GUI Overview
The RTFMv2 GUI is a comprehensive graphical interface designed for penetration testing and red team operations. It provides an intuitive, feature-rich environment that integrates hundreds of security tools, AI-powered analysis, automated workflows, and real-time collaboration capabilities.

Key Features
Core Capabilities
- Session Management: Create, open, and manage engagement sessions with encrypted data storage
- AI Integration: Background analysis, intelligent agents, and interactive chat assistance
- Integrated Scanners: Native interfaces for Nmap, Wfuzz, SQLMap, OpenVAS, and Nuclei
- Remote Console Management: Connect to and interact with remote shells in real-time
- Exploit Generation: Visual interface for MSFVenom payload creation
- OCR Processing: Automatic text extraction from images with HTML output
- Network Mapping: Custom graphical network visualization tool
- Tool Parsers: Automatic data ingestion from common security tools
- Plugin System: Expandable architecture for custom functionality
- Real-time Notifications: Live updates on scan progress and findings
Data-Driven Features
- Host Details: Comprehensive view of target information and findings
- Checklists & Mindmaps: Guided workflows for methodical testing
- CrackMapExec Interface: Streamlined Active Directory enumeration
- Reverse Shells: Data-driven shell listeners and handlers
- Code Snippets: Quick access to common exploitation techniques
- Template Attacks: Customizable attack patterns with plugin support
Tool Integration
- Kali Tool Library: Direct access to hundreds of pre-installed Kali Linux tools
- Real-time Output: Live command execution feedback
- Parser Integration: Automatic import of tool results into session data
Interface Components
The GUI is organized into functional modules:
| Module | Purpose |
|---|---|
| Session Dashboard | Overview of current engagement and quick actions |
| Scanner Suite | Integrated scanning tools with custom UIs |
| AI Assistant | Chat interface and automated analysis |
| Console Manager | Remote shell connections and interactions |
| Host Explorer | Detailed target information and findings |
| Tool Library | Access to Kali tools and custom utilities |
| Attack Templates | Pre-configured and custom attack patterns |
| Network Map | Visual representation of discovered infrastructure |
Getting Started
- Create or Open a Session - Start a new engagement or continue previous work
- Configure AI Features - Enable intelligent analysis and assistance
- Run Scanners - Discover targets and vulnerabilities
- Explore Tools - Leverage built-in utilities and integrations
- Manage Data - Organize findings with checklists and reports
Template Attacks
RTFMv2 provides a comprehensive attack framework including template-based attacks, a plugin system for custom exploits, and integration with hundreds of Kali Linux exploitation tools.
The attack system includes:
- Template Attacks: Pre-configured, multi-step attack workflows
- Plugin System: Expandable architecture for custom attacks
- Code Snippets: Quick exploit code and payloads
- Attack Automation: AI-driven attack chains
Using Attack Templates
Accessing Templates:
- Navigate to "Templates" from main menu
- Browse template library
- Select appropriate template
- Execute attack

Built-in Templates
Categorized by Attack Type:
- Active Directory
- FTP
- HTTP
- Standard Attack
- Web API
System Requirements
- Operating System: Windows 10/11, Linux (Kali),
- Dependencies: .NET runtime, Sqlite database
- Optional: Kali Linux tools, Node-RED for automation
- Recommended: 8GB RAM, 20GB disk space for session data
Navigation
Explore the GUI documentation:
- Session Management - Creating and managing engagement sessions
- AI Features - Automated analysis and intelligent assistance
- Scanner Suite - Nmap, Wfuzz, SQLMap, OpenVAS, and Nuclei
- Tools & Utilities - MSFVenom, OCR, and Kali tool integration
- Data Management - Checklists, mindmaps, and host details
Next Steps
Begin by creating your first session or explore the AI capabilities to see how RTFMv2 can accelerate your penetration testing workflow.