt/notesïŒã
API:
get_notes_summary(code)- 读åæèŠappend_note(code, type, content)- 远å ç¬è®°
MCP å·¥å ·æå¡
容åšå éè¿ FastMCP HTTP æå¡ïŒç«¯å£ 8000ïŒæäŸ Jupyter å æ žæ§è¡èœåïŒ
| MCP å·¥å · | åèœ |
|---|---|
execute_code(session_name, code, timeout) | åš Jupyter å æ žäžæ§è¡ Python |
list_sessions() | ååºæŽ»è·äŒè¯ |
close_session(session_name) | å ³éäŒè¯ |
äŒè¯èªåšå 蜜 toolset å
ïŒ
| å·¥å · | åèœ |
|---|---|
toolset.browser | Playwright æµè§åšæ§å¶ |
toolset.terminal | Tmux ç»ç«¯äŒè¯ç®¡ç |
toolset.note | ç¬è®°è¯»å |
toolset.competition | ç«èµå¹³å° API |
å¹³å° API é¢çæ§å¶
- å 眮é¢çéå¶ïŒæ¯æ¬¡è¯·æ±éŽé >= 0.5sïŒâ€ 2 req/sïŒ
- 429 èªåšéè¯ïŒæå€ 3 æ¬¡ïŒæ¯æ Retry-After ååºå€Ž
- è®€è¯æ¹åŒïŒAgent-Token 请æ±å€Ž
èµåºçç¥
èµåºçç¥äžºçŽ¯ç§¯éè¿ïŒææèµåºåå¯äœ¿çšå šéšå·¥å ·ïŒèµåºä» åœ±åæ»å»æè·¯åäŒå 级ã
| èµåº | æèœç®åœ | èŠçèœåïŒéè¿å å«ïŒ |
|---|---|---|
| Zone 1 | auxiliary/exploit/ | Web æŒæŽïŒ22ç§æ»å»æ¹æ³ïŒ |
| Zone 2 | Zone 1 + auxiliary/cloud/, auxiliary/ai-security/, vulhub/, vulnerability-wiki/ | + CVE + ç¥è¯åº + äº + AI |
| Zone 3 | Zone 1+2 + internal/, auxiliary/lateral/, auxiliary/postexploit/ | + å çœæžéãæšªåç§»åšãå€çº§ä»£ç |
å®å šå·¥å ·
ä¿¡æ¯æ¶é
| å·¥å · | æ¥æº | çšé | 瀺äŸåœä»€ |
|---|---|---|---|
| nmap | apt | ç«¯å£æ«æ | nmap -sV -n -T4 --open target |
| whatweb | apt | ææ¯æ è¯å« | whatweb -a 3 http://target |
| observer_ward | /opt/workspace | åºçšæçº¹è¯å« | observer_ward -t http://target |
| katana | /opt/workspace | çœé¡µç¬å | katana -u http://target -d 3 -jc |
| ffuf | /opt/workspace | ç®åœåç°/æš¡ç³æµè¯ | ffuf -u 'http://target/FUZZ' -w wordlist |
| fscan | /opt/workspace | å çœç»Œåæ«æ | fscan -h 10.10.1.0/24 |
æŒæŽå©çš
| å·¥å · | æ¥æº | çšé | 瀺äŸåœä»€ |
|---|---|---|---|
| sqlmap | apt | SQL æ³šå ¥ | sqlmap -u "http://target/page?id=1" --dbs |
| nuclei | /opt/workspace | æš¡æ¿åæŒæŽæ«æ | nuclei -u http://target |
| xray | /opt/workspace/xray | 被åšä»£çæ«æ | xray webscan --listen 127.0.0.1:7777 |
| msfconsole | apt (omnibus) | æŒæŽå©ç𿡿¶ | msfconsole |
| hydra | apt | æŽåç Žè§£ | hydra -l user -P pass.txt target ssh |
| hashcat | apt | å¯ç ç Žè§£ | hashcat -m 0 hash.txt wordlist |
| proxychains4 | apt | 代çéŸ | proxychains4 nmap target |
Java ååºåå
| å·¥å · | æ¥æº | çšé |
|---|---|---|
| JNDIExploit | /opt/workspace/JNDIExploit/ | JNDI æ³šå ¥å©çš |
| JYso | /opt/workspace/JYso/ | Java ååºåå |
| shiro_cli | /opt/workspace/shiro/ | Shiro ååºåå |
| ysoserial | /opt/workspace/ysoserial/ | Java åçååºåå Payload çæ |
| marshalsec | /opt/workspace/marshalsec/ | Java Marshalling æŒæŽ + JNDI/RMI/LDAP åŒå¯Œæå¡ |
å çœæžé
| å·¥å · | æ¥æº | çšé |
|---|---|---|
| frpc/frps | /opt/workspace/frp/ | åå代çïŒéŠéïŒ |
| chisel | /opt/workspace | HTTP é§é代ç |
| Stowaway | /opt/workspace/Stowaway/ | å€çº§èç¹ä»£ç |
| Neo-reGeorg | /opt/workspace/Neo-reGeorg/ | HTTP é§é |
| nxc (NetExec) | /opt/workspace/NetExec/ | 暪åç§»åšïŒSMB/SSH/WinRMïŒ |
| mimikatz | /opt/workspace | Windows åè¯æå |
äºå®å š
| å·¥å · | æ¥æº | çšé |
|---|---|---|
| cloudsword | /opt/workspace/cloudsword | äºå®å šç»Œåæµè¯ |
| cf | /opt/workspace/cf | äºç¯å¢å©ç𿡿¶ |
| lc | /opt/workspace/lc | å€äºæ»å»é¢èµäº§æ¢³ç |
Webshell / å ¶ä»
| å·¥å · | æ¥æº | çšé |
|---|---|---|
| weevely | apt | PHP Webshell |
| wsh | /opt/workspace | Webshell 管ç |
åå
žäœçœ®ïŒ/opt/workspace/SecLists/
æèœæ
Agent éè¿ .claude/skills/pentest/ äžç 50+ æèœæä»¶è·åŸé¢åç¥è¯ïŒ
skills/pentest/
âââ SKILL.md # 顶屿èœïŒv7.0.0ïŒåŒºå¶æµçš + å·¥å
·æ»è§ïŒ
âââ browser/SKILL.md # Playwright æµè§åšæäœ
âââ terminal/SKILL.md # Tmux ç»ç«¯æäœ
âââ note/SKILL.md # ç¬è®°ååš
âââ competition/SKILL.md # ç«èµå¹³å° API
âââ reporting/SKILL.md # è§£é¢æ¥å
âââ reverse/ # åè¿/JNDI
â âââ SKILL.md # å匹 Shell 管ç
â âââ jndi-exploit.md # JNDI 泚å
¥å©çš
âââ core/
â âââ vulnerability-testing/ # æŒæŽæµè¯äžå©çš
âââ auxiliary/ # èŸ
婿èœïŒAboutSecurity æŽåïŒ
â âââ SKILL.md # èŸ
婿èœçŽ¢åŒ
â âââ exploit/ # 22 ç§æ»å»æ¹æ³
â â âââ sql-injection / xss / ssti / ssrf / command-injection
â â âââ lfi-rfi / idor / jwt / xxe / nosql / ldap / csrf
â â âââ graphql / websocket / race-condition / file-upload
â â âââ deserialization / java-deserialization
â â âââ supply-chain-audit / cve-exploit / web-vuln-scan
â â âââ business-logic-attack
â âââ lateral/ # 暪åç§»åš
â â âââ ad-domain-attack / adcs-attack
â â âââ exchange-to-domain / internal-recon
â â âââ lateral-movement / ntlm-relay-attack
â âââ postexploit/ # åæžé
â â âââ post-exploit-linux / post-exploit-windows
â âââ cloud/ # äºå®å
š
â â âââ cloud-metadata
â âââ ai-security/ # AI å®å
š
â â âââ prompt-injection
â âââ general/ # éçš
â âââ efficiency-rules
âââ vulnerability-wiki/ # 1123+ æŒæŽç¥è¯åºïŒæ¬å°æä»¶è¯»åïŒ
âââ vulhub/ # 317 æŒæŽç¯å¢çŽ¢åŒïŒæ¬å° JSON 玢åŒïŒ
â âââ categories/ # 16 䞪åç±»æä»¶
â âââ exploits/ # æŒæŽå€ç°æš¡æ¿
â âââ index/ # äž»çŽ¢åŒ + åºçšåç±»æ å°
âââ internal/ # å
çœæžéïŒZone 3ïŒ
âââ SKILL.md # å
çœæžéæ»è§
âââ info-gathering/ # å
çœä¿¡æ¯æ¶é
âââ post-exploitation/ # åæžéæäœ
âââ privilege-escalation/ # æéæå
âââ multi-hop-proxy/ # å€çº§ä»£ç
âââ tools-upload/ # å·¥å
·äžäŒ
âââ workflow/ # Zone 3 éåœå·¥äœæµ
âââ tools/ # 11 䞪工å
·ææ¡£
â âââ frp.md, chisel.md, stowaway.md # 代çå·¥å
·
â âââ fscan.md, netexec.md # æ«æ/暪å
â âââ mimikatz.md # åè¯æå
â âââ neo-regeorg.md # HTTP é§é
â âââ reverse-shell.md # å匹 Shell
â âââ file-transfer.md, proxybridge.md, simple-proxy.md
âââ references/ # ååæžé, ææ
项ç®ç»æ
nemo-agent/
âââ CLAUDE.md # Agent æä»€ææ¡£
âââ README.md # 项ç®è¯Žæ
âââ Dockerfile # Docker éåæå»º
âââ claude-code/ # Agent æ žå¿ç¯å¢
â âââ .claude/
â â âââ agents/
â â â âââ pentest-agent.md # æžéæµè¯ Agent å®ä¹
â â âââ commands/
â â â âââ pentest.md # /pentest åœä»€
â â âââ skills/pentest/ # æèœæ ïŒ50+ ç®åœïŒ
â âââ .mcp.json # MCP é
眮ïŒsandbox æå¡ïŒ
â âââ meta-tooling/
â â âââ service/
â â â âââ python_executor_mcp.py # FastMCP Jupyter å
æ žæå¡
â â â âââ browser.py # Playwright æµè§åšæå¡
â â âââ toolset/ # Python å·¥å
ጼ
â â âââ src/toolset/
â â âââ browser/ # Playwright å°è£
â â âââ competition/ # ç«èµå¹³å° API
â â âââ note/ # ç¬è®°è¯»å
â â âââ terminal.py # Tmux ç»ç«¯
â âââ entrypoint.sh # Docker 容åšå
¥å£
â âââ setup_symlinks.sh # å·¥å
·èœ¯éŸæ¥å建
â âââ start_claude.sh # Claude Code å¯åšèæ¬
â âââ install_ubuntu.sh # Ubuntu ç¯å¢å®è£
â âââ install_claude.sh # Claude Code å®è£
ïŒåœå
éåïŒ
â âââ install_all.sh # äžé®å®æŽå®è£
âââ task/ # ä»»å¡è°åºŠç³»ç»
â âââ scheduler.py # ææè°åºŠåšïŒåå±ç®¡çïŒ
â âââ solver.py # å颿±è§£åšïŒå€ LLM å¹¶è¡ïŒ
â âââ container_manager.py # 容åšçåœåšæç®¡ç
â âââ challenge_state.py # ç¶æç®¡çïŒçº¿çšå®å
šïŒ
â âââ config.py # é
眮管ç
â âââ core/
â â âââ platform.py # å¹³å° API 客æ·ç«¯ïŒé¢çæ§å¶ïŒ
â â âââ container.py # 容åšå建ãå·æèœœãæç€ºè¯æå»º
â â âââ runner.py # Docker 任塿§è¡
â â âââ parallel.py # å¹¶è¡æ§è¡åš
â â âââ state.py # ç¶ææäžŸäžè¶
æ¶å·¥å
·
â â âââ llm.py # LLM é
眮å 蜜
â â âââ logger.py # æ¥å¿
â â âââ signal.py # äŒé
å
³é
â âââ data/ # è¿è¡æ¶æ°æ®
â âââ subjects.json # ææç¶ææä¹
å
â âââ scheduler.log # è°åºŠåšæ¥å¿
âââ web-ui/ # Web å¯è§åçé¢
â âââ manage.py # Django å
¥å£
â âââ start.sh # å¯åšèæ¬
â âââ app/
â âââ dashboard_views.py # 仪衚ç + SSE æšé
â âââ notes_views.py # ç¬è®°æ¥çåš
â âââ jupyter_views.py # Jupyter Notebook æ¥çåš
â âââ auth_views.py # çšæ·è®€è¯
â âââ middleware.py # 讀è¯äžéŽä»¶
â âââ repositories.py # æ°æ®å±ïŒè¯» JSON/æä»¶ïŒ
â âââ settings.py # Django é
çœ®ïŒæ æ°æ®åºïŒ
â âââ templates/ # HTML æš¡æ¿
âââ tools/ # é¢çŒè¯å·¥å
·äºè¿å¶
âââ README.md # å·¥å
·è¯ŽæïŒfscan, linpeas, mimikatzïŒ
é 眮诎æ
ç¯å¢åé
| åé | 诎æ | é»è®€åŒ |
|---|---|---|
MAX_LLM | æ¯é¢å¹¶è¡ LLM æ° (1-3) | 3 |
MAX_PARALLEL | æå€§å¹¶è¡æææ° | 3 |
TIMEOUT_SECONDS | åææè¶ æ¶ (ç§) | 2400 |
FETCH_INTERVAL | å¹³å°è·åéŽé (ç§) | 60 |
DOCKER_IMAGE | Docker éå | nemo-agent/sandbox:1.0 |
NOTE_PATH | ç¬è®°ååšè·¯åŸ | /opt/notes |
NOTEBOOK_PATH | Jupyter Notebook è·¯åŸ | /opt/scripts |
WORKSPACE_PATH | å·¥äœç®åœè·¯åŸ | /opt/workspace |
NO_VISION | çŠçš VNC | true |
NETWORK_MODE | Docker çœç»æš¡åŒ | bridge |
REVERSE_IP | å匹 IPïŒç®æ åè¿å°åïŒ | - |
VNC_BASE_PORT | VNC åºç¡ç«¯å£ | 55900 |
AGENT_TOKEN | å¹³å°è®€è¯ä»€ç | - |
COMPETITION_API_URL | ç«èµå¹³å° URL | http://host.docker.internal |
WEB_UI_USERNAME | Web UI çšæ·å | nemo |
WEB_UI_PASSWORD | Web UI å¯ç | nemo |
LLM é 眮
æ¯æ 1-3 䞪 LLMïŒéè¿çŒå·ç¯å¢åéé 眮ïŒ
LLM-1-ANTHROPIC_BASE_URL=https://open.bigmodel.cn/api/anthropic
LLM-1-ANTHROPIC_AUTH_TOKEN=your_token
LLM-1-ANTHROPIC_MODEL=GLM-5
# å¯éïŒç¬¬ 2ã3 䞪 LLM
LLM-2-ANTHROPIC_BASE_URL=...
LLM-2-ANTHROPIC_AUTH_TOKEN=...
LLM-2-ANTHROPIC_MODEL=...
ç¬ç« Ubuntu è¿è¡ç¯å¢ïŒå¯éïŒäž»èŠçšäºè°è¯ïŒ
åšåæè°è¯ååŒåé¶æ®µïŒäœ¿çšåäžç Ubuntu èææºæŽæ¹äŸ¿ãå¯çš claude-code/install_all.sh äžé®å®æå®è£
ïŒ
cd claude-code
sudo ./install_all.sh
å®è£ å 容ïŒ
- åºç¡å·¥å ·ïŒcurl, wget, git, tmux, jq, openjdk-8-jdk, pipx ç
- Chrome/Chromium æµè§åš
- æžéæµè¯å·¥å ·ïŒaptïŒïŒnmap, whatweb, sqlmap, hydra, hashcat, proxychains4, weevely
- Metasploit Framework
- Docker CEïŒé¿éäºéåæº + Docker Hub åœå å éïŒ+ Docker Compose
- Python äŸèµïŒfastmcp, playwright, libtmux, docker, django ç
- sudo å å¯ç é 眮
é¶åºåè
- xbowïŒfork èª Neuro-Sploit/xbow-validation-benchmarks å¹¶äœäºäžäºä¿®æ¹ã
- vulhubïŒæµè¯ CVE æŒæŽ
泚æäºé¡¹
- ä» çšäºææçå®å šæµè¯å CTF ç«èµ
- ææä»£ç åš Docker 容åšäžé犻æ§è¡
- å¹³å° API é¢çéå¶äžº â€3 req/sïŒè°åºŠåšå 眮 0.5s éŽéä¿æ€
- è§£é¢è®°åœåç¬è®°äœ¿çšäžæ
- Web UI æ æ°æ®åºïŒæ°æ®ååšåš JSON æä»¶åæä»¶ç³»ç»äž
