ilusm.dev

Security & Red Team

ilusm ships offensive modules. Here is why, what they do, and the rules for using them.

Authorized use only. These modules are for security professionals, researchers, and students working on systems they own or have explicit written permission to test. Unauthorized use is illegal and unethical. ilusm and its contributors bear no responsibility for misuse.

Why ilusm ships offensive modules

ilusm is a general-purpose language with a bias toward backend, network, and security tooling. Security professionals need the same quality of tooling as web developers. Hiding these capabilities behind a separate install or pretending they do not exist does not make anyone safer - it just makes the tools worse.

Every offensive module in ilusm is:

  • Documented with the same care as txt or json
  • Flagged with a # dual-use comment in the source
  • Covered by the responsible use policy below
  • Taught in context - general-purpose lessons first

Responsible use policy

  1. Get written permission before testing any system you do not own.
  2. Scope your work. Only test what is explicitly in scope.
  3. Report findings. Disclose vulnerabilities to the affected party.
  4. Do not weaponize. Do not use these tools to cause harm, disrupt services, or steal data.
  5. Understand the law. Computer fraud laws vary by jurisdiction. Know yours.

Module index

Web AppSec

ModuleShipsDescription
xssshippedXSS payload generation and detection
sqlishippedSQL injection payload helpers
csrfshippedCSRF token analysis
corsshippedCORS misconfiguration detection
hdrshippedHTTP header analysis
authshippedAuthentication helpers

Recon & OSINT

ModuleShipsDescription
osintshippedOSINT / open source intelligence
dnsshippedDNS lookup, zone transfer, subdomain enum
whoisshippedWHOIS lookup
scanshippedPort scanning helpers
geoshippedIP geolocation

Binary & memory

ModuleShipsDescription
binshippedBinary data manipulation
asmshippedAssembly helpers
ffishippedForeign function interface
malshippedMalware analysis helpers
detshippedDetection / AV evasion analysis

Cryptography

ModuleShipsDescription
cryshippedHashing, HMAC, symmetric encryption
cryxshippedExtended crypto: RSA, ECC, DH
cryashippedAsymmetric crypto helpers
jwtshippedJWT encode/decode/verify
kylgshippedKey logging (authorized testing)

Network & protocol

ModuleShipsDescription
netshippedHTTP client
icmpshippedICMP / ping
dosshippedDoS testing helpers (authorized only)
c2shippedC2 framework helpers (authorized only)

Fuzzing

ModuleShipsDescription
fuzzshippedFuzzing harness and mutation engine
fuzshippedFuzzy string matching

Teaching guidelines

When teaching security with ilusm:

  • Start with the general-purpose lesson (e.g., "how HTTP works") before the offensive application
  • Always include the authorization requirement in the lesson
  • Use lab environments (VMs, CTF platforms, intentionally vulnerable apps)
  • Pair every attack technique with its defensive countermeasure

Reporting vulnerabilities in ilusm

If you find a security issue in ilusm itself (the runtime, compiler, or stdlib), do not open a public issue. Contact the maintainers directly. See Legal for the disclosure process.