-
Notifications
You must be signed in to change notification settings - Fork 348
RedAmon HackLab
45 agentic attack prompts. One target. Zero hand-holding.
The HackLab is a curated set of attack scenarios designed to showcase RedAmon's AI agent autonomously discovering, chaining, and exploiting vulnerabilities -- just like a real pentester.
All sessions are performed on a deliberately vulnerable application (DVWS-Node) deployed on our own controlled server for educational and research purposes only. Never use these techniques on systems you do not own or have explicit written authorization to test. Unauthorized access is illegal.
Each prompt points the agent at a specific port and service, then lets it figure out the rest: endpoint discovery, vulnerability identification, exploitation, and post-exploitation. The agent queries the recon graph for context, selects its own tools, and adapts when things don't go as expected.
The target is a deliberately vulnerable environment deployed on EC2:
- DVWS-Node (Damn Vulnerable Web Services) -- a Node.js app with 15+ vulnerability categories
- CVE Lab -- real-world CVE-vulnerable services (Tomcat, vsftpd, Spring Boot)
- DVWS-Node + CVE Lab deployed on your EC2 instance
- Full recon pipeline executed and stored in the graph database
- RedAmon agent configured with the target project
| Port | Service | What Lives There |
|---|---|---|
| 80 | Express/Node.js | REST API, SOAP, Swagger -- all app-level vulns |
| 4000 | Apollo GraphQL | Introspection, IDOR, SQLi, file write |
| 3306 | MySQL 8.4.8 | Direct DB access (exposed, no firewall) |
| 21 | vsftpd 2.3.4 | CVE-2011-2523 backdoor |
| 8080 | Tomcat 8.5.19 | CVE-2017-12617 PUT RCE, Ghostcat |
| 8888 | Spring Boot | Log4Shell (CVE-2021-44228) |
| 9090 | XML-RPC | SSRF via method calls |
The full target overview, recon data, and all prompts are in REDAMON.HACKLAB.md.
Each session contains:
-
XXX-XXXXX_session.md-- the raw unedited agent session log (every tool call, response, and reasoning step) -
XXX-XXXXX_sess_decoded.md-- a human-readable walkthrough explaining the full attack chain, key decisions, and what capabilities the agent demonstrated
Prompts that intentionally give the agent wrong assumptions. The agent must recognize the mismatch, pivot, and still achieve the objective.
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| MSL-XAJI0 | Wrong Database Assumption | DONE | 12m 21s | 14 | 72 | Opus 4.6 | YouTube | decoded / raw |
| MSL-Y6DPB | Wrong Port for the Vulnerability | -- | -- | -- | -- | -- | -- | -- |
| MSL-HSAHX | Wrong Protocol Assumption | -- | -- | -- | -- | -- | -- | -- |
| MSL-THV3A | Wrong Technology Stack | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| SQL-3ZMF8 | SQL Injection via POST Parameters | -- | -- | -- | -- | -- | -- | -- |
| SQL-MDD4V | GraphQL SQL Injection | -- | -- | -- | -- | -- | -- | -- |
| SQL-30T9N | Blind SQL Injection with Time-Based Extraction | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| NQL-T3W5U | NoSQL Injection via MongoDB Search Endpoints | -- | -- | -- | -- | -- | -- | -- |
| NQL-ZBIKC | NoSQL Operator Injection for Authentication Bypass | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| RCE-IDKWN | Command Injection Discovery and Reverse Shell | -- | -- | -- | -- | -- | -- | -- |
| RCE-NHJ7X | Insecure Deserialization (node-serialize) RCE | -- | -- | -- | -- | -- | -- | -- |
| RCE-VG0FN | Command Injection to Credential Harvesting | -- | -- | -- | -- | -- | -- | -- |
| RCE-9XUY4 | Chained RCE: JWT Bypass + CMDi + Persistence | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| XXE-1IBLJ | XXE via XML Import for File Exfiltration | DONE | 9m | 14 | 85 | Opus 4.6 | YouTube | decoded / raw |
| XXE-O6QJI | Blind XXE with Out-of-Band Data Exfiltration | -- | -- | -- | -- | -- | -- | -- |
| XXE-UJV6O | XML Bomb (Billion Laughs) DoS | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| SRF-H9SDB | SSRF via Download Endpoint and XML-RPC | -- | -- | -- | -- | -- | -- | -- |
| SRF-DW2PC | SSRF with file:// Protocol for Local File Read | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| JWT-N9T84 | JWT Algorithm None Attack for Admin Access | -- | -- | -- | -- | -- | -- | -- |
| JWT-AZYTJ | JWT Secret Extraction and Token Forgery | -- | -- | -- | -- | -- | -- | -- |
| JWT-XEPQ8 | Brute Force Login with Rate Limit Bypass | -- | -- | -- | -- | -- | -- | -- |
| JWT-5JSG6 | Session Analysis: Token Reuse and Expiration Bypass | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| IDR-5KXVF | IDOR on Notes API | -- | -- | -- | -- | -- | -- | -- |
| IDR-1T2TA | GraphQL IDOR for User Enumeration | -- | -- | -- | -- | -- | -- | -- |
| IDR-LA753 | Privilege Escalation via Mass Assignment | -- | -- | -- | -- | -- | -- | -- |
| IDR-LC58D | Forced Browsing and Hidden Endpoint Discovery | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| XPT-RC11E | XPath Injection for Config Data Extraction | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| FIL-RTJ5P | Unrestricted File Upload to Web Shell | -- | -- | -- | -- | -- | -- | -- |
| FIL-HT0HL | Path Traversal for Source Code Theft | -- | -- | -- | -- | -- | -- | -- |
| FIL-9XPSE | GraphQL Arbitrary File Write to RCE | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| PPL-IMVIH | Prototype Pollution via File Upload Metadata | -- | -- | -- | -- | -- | -- | -- |
| PPL-CWI64 | Prototype Pollution to DoS and Auth Bypass | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| INF-CIYHE | Env Variable Leak to JWT Secret to Token Forgery | -- | -- | -- | -- | -- | -- | -- |
| INF-7UR23 | GraphQL Introspection for Full API Mapping | -- | -- | -- | -- | -- | -- | -- |
| INF-GDPPQ | OpenAPI/Swagger Discovery and Attack Surface Mapping | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| CLS-0Y9DO | CORS Misconfiguration Analysis | -- | -- | -- | -- | -- | -- | -- |
| CLS-M5IGQ | Open Redirect to Phishing Chain | -- | -- | -- | -- | -- | -- | -- |
| CLS-PKI7P | Log Injection for Forensic Evasion | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| CVE-5TB94 | CVE-2011-2523: vsftpd Backdoor to Root Shell | -- | -- | -- | -- | -- | -- | -- |
| CVE-874FR | CVE-2017-12617: Tomcat PUT RCE to JSP Shell | -- | -- | -- | -- | -- | -- | -- |
| CVE-HOCN9 | CVE-2020-1938: Tomcat Ghostcat AJP File Read | -- | -- | -- | -- | -- | -- | -- |
| CVE-J2QP8 | CVE Scan then Exploitation | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| CHN-9UZFK | Info Disclosure > JWT Forge > SQLi > CMDi | -- | -- | -- | -- | -- | -- | -- |
| CHN-8UT0C | Multi-Protocol: REST + GraphQL + SOAP | -- | -- | -- | -- | -- | -- | -- |
| CHN-VS4F8 | App Vulns + CVE Exploitation Combined | -- | -- | -- | -- | -- | -- | -- |
| CHN-CGVYI | Exposed MySQL: Direct Database Exploitation | -- | -- | -- | -- | -- | -- | -- |
| Code | Title | Status | Time | Steps | Score | Model | Video | Session |
|---|---|---|---|---|---|---|---|---|
| AUT-E6IVW | Agent Self-Designs the Full Attack | -- | -- | -- | -- | -- | -- | -- |
Share your own RedAmon agent sessions from your real targets and environments. These are not from the HackLab prompt list -- they are real-world pentests, CTFs, or custom lab setups where the agent was used autonomously.
- Run the RedAmon agent against your own target (your lab, CTF, authorized pentest)
-
Export the session log (saved automatically as
.md) -
Open a PR on the redamon repo:
- Add your session file to
redamon.wiki/hacklab/community/ - Name it descriptively:
your-target_vuln-type_session.md - Include a brief summary in the PR description
- Add your session file to
## Community Session
**Target:** Brief description (e.g. "HackTheBox - Keeper", "My company's staging API", "Custom CTF lab")
**AI Model:** claude-opus-4-6 / claude-sonnet-4-6 / other
**Attack type:** What the agent was asked to do
**Outcome:** What it achieved
**Total time:** Xm
**Interesting because:** Why this session is worth sharing (unexpected pivot, creative chain, edge case, etc.)
**YouTube:** https://youtu.be/your-video-id
- Authorized targets only -- do not submit sessions from unauthorized testing
- Redact sensitive data -- remove real IPs, domains, credentials, or client info before submitting
- YouTube video required -- record your screen while the agent runs and upload to YouTube
- Failed sessions welcome -- if the agent got stuck or took a wrong path, that's valuable feedback
- Different models encouraged -- comparing opus vs sonnet on the same target helps everyone
Getting Started
Core Workflow
Scanning & OSINT
AI & Automation
HackLab
Analysis & Reporting
- Insights Dashboard
- Pentest Reports
- Attack Surface Graph
- Surface Shaper
- EvoGraph — Attack Chain Evolution
- Data Export & Import
Contributing
Reference & Help