diff --git a/web/templates/container_sec.html b/web/templates/container_sec.html
new file mode 100644
index 0000000..03f249c
--- /dev/null
+++ b/web/templates/container_sec.html
@@ -0,0 +1,676 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — Container Security{% endblock %}
+
+{% block content %}
+
+
+
+
+ Docker: checking...
+ kubectl: checking...
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Docker Host Audit
+
+
+
+
+ | Check | Severity | Status | Detail |
+
+ | Click "Audit Docker Host" to check daemon configuration and security. |
+
+
+
+
+
+
+
Containers
+
+
+
+
+ | Name | Image | Status | Ports | Actions |
+
+ | Click "Refresh Containers" to list Docker containers. |
+
+
+
+
+
+
+
+
+
+
Escape Vectors —
+
+
+
+
Total vectors: 0
+
Exploitable: 0
+
+
+
+ | Vector | Risk | Exploitable | Detail |
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Pods
+
+
+
+
+ | Name | Status | Containers | Node | Restarts | Actions |
+
+ | Select a namespace and click "List Pods". |
+
+
+
+
+
+
+
Cluster Security Checks
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Image Vulnerability Scan
+
+ Scan container images for known CVEs using Trivy or Grype.
+
+
+
+
+
+ | Severity | CVE | Package | Installed | Fixed |
+
+ | Enter an image name and click "Scan Image" to find vulnerabilities. |
+
+
+
+
+
+
+
Local Images
+
+
+
+
+ | Repository | Tag | Size | Created | Actions |
+
+ | Click "Refresh Images" to list local Docker images. |
+
+
+
+
+
+
+
Dockerfile Lint
+
+ Paste Dockerfile content below to check for security issues.
+
+
+
+
+
+
+
+ | Rule | Severity | Line | Issue | Detail |
+
+ | Paste a Dockerfile and click "Lint Dockerfile" to check for issues. |
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/deauth.html b/web/templates/deauth.html
new file mode 100644
index 0000000..4dee2ff
--- /dev/null
+++ b/web/templates/deauth.html
@@ -0,0 +1,687 @@
+{% extends "base.html" %}
+{% block title %}Deauth Attack - AUTARCH{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Wireless Interfaces
+
+
+
+
+
+
+
+
+
+
+ | Interface | Mode | Channel | MAC |
+
+ | Click Refresh to list wireless interfaces. |
+
+
+
+
+
+
Scan Networks
+
+
+
+
+ | SSID | BSSID | Channel |
+ Encryption | Signal | Clients | |
+
+
+
+ | No networks scanned yet. |
+
+
+
+
+
+
Scan Clients
+
+ Target AP: —
+
+
+
+
+ | Client MAC | AP BSSID | Signal | Packets | |
+
+
+ | Click Scan Clients after selecting a network. |
+
+
+
+
+
+
+
+
+
+
+
Selected Target
+
+
+ | AP BSSID | — |
+ | AP SSID | — |
+ | Client MAC | Broadcast (FF:FF:FF:FF:FF:FF) |
+
+
+
+
+
+
Single Burst Attack
+
+
+
+
+
+
+
+
+
+
Continuous Mode
+
+
+
+
+
+
+
+
+
+ ATTACKING
+ 0 frames
+ 0s
+
+
+
+
+
+
Multi-Target Attack
+
+ Add multiple AP/client pairs and launch deauth against all simultaneously.
+
+
+ | AP BSSID | Client MAC | |
+
+ | No targets added. Select targets from the Targets tab. |
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Channel Control
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Attack History
+
+
+
+
+
+
+
+
+ | Time | Target AP | Client |
+ Mode | Frames | Duration |
+
+
+
+ | Click Refresh to load attack history. |
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/email_sec.html b/web/templates/email_sec.html
new file mode 100644
index 0000000..4cf7f11
--- /dev/null
+++ b/web/templates/email_sec.html
@@ -0,0 +1,753 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — Email Security{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Domain Email Security Check
+
+
+
+
+
+
+
+
+
--
+
Email Security Grade
+
--/100
+
+
+
+ | Check | Status |
+
+ | SPF | -- |
+ | DMARC | -- |
+ | DKIM | -- |
+ | MX / STARTTLS | -- |
+
+
+
+
+
+
+
+
+
+
+
DMARC Record
+
+
+
+ | Policy | -- |
+ | Subdomain Policy | -- |
+ | Percentage | -- |
+ | SPF Alignment | -- |
+ | DKIM Alignment | -- |
+ | Aggregate Reports (rua) | -- |
+ | Forensic Reports (ruf) | -- |
+
+
+
+
+
+
+
+
+
+
+
MX Records
+
+ | Priority | Host | IP | STARTTLS | Banner |
+
+ | No data |
+
+
+
+
+
+
+
+
+
Blacklist Check
+
+
+
+
+ | Blacklist | Status | Details |
+
+ | Enter an IP or domain above. |
+
+
+
+
+
+
+
+
+
+
+
+
+
Email Header Analysis
+
+
+
+
+
+
+
+
+
+
+
+
+
Authentication Results
+
+ SPF: --
+ DKIM: --
+ DMARC: --
+
+
+
+ | From | -- |
+ | Return-Path | -- |
+ | Reply-To | -- |
+ | Subject | -- |
+ | Date | -- |
+ | Originating IP | -- |
+ | Message-ID | -- |
+
+
+
+
+
+
+
+
+
+
Spoofing Indicators
+
+
+
+
+
+
+
+
+
+
Phishing Detection
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Abuse Report Generator
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Mailbox Connection
+
+
+
+
+
+
+
+
Results
+
+
+
+ | Date | From | Subject | Size | Actions |
+
+ | Connect and search to see results. |
+
+
+
+
+
+
+
+
Email Viewer
+
+
+
+
+
+
+
+
+
+
+
+ | Filename | Type | Size |
+
+ | No attachments |
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/exploit_dev.html b/web/templates/exploit_dev.html
new file mode 100644
index 0000000..d8b5d32
--- /dev/null
+++ b/web/templates/exploit_dev.html
@@ -0,0 +1,688 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — Exploit Dev{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Shellcode Generator
+
+ Generate architecture-specific shellcode from built-in templates. Supports host/port patching.
+
+
+
+
+
+
+
+
+
+
+
No shellcode generated yet.
+
+
+
+
+
+
+
+
+
Payload Encoder
+
+ Encode shellcode to evade signature detection. Supports XOR, AES-256, alphanumeric, and polymorphic encoding.
+
+
+
+
+
+
+
+
+
+
+
+
+
Original: -- bytes
+
Encoded: -- bytes
+
Increase: --
+
Null-free: --
+
Key: --
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
ROP Gadget Finder
+
+ Scan ELF/PE binaries for ROP gadgets. Uses ropper, ROPgadget, or objdump as backend.
+
+
+
+
+
+
+
+
+
+
+ | Address | Gadget | Type | Add |
+
+ | Run gadget search to see results. |
+
+
+
+
+
+
+
ROP Chain Builder
+
+ Build a ROP chain by adding gadgets from the table above or manually specifying addresses.
+
+
+
+ | # | Address | Gadget | Value | Rm |
+
+ | Add gadgets from the results above. |
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Cyclic Pattern Generator
+
+ Generate De Bruijn / cyclic patterns for buffer overflow offset discovery (like pattern_create).
+
+
+
No pattern generated yet.
+
+
+
+
Pattern Offset Finder
+
+ Find the exact offset of a value within a cyclic pattern (like pattern_offset).
+ Accepts hex (0x41326241), integer, or raw string.
+
+
+
+
+
+
+
Format String Exploitation
+
+ Generate format string test payloads for offset discovery and write-what-where attacks.
+
+
+
+
+
Write-What-Where
+
+
+
+
+
+
Assembly / Disassembly
+
+ Assemble NASM code to machine bytes or disassemble hex bytes to assembly instructions.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/incident_resp.html b/web/templates/incident_resp.html
new file mode 100644
index 0000000..3095152
--- /dev/null
+++ b/web/templates/incident_resp.html
@@ -0,0 +1,800 @@
+{% extends "base.html" %}
+{% block title %}Incident Response - AUTARCH{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Create Incident
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Incidents
+
+
+
+
+
+
+
+ | ID | Name | Type | Severity | Status | Created | Actions |
+
+
+
+
+
+
+
+
+
Incident Detail
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Playbook
+
+
+
+
+
+
+
+
+
Evidence Collection
+
+
+
+
+
+
+
+
+
+
Collect System Evidence
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Add Manual Evidence
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Collected Evidence
+
+
+ | Type/Name | Collected At | Size | Actions |
+
+
+
+
+
+
+
+
+
+
+
+
+
+
IOC Sweep
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Sweep Results
+
+
+
+ | Type | IOC | Found In | Severity | Details |
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Incident Timeline
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/mitm_proxy.html b/web/templates/mitm_proxy.html
new file mode 100644
index 0000000..d1f9618
--- /dev/null
+++ b/web/templates/mitm_proxy.html
@@ -0,0 +1,625 @@
+{% extends "base.html" %}
+{% block title %}MITM Proxy - AUTARCH{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Proxy Status
+
+
+ | State | -- |
+ | Listen Address | -- |
+ | Engine | -- |
+ | Request Count | 0 |
+ | SSL Strip | OFF |
+ | Upstream Proxy | None |
+
+
+
+
+
+
+
+
+
+
+
+
Configuration
+
+
+
+
+
+
+
+
+
CA Certificate
+
+ Generate and install a CA certificate for HTTPS interception.
+ The client must trust this certificate to avoid browser warnings.
+
+
+
+
+
+
+
+ Installation Instructions
+
+ Windows: Double-click the .pem file → Install Certificate →
+ Local Machine → Trusted Root Certification Authorities.
+ macOS: Double-click the .pem → Add to System keychain →
+ Trust → Always Trust.
+ Linux: Copy to /usr/local/share/ca-certificates/ and run
+ sudo update-ca-certificates.
+ Firefox: Settings → Privacy & Security → Certificates →
+ View Certificates → Import.
+ Chrome: Settings → Privacy → Security → Manage certificates →
+ Authorities → Import.
+ Android: Settings → Security → Encryption →
+ Install from storage → select .pem file.
+ iOS: AirDrop or email the .pem → Install Profile →
+ Settings → General → About → Certificate Trust Settings → Enable.
+
+
+
+
+
+
+
+
+
+
+
+
Add Rule
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Active Rules
+
+
+
+
+ | ID |
+ URL Pattern |
+ Method |
+ Action |
+ Status |
+ Actions |
+
+
+
+ | No rules configured. Add a rule above. |
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Traffic Log
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
--
+
+
+
+
+
+
+ | ID |
+ Time |
+ Method |
+ URL |
+ Status |
+ Size |
+ Duration |
+ Sec |
+
+
+
+ | No traffic captured. Start the proxy and route traffic through it. |
+
+
+
+
+
+
+
+
Request Detail
+
+
+
+
+
+
Request
+
+ GET
+
+
+
Headers:
+
+
Body:
+
+
+
+
+
Response
+
+
+
+
+
Headers:
+
+
Body:
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/pineapple.html b/web/templates/pineapple.html
new file mode 100644
index 0000000..0cc9d83
--- /dev/null
+++ b/web/templates/pineapple.html
@@ -0,0 +1,719 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — WiFi Pineapple{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Access Point Configuration
+
+ Configure and launch a rogue access point using hostapd and dnsmasq.
+
+
+
+
+
+
+
+
+
+
+
+
+
Evil Twin Attack
+
+ Clone a target AP's SSID and channel. Optionally deauthenticates clients from the real AP.
+
+
+
+
+
+
+
+
+
+
Karma Attack
+
+ Respond to all client probe requests, impersonating any SSID they seek.
+ Requires hostapd-mana or airbase-ng.
+
+
+
+ Karma Disabled
+
+
+
+
+
+
+
+
+
+
+
Captive Portal
+
+ Redirect all HTTP/HTTPS traffic from connected clients to a fake login page.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Captured Credentials
+
+
+
+
+
+
+ | Time |
+ Username / Email |
+ Password |
+ IP |
+ User-Agent |
+
+
+
+ | No captured credentials yet. |
+
+
+
+
+
+
+
+
+
+
+
Connected Clients
+
+
+
+ 0 clients
+
+
+
+
+ | MAC Address |
+ IP Address |
+ Hostname |
+ OS |
+ First Seen |
+ Data Usage |
+ Actions |
+
+
+
+ | No clients connected. Start a rogue AP first. |
+
+
+
+
+
+
+
+
+
+
+
DNS Spoofing
+
+ Redirect specific domains to an IP address of your choice (e.g., AUTARCH server).
+
+
+
+
+
+
+
+
+
+
+
+
SSL Strip
+
+ Downgrade HTTPS connections to HTTP for traffic interception. Requires sslstrip installed.
+
+
+
+ SSL Strip Disabled
+
+
+
+
+
+
Traffic Statistics
+
+
+
+
+
+
+
Top Domains
+
+ | Domain | Queries |
+
+ | No data yet. |
+
+
+
+
+
Top Clients
+
+ | MAC / IP | Usage |
+
+ | No data yet. |
+
+
+
+
+
+
+
+
Packet Capture
+
+ Capture network traffic from connected clients using tcpdump.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/rcs_tools.html b/web/templates/rcs_tools.html
new file mode 100644
index 0000000..472c92b
--- /dev/null
+++ b/web/templates/rcs_tools.html
@@ -0,0 +1,940 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — RCS/SMS Exploit{% endblock %}
+
+{% block content %}
+
+
+
+
+
+ Checking device...
+ Shizuku: --
+ Archon: --
+ CVE: --
+ SMS App: --
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
MMS Messages
+
+
+
+
+
+
RCS Provider (AOSP content://rcs/)
+
+
+
+
+
+
+
+
+
+
Content Provider Enumeration
+
Scan all known messaging content providers to see which are accessible at UID 2000.
+
+
+
+
+
+
+
+
+
+
+
bugle_db Extraction
+
+ Extract the Google Messages database directly. Messages are stored as plaintext —
+ no decryption needed. Tries: Archon relay → CVE-2024-0044 → root → ADB backup.
+
+
+
+
+
+
+
+
+
+
+
+
+
SQL Query (extracted bugle_db)
+
Run arbitrary SQL against a previously extracted bugle_db.
+
+
+
+
+
+
+
+
+
+
Extracted Database Snapshots
+
+
+
+
+
+
+
+
+
+
+
+
+
Forge RCS Message (via Archon)
+
+
+
+
+
+
+
+
+
+
Forge Conversation
+
+
+
+
+
+
+
Import SMS Backup XML
+
Import from SMS Backup & Restore XML format.
+
+
+
+
+
+
+
+
+
+
Forge Log
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Modify Message
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Bulk Actions
+
+
+
+
+
+
+
+
+
+
Delete Single Message
+
+
+
+
+
+
+
+
+
+
+
+
+
CVE-2024-0044 — run-as Privilege Escalation
+
+ Newline injection in PackageInstallerService allows run-as access to any app's private data.
+ Works on Android 12-13 with security patch before October 2024.
+
+
+
+
+
+
+
+
+
+
+
+
RCS Spoofing
+
+
+
+
+
+
+
+
+
+
+
+
RCS Identity & Signal Protocol
+
+
+
+
+
+
+
+
+
+
Known RCS CVEs
+
+
+
+
+
+
IMS/RCS Diagnostics
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Full Backup
+
+ Back up all SMS/MMS/RCS messages from the device. Content providers capture SMS/MMS;
+ Archon relay or bugle_db extraction captures RCS.
+
+
+
+
+
+
+
+
+
+
+
Restore / Clone
+
+
+
+
+
+
+
+
+
+
Set Default SMS App
+
+
+
+
+
+
+
+
Saved Backups
+
+
+
+
+
+
Exported Files
+
+
+
+
+
+
+
+
+
+
+
SMS/RCS Monitor
+
+ Monitor incoming SMS/RCS messages in real-time via logcat interception.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/reverse_eng.html b/web/templates/reverse_eng.html
new file mode 100644
index 0000000..00db6cc
--- /dev/null
+++ b/web/templates/reverse_eng.html
@@ -0,0 +1,734 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — Reverse Engineering{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Binary Analysis
+
+ Comprehensive file analysis: type detection, hashes, entropy, strings, imports, exports, and packer detection.
+
+
+
+
+
+
+
+
+
+
File Info
+
+
+ | Name | |
+ | Type | |
+ | Architecture | |
+ | Size | |
+ | Modified | |
+ | MD5 | |
+ | SHA1 | |
+ | SHA256 | |
+
+
+
+
+
+
+
Entropy
+
+
+
+ | Section | Raw Size | Entropy | Bar | Status |
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Binary Comparison
+
+
+
+
+
+
+
+
+
+
+
Disassembly
+
+ Disassemble binary data from a file section or raw hex bytes.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Disassembly Output
+
+
+ | Address | Bytes | Mnemonic | Operands |
+
+
+
+
+
+
+
+
+
+
+
+
YARA Scanner
+
+ Scan files against YARA rules for malware signatures, patterns, and indicators of compromise.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Available Rules
+
+ Click "Refresh Rules" to load the list of available YARA rule files.
+
+
+
+
+
+
+
+
+
+
Hex Viewer
+
+ View raw binary content in hex and ASCII format.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/sdr_tools.html b/web/templates/sdr_tools.html
new file mode 100644
index 0000000..f5fd4ae
--- /dev/null
+++ b/web/templates/sdr_tools.html
@@ -0,0 +1,1173 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — SDR/RF Tools{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
SDR Devices
+
+
+
+
+
+
+
Spectrum Scan
+
+
+
+
+
+
+
+
+
+
Spectrum View
+
+
+
+
+
+
+
+
+
+ Common Frequencies Reference
+ ▶
+
+
+
Click a row to set the spectrum scan range.
+
+
+
+
+
+
+
+
+
+
+
+
Capture Signal
+
+
+
+
+
+
+ Recording...
+
+
+
+
+
+
+
+
Recordings
+
+
+
No recordings yet. Capture a signal to get started.
+
+
+
+
+
+
Replay Signal (HackRF TX only)
+
+
+
+
+
+
+
+
Demodulate
+
+
+
+
+
+
+
+
Signal Analysis
+
+
+
+
+
+
+
+
+
+
+
+
+
ADS-B Aircraft Tracking
+
+ Receive and decode ADS-B transponder signals at 1090 MHz to track aircraft in range.
+
+
+
+
+ Idle
+
+
+
+
+
+
+ | ICAO |
+ Callsign |
+ Altitude (ft) |
+ Speed (kn) |
+ Heading |
+ Lat |
+ Lon |
+ Msgs |
+ Last Seen |
+
+
+
+ | Start tracking to see aircraft. |
+
+
+
+
+
+
+
+
GPS Spoofing Detection
+
+ Monitor GPS L1 frequency (1575.42 MHz) for anomalies indicating spoofing: unusual power levels,
+ multiple strong carriers, or flat power distribution.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Drone RF Detection
+
+ Monitor RF bands for drone control links and video transmitters. Detects DJI OcuSync,
+ analog FPV, Crossfire, ExpressLRS, and other common drone protocols on 2.4 GHz, 5.8 GHz,
+ 900 MHz, and 433 MHz bands.
+
+
+
+
+
+
+
+ Scanning for drones...
+
+
+
+
+
+
+
+
+
+
Detections
+ 0
+
+
+
+
+
+
+
+
+
+ | Time |
+ Frequency |
+ Protocol |
+ Signal (dB) |
+ SNR |
+ Confidence |
+ Drone Type |
+ Duration |
+ FHSS |
+
+
+
+ | Start detection to scan for drones. |
+
+
+
+
+
+
+
+
+ Known Drone Frequencies Reference
+ ▶
+
+
+
Common drone control and video frequencies.
+
+
+ | Band | Center Freq | Bandwidth | Usage |
+
+
+ | 2.4 GHz | 2437 MHz | 40 MHz | DJI OcuSync 2.4 GHz Control |
+ | 5.8 GHz | 5787 MHz | 80 MHz | DJI OcuSync 5.8 GHz Control |
+ | 5.8 GHz | 5800 MHz | 200 MHz | Analog FPV 5.8 GHz Video |
+ | 900 MHz | 915 MHz | 26 MHz | TBS Crossfire 900 MHz |
+ | 2.4 GHz | 2440 MHz | 80 MHz | ExpressLRS 2.4 GHz |
+ | 900 MHz | 915 MHz | 26 MHz | ExpressLRS 900 MHz |
+ | 1.2 GHz | 1280 MHz | 100 MHz | 1.2 GHz Analog Video |
+ | 433 MHz | 433 MHz | 2 MHz | 433 MHz Telemetry |
+
+
+
+
5.8 GHz FPV Video Channels
+
+
+ | Raceband (R) |
+
+ | R1: 5658 | R2: 5695 | R3: 5732 | R4: 5769 |
+
+ | R5: 5806 | R6: 5843 | R7: 5880 | R8: 5917 |
+
+
+
+ | Fatshark (F) |
+
+ | F1: 5740 | F2: 5760 | F3: 5780 | F4: 5800 |
+
+ | F5: 5820 | F6: 5840 | F7: 5860 | F8: 5880 |
+
+
+
+ | Boscam E (E) |
+
+ | E1: 5705 | E2: 5685 | E3: 5665 | E4: 5645 |
+
+ | E5: 5885 | E6: 5905 | E7: 5925 | E8: 5945 |
+
+
+
+ | Boscam A (A) |
+
+ | A1: 5865 | A2: 5845 | A3: 5825 | A4: 5805 |
+
+ | A5: 5785 | A6: 5765 | A7: 5745 | A8: 5725 |
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/sms_forge.html b/web/templates/sms_forge.html
new file mode 100644
index 0000000..cc4870b
--- /dev/null
+++ b/web/templates/sms_forge.html
@@ -0,0 +1,930 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — SMS Forge{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Message List
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Generate from Template
+
+ Generate a realistic conversation from a built-in or custom template.
+
+
+
+
+
+
+
+
+
+
+
+
Manual Conversation Builder
+
+ Build a conversation message by message with custom delays.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Bulk Contact Replace
+
+
+
+
+
+
+
+
+
Timestamp Shift
+
+
+ Positive = forward in time, negative = backward.
+ E.g. -1440 shifts back 1 day, 60 shifts forward 1 hour.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Import
+
+ Import an existing SMS Backup & Restore XML file or a CSV file.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Merge Multiple Backups
+
+ Upload multiple XML backups to merge. Duplicates are automatically removed.
+
+
+
+
+
+
+
+
+
+
+
+
+
Export
+
+ Download the current message set as an SMS Backup & Restore XML or CSV file.
+
+
+
+
+
+
Backup Statistics
+
+ Click Refresh to load stats.
+
+
+
+
+
+
+
+
+
+
+
+
+
Conversation Templates
+
+ Built-in and custom templates for generating realistic SMS conversations.
+
+
+
+
+
+
Custom Template Editor
+
+ Create a custom template in JSON format. Fields: name, description, variables (array), messages (array of {body, type, delay_minutes}).
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/social_eng.html b/web/templates/social_eng.html
new file mode 100644
index 0000000..ee83798
--- /dev/null
+++ b/web/templates/social_eng.html
@@ -0,0 +1,740 @@
+{% extends "base.html" %}
+{% block title %}Social Engineering — AUTARCH{% endblock %}
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Clone Login Page
+
+ Fetch a login page, rewrite form actions to capture credentials through AUTARCH.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Cloned Pages
+
+
+
+
+
+
+
+
+
Captured Credentials
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Pretext Templates
+
+
+
+
+
+
+
+
USB Payload Generator
+
+ Generate USB drop payloads for physical social engineering assessments.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Vishing Scripts
+
+ Call flow scripts for voice-based social engineering.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
QR Code Generator
+
+ Generate QR codes for phishing URLs, credential harvesting pages, or payload delivery.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
![QR Code]()
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Create Campaign
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Campaigns
+
+
+
+
+
+
+
+
+
Campaign:
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/starlink_hack.html b/web/templates/starlink_hack.html
new file mode 100644
index 0000000..5f9bbf9
--- /dev/null
+++ b/web/templates/starlink_hack.html
@@ -0,0 +1,900 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — Starlink Hacking{% endblock %}
+
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Discover Dish
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Dish Status
+
+
+
+
+
+
+
+
+
+
Network & WiFi Clients
+
+
+
+
+
+
+
Port Scan
+
+
+
+
+
+
+
+
+
+
+
+
+
Enumerate gRPC Methods
+
+
+
+
+
+
+
Quick Actions
+
+ Send commands to the Starlink dish via gRPC. Use with caution on production hardware.
+
+
+
+
+
+
+
+
+
+
+
+
+
Custom gRPC Call
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Traffic Interception (ARP Spoof)
+
+ ARP spoofing between dish and gateway to intercept traffic. Requires arpspoof or ettercap.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
DNS Spoofing
+
+ Redirect DNS queries for a domain to a controlled IP. Requires dnsspoof or ettercap.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
WiFi Client Deauthentication
+
+ Send deauth packets to disconnect WiFi clients from the Starlink router. Requires aircrack-ng or mdk4.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
MITM WiFi Clients
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Firmware Version Check
+
+ Check the running firmware version against known vulnerable versions.
+
+
+
+
+
+
+
+
Firmware Analysis
+
+ Upload a firmware image for signature scanning, entropy analysis, and string extraction.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Debug Interface Scan
+
+
+
+
+
+
+
RF Downlink Analysis
+
+ Ku-band downlink analysis (10.7-12.7 GHz). Requires SDR hardware (HackRF or RTL-SDR with LNB).
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Jamming Detection
+
+ Check for signal jamming indicators by analyzing dish diagnostics (drop rate, latency, throughput, SNR).
+
+
+
+
+
+
+
+
Known Vulnerabilities
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/web/templates/vuln_scanner.html b/web/templates/vuln_scanner.html
new file mode 100644
index 0000000..c7f0357
--- /dev/null
+++ b/web/templates/vuln_scanner.html
@@ -0,0 +1,627 @@
+{% extends "base.html" %}
+{% block title %}AUTARCH — Vulnerability Scanner{% endblock %}
+{% block content %}
+
+
+
+
+
+
+
+
+
+
+
+
+
New Scan
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Port scan + service detection + CVE matching + headers + SSL
+
+
+
+
+
+
+
Active Scan
+
+
+
+
+
+ Critical: 0
+ High: 0
+ Medium: 0
+ Low: 0
+ Info: 0
+
+
+
+
+
+
+
+ | Severity |
+ Finding |
+ Service |
+ Port |
+ Details |
+
+
+
+
+
+
+ No findings yet...
+
+
+
+
+
+
Standalone Checks
+
+
+
+
Security Headers
+
+
+
+
+
+
+
+
+
SSL/TLS Analysis
+
+
+
+
+
+
+
Default Credentials
+
+
+
+
+
+
+
+
+
+
+
+
+
+
Nuclei Templates
+
+
+
+
+
+
+
+
+
+
+
+
+
Scan History
+
+
+
+
+
+
+
+ | Target |
+ Date |
+ Profile |
+ Status |
+ Findings |
+ Severity Breakdown |
+ Actions |
+
+
+
+
+
+
+ No scans recorded yet.
+
+
+
+
+
+
+
Scan Details
+
+
+
+
+
+
+
+ | Severity |
+ Finding |
+ Type |
+ Service |
+ Port |
+ Details |
+
+
+
+
+
+
+
+
+
+
+
+
+{% endblock %}
diff --git a/windows_manual.md b/windows_manual.md
index 5509811..52a1bc2 100644
--- a/windows_manual.md
+++ b/windows_manual.md
@@ -28,14 +28,26 @@
AUTARCH runs on Windows with most features fully functional. A few Linux-specific tools (like `tshark` packet capture and WireGuard kernel integration) have limited support, but the web dashboard, AI chat, OSINT tools, hardware management, and Metasploit all work on Windows.
**What works on Windows:**
-- Web dashboard (full UI)
-- AI chat (all LLM backends except GPU quantization)
-- OSINT tools
+- Web dashboard (full UI — 59 blueprints, all tool pages)
+- AI chat (all LLM backends — Claude API, OpenAI, local GGUF, HuggingFace)
+- All 72 CLI modules
+- OSINT tools (7,200+ sites, username/email/domain/IP/phone lookup)
- Android/iPhone device management via ADB (USB or WebUSB)
- Hardware ESP32 flashing
- Metasploit RPC client (MSF must be started separately)
- Reverse shell management
-- Targets & Settings
+- C2 Framework, Load Test, Gone Fishing Mail Server
+- Vulnerability Scanner, Exploit Development, Social Engineering
+- Active Directory Audit, MITM Proxy, WiFi Audit
+- Password Toolkit, Web Scanner, API Fuzzer, Cloud Scanner
+- Steganography, Anti-Forensics, Forensics, Reverse Engineering
+- BLE Scanner, RFID/NFC Tools, Malware Sandbox
+- Container Security, Email Security, Incident Response
+- Report Engine, Net Mapper, Log Correlator, Threat Intel
+- SDR/RF Tools (with Drone Detection), Starlink Hack
+- SMS Forge, RCS/SMS Exploitation
+- Pineapple/Rogue AP, Deauth (require Linux/Raspberry Pi for full functionality)
+- Targets, Autonomy, Encrypted Modules, LLM Trainer
- Agent Hal (autonomous AI agent)
**What has reduced functionality on Windows:**
@@ -181,23 +193,15 @@ Default credentials are set during first-run setup. Change them in Settings →
|---------|-------------|
| Dashboard | System overview, tool status |
| Targets | Pentest scope and target management |
-| Defense | System hardening, firewall checks |
-| Offense | Metasploit modules, port scanning |
-| Counter | Threat hunting, detection |
-| Analyze | File forensics, malware analysis |
-| OSINT | Intelligence gathering |
+| Autonomy | AI-driven autonomous security operations |
+| Defense | System hardening, Linux/Windows/Threat Monitor, Threat Intel, Log Correlator, Container Sec, Email Sec, Incident Response |
+| Offense | Metasploit, Load Test, Gone Fishing, Social Eng, Hack Hijack, Web Scanner, C2 Framework, WiFi Audit, Deauth, API Fuzzer, Cloud Scan, Vuln Scanner, Exploit Dev, AD Audit, MITM Proxy, Pineapple, SMS Forge |
+| Counter | Threat hunting, Steganography, Anti-Forensics |
+| Analyze | File forensics, Hash Toolkit, LLM Trainer, Password Toolkit, Net Mapper, Reports, BLE Scanner, Forensics, RFID/NFC, Malware Sandbox, Reverse Eng |
+| OSINT | Intelligence gathering, IP Capture |
| Simulate | Attack scenarios, Legendary Creator |
-| Wireshark | Packet analysis (needs Npcap) |
-| Hardware | Android/iPhone/ESP32 management |
-| Android Exploit | Android-specific testing |
-| iPhone Exploit | iPhone forensics |
-| Shield | Anti-stalkerware scanner |
-| Reverse Shell | Remote device management |
-| Archon | Android companion app |
-| UPnP | Port forwarding |
-| WireGuard | VPN management |
-| MSF Console | Metasploit terminal |
-| Settings | All configuration |
+| Tools | Enc Modules, Wireshark, Hardware, Android Exploit (+ SMS Forge), iPhone Exploit, Shield, Reverse Shell, Archon, SDR/RF Tools, Starlink Hack, RCS Tools |
+| System | UPnP, WireGuard, DNS Server, MSF Console, Chat, Settings |
### HAL Chat Button
@@ -405,7 +409,7 @@ AUTARCH's WireGuard page generates and manages config files. On Windows, apply t
| Feature | Status | Notes |
|---------|--------|-------|
-| Web dashboard | Full | Works perfectly |
+| Web dashboard (59 blueprints) | Full | Works perfectly |
| AI chat (cloud APIs) | Full | Claude, OpenAI, HuggingFace all work |
| AI chat (local GGUF) | Full (CPU) | Slow without GPU |
| GPU quantization (4-bit/8-bit) | Partial | Needs CUDA + bitsandbytes |
@@ -416,6 +420,13 @@ AUTARCH's WireGuard page generates and manages config files. On Windows, apply t
| ADB (WebUSB/Direct) | Full | Chrome/Edge only, needs WinUSB driver |
| ESP32 flashing | Full | COM port instead of /dev/ttyUSB |
| WireGuard | Partial | Needs Windows WireGuard app |
+| SDR/RF Tools | Full | Needs HackRF or RTL-SDR hardware + drivers |
+| Starlink Hack | Full | Needs network access to Starlink dish |
+| SMS Forge / RCS Tools | Full | Needs ADB connection to Android device |
+| WiFi Audit / Deauth / Pineapple | Partial | Full functionality requires Linux/monitor-mode adapter |
+| C2 Framework | Full | All agent types work |
+| Vulnerability Scanner | Full | Nuclei recommended for template scanning |
+| Container Security | Full | Needs Docker Desktop installed |
| Background service | Via Task Scheduler | `--service` flag doesn't work |
| System uptime | N/A | Shows "N/A" (uses /proc/uptime) |
| mDNS discovery | Partial | May require Bonjour |
@@ -560,4 +571,52 @@ python autarch.py --setup
---
-*AUTARCH is for authorized security testing and research only. Always obtain written permission before testing systems you do not own.*
+---
+
+## 14. New Tools Overview (v2.3)
+
+AUTARCH v2.3 includes 59 web blueprints and 72 CLI modules. Here is a summary of the major tool categories added since v2.0:
+
+### Offense Tools
+| Tool | Description |
+|------|-------------|
+| Vulnerability Scanner | Nuclei/OpenVAS template-based scanning with severity ratings |
+| Exploit Development | Shellcode gen, payload encoding, ROP chains, pattern generator |
+| Social Engineering | Credential harvest, pretexts, QR phishing, campaign tracking |
+| AD Audit | LDAP enumeration, Kerberoasting, AS-REP roast, ACL analysis |
+| MITM Proxy | HTTP(S) interception, SSL strip, request modification |
+| Pineapple | Rogue AP, Evil Twin, captive portal (Raspberry Pi) |
+| Deauth Attack | WiFi deauthentication (Raspberry Pi + monitor-mode adapter) |
+| C2 Framework | Multi-agent command & control with task queuing |
+| WiFi Audit | Wireless network security assessment |
+| SMS Forge | Create/modify SMS Backup & Restore XML backups |
+| RCS/SMS Exploit | Message extraction, forging, and RCS exploitation via ADB |
+| Starlink Hack | Starlink terminal security analysis and gRPC exploitation |
+
+### Defense Tools
+| Tool | Description |
+|------|-------------|
+| Container Security | Docker/K8s audit, image scanning, escape detection |
+| Email Security | DMARC/SPF/DKIM analysis, header forensics, phishing detection |
+| Incident Response | IR playbooks, evidence collection, IOC sweeping, timeline |
+| Threat Intelligence | Feed aggregation, IOC management, STIX/TAXII |
+| Log Correlator | Multi-source log aggregation and event correlation |
+
+### Analysis Tools
+| Tool | Description |
+|------|-------------|
+| Reverse Engineering | Binary analysis, Capstone disassembly, YARA, Ghidra integration |
+| Digital Forensics | Disk/memory forensics, artifact extraction |
+| SDR/RF Tools | Spectrum analysis, RF replay, ADS-B tracking, drone detection |
+| Steganography | Data hiding/extraction in images and audio |
+| BLE Scanner | Bluetooth Low Energy discovery and fuzzing |
+| RFID/NFC Tools | Card reading, cloning, emulation |
+| Malware Sandbox | Safe detonation and behavior analysis |
+| Net Mapper | Network topology discovery with SVG visualization |
+
+All tools are accessible from the web dashboard sidebar and most are also available via CLI (`python autarch.py -m
`).
+
+---
+
+*AUTARCH v2.3 — By darkHal Security Group and Setec Security Labs*
+*For authorized security testing and research only. Always obtain written permission before testing systems you do not own.*