GUI Overview

The RTFMv2 GUI is a comprehensive graphical interface designed for penetration testing and red team operations. It provides an intuitive, feature-rich environment that integrates hundreds of security tools, AI-powered analysis, automated workflows, and real-time collaboration capabilities.

Key Features

Core Capabilities

  • Session Management: Create, open, and manage engagement sessions with encrypted data storage
  • AI Integration: Background analysis, intelligent agents, and interactive chat assistance
  • Integrated Scanners: Native interfaces for Nmap, Wfuzz, SQLMap, OpenVAS, and Nuclei
  • Remote Console Management: Connect to and interact with remote shells in real-time
  • Exploit Generation: Visual interface for MSFVenom payload creation
  • OCR Processing: Automatic text extraction from images with HTML output
  • Network Mapping: Custom graphical network visualization tool
  • Tool Parsers: Automatic data ingestion from common security tools
  • Plugin System: Expandable architecture for custom functionality
  • Real-time Notifications: Live updates on scan progress and findings

Data-Driven Features

  • Host Details: Comprehensive view of target information and findings
  • Checklists & Mindmaps: Guided workflows for methodical testing
  • CrackMapExec Interface: Streamlined Active Directory enumeration
  • Reverse Shells: Data-driven shell listeners and handlers
  • Code Snippets: Quick access to common exploitation techniques
  • Template Attacks: Customizable attack patterns with plugin support

Tool Integration

  • Kali Tool Library: Direct access to hundreds of pre-installed Kali Linux tools
  • Real-time Output: Live command execution feedback
  • Parser Integration: Automatic import of tool results into session data

Interface Components

The GUI is organized into functional modules:

Module Purpose
Session Dashboard Overview of current engagement and quick actions
Scanner Suite Integrated scanning tools with custom UIs
AI Assistant Chat interface and automated analysis
Console Manager Remote shell connections and interactions
Host Explorer Detailed target information and findings
Tool Library Access to Kali tools and custom utilities
Attack Templates Pre-configured and custom attack patterns
Network Map Visual representation of discovered infrastructure

Getting Started

  1. Create or Open a Session - Start a new engagement or continue previous work
  2. Configure AI Features - Enable intelligent analysis and assistance
  3. Run Scanners - Discover targets and vulnerabilities
  4. Explore Tools - Leverage built-in utilities and integrations
  5. Manage Data - Organize findings with checklists and reports

Template Attacks

RTFMv2 provides a comprehensive attack framework including template-based attacks, a plugin system for custom exploits, and integration with hundreds of Kali Linux exploitation tools.

The attack system includes:

  • Template Attacks: Pre-configured, multi-step attack workflows
  • Plugin System: Expandable architecture for custom attacks
  • Code Snippets: Quick exploit code and payloads
  • Attack Automation: AI-driven attack chains

Using Attack Templates

Accessing Templates:

  1. Navigate to "Templates" from main menu
  2. Browse template library
  3. Select appropriate template
  4. Execute attack

Built-in Templates

Categorized by Attack Type:

  1. Active Directory
  2. FTP
  3. HTTP
  4. Standard Attack
  5. Web API

System Requirements

  • Operating System: Windows 10/11, Linux (Kali),
  • Dependencies: .NET runtime, Sqlite database
  • Optional: Kali Linux tools, Node-RED for automation
  • Recommended: 8GB RAM, 20GB disk space for session data

Explore the GUI documentation:

Next Steps

Begin by creating your first session or explore the AI capabilities to see how RTFMv2 can accelerate your penetration testing workflow.