Kali Claw

作者 @brucesongs

AI-powered penetration testing agent built on Kali Linux — 25 security skill domains, 12 hacker laws, 518 tools. OpenClaw workspace.

用 ClawLodge CLI 安装需要先安装 clawlodge-cli
npm install -g clawlodge-cli
clawlodge install brucesongs-kali-claw
适合
包含
18 文件数v0.1.0

kali-claw

An AI-powered penetration testing agent built on Kali Linux, mastering all 518 security tools through continuous self-directed learning.

kali-claw is a self-evolving security agent from the OpenClaw project. It operates 24/7 on Kali Linux, systematically learning and practicing penetration testing across 25 security domains. It thinks like a hacker — first principles, divergent thinking, assume breach — and acts like a senior engineer: direct, hands-on, results-driven.


Features

  • 25 Security Skill Domains — From OSINT and web exploitation to cloud security and digital forensics, each with structured payloads, test cases, and learning guides
  • 12 Hacker Laws — Core behavioral guidelines derived from real-world security philosophy
  • Layered Memory System — Daily logs + distilled long-term memory + monthly chronicles for persistent knowledge across sessions
  • Heartbeat Task Framework — Automated health checks, security scans, learning progress tracking, and knowledge maintenance
  • Fully Reusable — Copy the workspace, change 4 files, and you have a new security agent

Quick Start

Prerequisites

  • OpenClaw installed and configured
  • Recommended: Kali Linux environment — either install OpenClaw directly on Kali Linux, or provide SSH access from your OpenClaw host to a Kali Linux machine so kali-claw can execute security tools remotely

1. Install OpenClaw

npm install -g openclaw@latest

See the official documentation for detailed installation and configuration options.

2. Create a dedicated agent

It is not recommended to use the main agent directly. Create a dedicated agent for this workspace:

openclaw agents add kali-claw --workspace ~/.openclaw/workspace-kali-claw

This creates an isolated agent with its own workspace, auth, and routing. See openclaw agents for full options including --model, --bind, and --non-interactive.

3. Clone this repository into the workspace

cd ~/.openclaw/workspace-kali-claw/
git clone https://github.com/<repo-path>.git .

The agent will automatically read SOUL.md, AGENTS.md, USER.md, and MEMORY.md on startup to initialize its identity and context.

4. Start the agent

openclaw gateway start

Then interact with kali-claw:

> Scan target 192.168.1.100 with nmap for open ports and services
> Teach me how SQL injection works with hands-on examples
> Run an OSINT reconnaissance on example.com

How It Works

Architecture

kali-claw/
├── SOUL.md              # Identity + 12 Hacker Laws (the agent's personality)
├── AGENTS.md            # Workspace config + session startup sequence
├── IDENTITY.md          # Skill tags + personality traits
├── USER.md              # Captain (user) profile
├── MEMORY.md            # Long-term distilled knowledge
├── TOOLS.md             # Tool quick reference + learning progress
├── HEARTBEAT.md         # Periodic heartbeat task framework
├── skills/              # 25 security skill domains
│   ├── api-security/
│   │   ├── SKILL.md         # Skill definition + use cases
│   │   ├── payloads.md      # Attack payloads
│   │   ├── test-cases.md    # Structured test cases
│   │   └── guides/          # Deep-dive learning guides
│   ├── web-sqli/
│   ├── web-xss/
│   ├── cloud-security/
│   └── ... (25 domains total)
├── memory/              # Daily memory logs (YYYY-MM-DD.md)
├── chronicle/           # Monthly chronicle of major events
├── bak/                 # Automatic backups
└── README.md            # This file

Session Lifecycle

Every time the agent starts a new session:

  1. Read SOUL.md — Load identity and hacker laws
  2. Read USER.md — Understand who it's helping
  3. Read recent memory — Get context from today and yesterday
  4. Read MEMORY.md — Load long-term distilled knowledge

The agent wakes up fresh each session but carries continuity through its file-based memory system.

Memory System

LayerFilePurpose
Dailymemory/YYYY-MM-DD.mdRaw activity logs for the day
Long-termMEMORY.mdDistilled knowledge, key decisions, lessons learned
Chroniclechronicle/YYYY-MM/*.mdMonthly record of major events

Knowledge flows upward: daily logs are regularly distilled into MEMORY.md, and major milestones are recorded in the chronicle.


Security Skills

25 domains organized by the OWASP and MITRE frameworks:

DomainDescriptionKey Topics
api-securityAPI security testingREST/GraphQL testing, auth bypass, rate limiting
binary-reverseBinary analysis & reverse engineeringradare2, exploit development, malware analysis
cloud-securityCloud platform securityAWS/Azure/GCP, IAM, S3 exposure, metadata attacks
container-securityContainer & K8s securityDocker escape, K8s RBAC, image scanning
crypto-attacksCryptographic vulnerability testingWeak algorithms, certificate issues, padding oracle
digital-forensicsDigital forensicsDisk analysis, memory forensics, network forensics
insecure-designInsecure design detectionThreat modeling, abuse cases, design patterns
logging-monitoringLogging & monitoring securityLog injection, detection evasion, SIEM bypass
mobile-securityMobile application securityAndroid/iOS testing, certificate pinning, data leakage
network-pentestNetwork penetration testingScanning, exploitation, lateral movement
osintOpen source intelligencePeople search, domain recon, data aggregation
password-attackPassword attack techniquesDictionary attacks, hash cracking, rule-based brute force
post-exploitationPost-exploitation operationsPersistence, privilege escalation, data exfiltration
recon-osintReconnaissance & OSINTSubdomain enum, port scanning, technology fingerprinting
security-misconfigurationSecurity misconfiguration detectionDefault creds, verbose errors, directory listing
social-engineeringSocial engineeringPhishing, pretexting, baiting techniques
supply-chain-securitySoftware supply chain securityDependency attacks, CI/CD poisoning, integrity verification
vulnerability-assessmentVulnerability assessmentAutomated scanning, manual testing, risk rating
web-access-controlBroken access controlIDOR, privilege escalation, forced browsing
web-auth-bypassAuthentication bypassBrute force, session attacks, OAuth flaws
web-sqliSQL injectionUnion-based, blind, time-based, double query
web-ssrfServer-Side Request ForgeryInternal scanning, cloud metadata, protocol smuggling
web-xssCross-Site ScriptingReflected, stored, DOM-based, CSP bypass
wifi-pentestWiFi penetration testingWPA cracking, WPS attacks, evil twin
chronicleChronicle systemEvent logging, milestone tracking

Each skill contains:

  • SKILL.md — Description, use cases, tools, and workflow
  • payloads.md — Curated attack payloads and testing commands
  • test-cases.md — Structured test cases with steps and expected results
  • guides/ — Deep-dive learning guides with hands-on exercises

The 12 Hacker Laws

These laws define how kali-claw thinks and acts:

  1. First Principles Thinking — Reason from fundamental facts, not tools or assumptions
  2. Divergent Thinking First — Always consider 3+ approaches before choosing
  3. Minimize Attack Surface — Less exposure = less risk
  4. Defense in Depth — Never rely on a single security layer
  5. Least Privilege — Grant only necessary access
  6. Assume Breach — Design as if the attacker is already inside
  7. Obscurity Is Not Security — Security through design, not hiding
  8. Trust but Verify — Validate all inputs unconditionally
  9. Information Wants to Be Free — Share knowledge, protect sensitive data
  10. Skill Over Credentials — Judge by capability, not title
  11. The Weakest Link Is Human — Always consider the human factor
  12. Murphy's Security Law — If it can be exploited, it will be

Creating a New Agent

To create a different security agent based on this workspace:

1. Copy the workspace

cp -r kali-claw/ <new-agent-name>/
cd <new-agent-name>/

2. Modify these 4 files

FileWhat to Change
AGENTS.md"Agent Config" block: name, environment, role, specialty
IDENTITY.mdName, role description, skill tags, personality traits
SOUL.mdNickname and role description in "Identity" section
USER.mdCaptain information

3. Clean up historical data

rm -f memory/*.md memory/alerts.txt
rm -rf chronicle/

4. Keep unchanged

The following are universal and reusable as-is:

  • Hacker Laws in SOUL.md — applies to all security agents
  • Heartbeat framework in HEARTBEAT.md
  • All 25 skills in skills/
  • All guides in skills/*/guides/

Example: Web Security Agent

AGENTS.md:
  Agent Name: web-hunter
  Role: Web Security Researcher
  Specialty: Web penetration testing + vulnerability discovery

IDENTITY.md:
  Name: web-hunter
  Skill tags: Keep Web Security rows, simplify others

SOUL.md:
  Nickname: web-hunter
  Keep hacker laws unchanged

Example: Cloud Security Agent

AGENTS.md:
  Agent Name: cloud-sentinel
  Role: Cloud Security Auditor
  Specialty: AWS/Azure/GCP security + Container security

IDENTITY.md:
  Name: cloud-sentinel
  Skill tags: Focus on cloud security and container security

TOOLS.md:
  Core tools: pacu, scoutsuite, kubeaudit, trivy

Core Files Reference

FilePurpose
SOUL.mdAgent identity, hacker laws, behavioral rules, boundaries
AGENTS.mdWorkspace config, session startup sequence, memory system
IDENTITY.mdSkill tags table, personality traits
USER.mdCaptain profile, preferences, current focus
MEMORY.mdLong-term distilled knowledge and key decisions
TOOLS.mdTool inventory, learning progress, learning strategy
HEARTBEAT.mdAutomated heartbeat: health, learning, security, maintenance

Project Info

ProjectOpenClaw Security Research
RuntimeKali Linux 2025-2 (aarch64)
Tools518 Kali security tools (100% coverage)
Skill Domains25
Created2026-03-14
LicenseMIT

Built with the OpenClaw Agent Framework.

Workspace

更新时间 2026/04/27 18:06:15发布方式 clawlodge-cli/0.1.8
AGENTS.md
text · 2.3 KB

正在加载预览...

还没有评论。

相关推荐