Research Paper: On the Feasibility of Using LLMs to Execute Multistage Network Attacks
Create a configuration file by copying the example:
cp config/config_example.json config/config.jsonThen edit config/config.json as needed.
Create an environment file by copying the example:
cp .env.example .envThen add LLM API keys to .env.
Navigate to the docker directory and start the containers:
cd docker
docker compose upIn a new terminal window, attach to the running container and execute Incalmo:
cd docker
docker compose exec attacker /bin/bash
uv run main.py