https://github.com/99999g/ak47
AK47 是一款跨平台的漏洞利用与安全评估工具 | AK47 is a cross-platform vulnerability exploitation and security assessment tool
https://github.com/99999g/ak47
expr mcp pentest redteam security skills vulnerability wails
Last synced: 16 days ago
JSON representation
AK47 是一款跨平台的漏洞利用与安全评估工具 | AK47 is a cross-platform vulnerability exploitation and security assessment tool
- Host: GitHub
- URL: https://github.com/99999g/ak47
- Owner: 99999G
- License: mit
- Created: 2026-03-07T12:04:01.000Z (22 days ago)
- Default Branch: main
- Last Pushed: 2026-03-12T02:27:35.000Z (17 days ago)
- Last Synced: 2026-03-12T07:57:14.224Z (17 days ago)
- Topics: expr, mcp, pentest, redteam, security, skills, vulnerability, wails
- Homepage:
- Size: 1.33 MB
- Stars: 1
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.en.md
- License: LICENSE
Awesome Lists containing this project
README
AK47



中文 | English
> [!WARNING]
> This tool is strictly for security research and educational purposes. The user assumes all legal and related responsibilities arising from the use of this tool! The author assumes no legal or related responsibilities!
AK47 is a cross-platform vulnerability exploitation and security assessment tool. It features a built-in advanced engine and a variety of security extension modules, dedicated to significantly improving the efficiency of security validation.
## Features
- **Cross-Platform:** Windows / Linux / MacOS
- **Plugin-based:** Flexible rule orchestration and syntax engine
- **AI Support:** MCP deep linkage + Skill professional empowerment
- **Communication Protocols:** TCP / UDP / HTTP / WebSocket
- **External Extensions:** ysoserial / Java-Chains / MemShellParty
- **Agent Services:** OOB / JNDI / Service[DNS/LDAP/HTTP]
## Interface Preview

## FAQ
**1. How to start the MCP service?**
Start the MCP server via `./AK47 127.0.0.1:9999`, and check `AK47.log` to get the StreamableHTTP path.
**2. How to set up the Agent service?**
```bash
# AK47 configures the Agent and connects to https://xxx:6666/8418baac-ece1-4f1f-73ef-9bfc08eb886f
./rpg_linux_amd64 -l :6666
2026/01/01 12:00:00 config.go:93: using /8418baac-ece1-4f1f-73ef-9bfc08eb886f as agent endpoint
2026/01/01 12:00:00 service.go:360: starting dns server on :53
2026/01/01 12:00:00 service.go:217: starting tcp server on :6666
```
**3. How to write an AK47 vulnerability plugin?**
Please read the [Wiki](skills/ak47-plugin-generator/references/SYNTAX.en.md) carefully, refer to the examples in the `plugin` directory, and then install the Skill via `npx skills add 99999G/AK47 --skill ak47-plugin-generator` to assist in writing.
**4. Why does a browser ad open every time the program exits?**
We are very sorry for the interruption. The ads will provide a little meager income for the author. Thank you for your understanding and support.
## Sponsorship
If this project is helpful to you, welcome to Star or sponsor to support us!

## References
- https://github.com/wailsapp/wails
- https://github.com/expr-lang/expr
- https://github.com/vulhub/java-chains
- https://github.com/pwntester/ysoserial.net
- https://github.com/ReaJason/MemShellParty
- https://github.com/woodpecker-framework/ysoserial-for-woodpecker