These examples are provided EXCLUSIVELY for:
- ✅ Authorized penetration testing with written permission
- ✅ Defensive security research in controlled environments
- ✅ Security awareness training programs
- ✅ Development and testing of security tools
- ✅ Academic research with proper ethical approval
- ✅ Red team exercises within your own organization
- ✅ Compliance testing for regulatory requirements
NEVER use these examples for:
- ❌ Unauthorized access to systems or networks
- ❌ Attacking systems without explicit written permission
- ❌ Malicious activities of any kind
- ❌ Testing third-party systems without authorization
- ❌ Violating computer fraud and abuse laws
- ❌ Bypassing security controls on production systems
- ❌ Any illegal or unethical activities
YOU ARE SOLELY RESPONSIBLE FOR YOUR ACTIONS
Using these tools and examples against systems you don't own or don't have explicit authorization to test is ILLEGAL in most jurisdictions and may violate:
- Computer Fraud and Abuse Act (CFAA) - USA
- Computer Misuse Act - UK
- European Convention on Cybercrime
- Local and international cybercrime laws
Unauthorized access can result in:
- Criminal prosecution
- Civil liability
- Significant financial penalties
- Imprisonment
ALWAYS obtain written authorization before conducting security testing.
This directory contains synthetic security testing data generators using agentic-synth. These tools help security professionals generate realistic test data for defensive security operations, tool development, and training.
Generates test data for common web application vulnerabilities:
- SQL Injection Payloads - Test input validation and parameterized queries
- XSS Attack Vectors - Validate output encoding and CSP
- CSRF Test Scenarios - Test token validation and SameSite cookies
- Authentication Bypass Tests - Validate authentication mechanisms
- API Abuse Patterns - Test rate limiting and API security controls
- OWASP Top 10 Tests - Comprehensive vulnerability testing suite
Use Cases:
- Web application security scanner development
- WAF (Web Application Firewall) rule testing
- Security code review training
- DevSecOps pipeline validation
Generates threat actor behavior simulations:
- Brute Force Attack Patterns - Test account lockout mechanisms
- DDoS Traffic Simulation - Validate DDoS mitigation
- Malware Behavior Patterns - Test EDR/XDR systems
- Phishing Campaign Data - Security awareness training
- Insider Threat Scenarios - UBA system validation
- Zero-Day Exploit Indicators - Threat intelligence testing
Use Cases:
- SOC analyst training
- Incident response preparedness
- Threat detection rule development
- Security monitoring system validation
Generates security audit and compliance data:
- User Access Patterns - Detect privilege escalation
- Permission Change Audits - Track access control modifications
- Configuration Change Monitoring - Security-sensitive config tracking
- Compliance Violation Scenarios - GDPR, HIPAA, PCI-DSS testing
- Security Event Correlations - SIEM correlation rule testing
- DLP Audit Data - Data loss prevention policy validation
Use Cases:
- SIEM and log analysis tool development
- Compliance reporting automation
- Security audit automation
- Insider threat detection system testing
Generates penetration testing datasets:
- Network Scanning Results - Vulnerability scanner testing
- Port Enumeration Data - Service identification validation
- Service Fingerprinting - Version detection testing
- Exploitation Attempt Logs - Exploit detection system validation
- Post-Exploitation Activity - Lateral movement detection
- Pentest Report Data - Reporting system development
Use Cases:
- Penetration testing tool development
- Red team exercise planning
- Security assessment automation
- Vulnerability management system testing
# From the monorepo root
npm install
# Or specifically for agentic-synth
cd packages/agentic-synth
npm installSet up your Anthropic API key:
export ANTHROPIC_API_KEY='your-api-key-here'Or create a .env file in the agentic-synth directory:
ANTHROPIC_API_KEY=your-api-key-here
import {
generateSQLInjectionPayloads,
generateXSSVectors
} from './security/vulnerability-testing';
// Generate SQL injection test payloads
const sqlPayloads = await generateSQLInjectionPayloads();
console.log(sqlPayloads);
// Generate XSS test vectors
const xssVectors = await generateXSSVectors();
console.log(xssVectors);import { runVulnerabilityTests } from './security/vulnerability-testing';
import { runThreatSimulations } from './security/threat-simulation';
import { runSecurityAudits } from './security/security-audit';
import { runPenetrationTests } from './security/penetration-testing';
// Run all vulnerability tests
const vulnResults = await runVulnerabilityTests();
// Run all threat simulations
const threatResults = await runThreatSimulations();
// Run all security audits
const auditResults = await runSecurityAudits();
// Run all penetration tests
const pentestResults = await runPenetrationTests();import { AgenticSynth } from 'agentic-synth';
const synth = new AgenticSynth({
temperature: 0.8, // Higher for more variety
maxRetries: 3
});
const customData = await synth.generate({
prompt: 'Generate custom security test data...',
schema: {
// Your custom JSON schema
}
});Before any security testing:
┌─────────────────────────────────────────────┐
│ OBTAIN WRITTEN AUTHORIZATION │
│ │
│ ✓ Scope definition │
│ ✓ Time windows │
│ ✓ Acceptable techniques │
│ ✓ Emergency contacts │
│ ✓ Legal review │
└─────────────────────────────────────────────┘
- Use isolated test networks
- Deploy honeypots for realistic testing
- Separate production from testing
- Implement proper segmentation
- Monitor all testing activities
If you discover real vulnerabilities:
- Do not exploit beyond proof of concept
- Document findings professionally
- Report to appropriate parties immediately
- Follow responsible disclosure timelines
- Respect confidentiality agreements
- Never use real user data in tests
- Sanitize all test data before sharing
- Encrypt sensitive test artifacts
- Properly dispose of test data
- Follow data protection regulations
// Always validate before execution
if (!hasAuthorization()) {
throw new Error('Unauthorized testing attempt blocked');
}
// Log all activities
logSecurityTestActivity({
action: 'vulnerability_scan',
target: authorizedTarget,
timestamp: new Date(),
authorization: authorizationId
});
// Implement rate limiting
const rateLimiter = new RateLimiter({
maxRequestsPerMinute: 10
});These examples are valuable for:
- Hands-on labs for security courses
- Certification preparation (CEH, OSCP, etc.)
- Capture the Flag (CTF) competitions
- Security awareness programs
- Building security testing frameworks
- Creating custom vulnerability scanners
- Developing SIEM correlation rules
- Implementing IDS/IPS signatures
- Security research projects
- Academic publications
- Threat modeling exercises
- Risk assessment frameworks
1. AUTHORIZATION
↓
2. RECONNAISSANCE (Passive)
↓
3. SCANNING (Active, if authorized)
↓
4. ENUMERATION
↓
5. EXPLOITATION (Controlled)
↓
6. POST-EXPLOITATION (Limited)
↓
7. DOCUMENTATION
↓
8. REPORTING
↓
9. REMEDIATION SUPPORT
↓
10. RE-TESTING
✅ Get explicit written permission ✅ Stay within defined scope ✅ Report vulnerabilities responsibly ✅ Protect client confidentiality ✅ Document all activities ✅ Follow industry standards (OWASP, NIST, etc.) ✅ Maintain professional ethics ✅ Provide remediation guidance ✅ Respect privacy and data protection laws
❌ Test without authorization ❌ Exceed defined scope ❌ Cause damage or disruption ❌ Access or exfiltrate real data ❌ Share findings publicly without permission ❌ Use discoveries for personal gain ❌ Ignore responsible disclosure procedures ❌ Test in production without approval ❌ Bypass security controls unnecessarily
When generating test data for compliance testing:
- Use synthetic data only
- Don't process real personal data
- Document data processing activities
- Implement data minimization
- Ensure right to erasure
- Never use real PHI (Protected Health Information)
- Test with synthetic medical data only
- Ensure encryption at rest and in transit
- Document all security testing activities
- Maintain audit logs
- Never test with real cardholder data
- Use test card numbers only
- Implement network segmentation
- Conduct quarterly vulnerability scans
- Perform annual penetration tests
- OWASP Testing Guide
- NIST Cybersecurity Framework
- MITRE ATT&CK Framework
- CVE Database
- NVD (National Vulnerability Database)
- OWASP Local Chapters
- DEF CON Groups
- SANS Internet Storm Center
- Bugcrowd and HackerOne forums
- SANS Security Training
- Offensive Security Certifications
- eLearnSecurity Courses
- Cybrary Free Courses
When contributing security testing examples:
- Ensure ethical use - All examples must be defensive
- Include warnings - Clear ethical use statements
- Document thoroughly - Explain intended use cases
- Test safely - Validate in isolated environments
- Review carefully - Security team approval required
These examples are provided for educational and authorized testing purposes only. Users are solely responsible for ensuring compliance with all applicable laws and regulations.
🚨 CRITICAL 🚨
UNAUTHORIZED COMPUTER ACCESS IS A CRIME
These tools are powerful and must be used responsibly. The line between ethical hacking and criminal activity is authorization. Always obtain explicit written permission before conducting any security testing.
When in doubt, don't test. Ask first.
Generated using agentic-synth - Synthetic data for ethical security testing
Remember: With great power comes great responsibility. Use these tools wisely.