
AI-Powered Offensive Security Platform
A parallelized recon engine maps every domain, port, endpoint, secret, and CVE into a graph database. A fireteam of autonomous AI specialists then queries that graph in real time to plan, exploit, and pivot with full battlefield awareness.
A full offensive stack of recon engines, exploit frameworks, and AI agents, sandboxed in containers and gated by engagement phase.
One command to deploy.


Self-hosted Docker stack. One script bootstraps Postgres, Neo4j, the agent, the recon containers and the webapp. No external accounts required to run a scan.
An autonomous agent that thinks, plans, and attacks like a human pentester. It chooses targets, picks tools, adapts to findings, and keeps going until the objective is reached or escalation is needed.
The dedicated tools the agent calls directly, each with structured I/O, timeout discipline and graph-aware routing.
Single bash -c gateway to the full Kali toolset, wordlists, Python libraries and pre-staged post-exploit binaries.
Deploy N specialist sub-agents investigating independent attack angles concurrently. Each runs its own ReAct loop and approval queue.
Scatter-Gather ReAct pattern: asyncio fan-out, fan-in to unified context, no recursion, per-agent attribution.
Every tool, finding, exploit and dead-end persists as a queryable graph that survives across sessions. New sessions auto-load prior context.
5-node attack taxonomy, dual-layer in-memory + async Neo4j writes, cross-session learning at session init.
When the agent spots independent tools, it runs them all at once under a single Wave card and merges their analysis.
asyncio batched tool execution, single streaming card, joint output reasoning, slashing wall-clock time by N.
AI auto-classifies findings as CVE-exploit / brute-force / phishing and routes to Metasploit, Hydra or msfvenom without manual selection.
LLM tagging with cve_exploit / brute_force / phishing labels; payload type auto-pick (staged/stageless, reverse/bind).
At session start, phase transitions and 3+ failure loops the agent pauses for structured Situation / Vectors / Approach / Priority / Risks analysis.
Four trigger conditions, five-section output, injected into all subsequent reasoning. Counts as roughly 1 extra LLM call per engagement.
Keep post-exploit shells open and run lateral movement, privilege escalation and exfil interactively, not as one-shot payloads.
Stateful + stateless modes, persistent session state, 70+ post-exploit commands, Meterpreter-aware routing.
Auto-tunnel reverse shells over ngrok or Chisel. LHOST and LPORT are auto-discovered and payloads are pre-configured for the agent.
Two providers (ngrok TCP single-port, Chisel multi-port bidirectional), auto-started inside Kali sandbox, hidden endpoint config.
Multi-level scope enforcement: LLM ethics gate, 250+ hard-coded .gov / .mil / critical-infra blocklist, RoE parser, stealth mode, phase gating, HITL approvals, tenant-isolated Cypher, sandboxed Kali container.
Soft LLM guardrail, deterministic regex blocklist, three-tier RoE enforcement, stealth-mode tool restrictions, phase-gated tool map, 27-tool confirmation list, phase-transition approval, per-skill OOB toggles, read-only Cypher with user_id+project_id filters, containerized execution.
Human-in-the-loop gates on Metasploit, Hydra, code execution and phase transitions. Flip a switch for fully autonomous mode.
Per-project Agent Behaviour, deterministic dangerous-tool list, stealth mode disables noisy tools and blocks live scanning.
Type a message while the agent is mid-engagement and it gets injected into the next reasoning step. Refocus, redirect or veto without stopping the session.
Examples: 'focus on SSH vulnerabilities', 'skip the web app, look at network services', 'try a different exploit module'. Acknowledged by the agent before the next think iteration.
Run multiple independent agentic conversations per project, each with its own phase, todo list and execution trace. Switch between them without losing state.
Per-conversation checkpointing, days-later resume, agent-running indicators, auto-generated titles, Markdown export. Stop and Resume preserve full context.
Local FAISS + Neo4j RAG index over curated security datasets (GTFOBins, LOLBAS, NVD, ExploitDB, OWASP, Nuclei, MITRE) queried before any external web search.
6-stage pipeline: hybrid retrieval, source boosts, cross-encoder rerank, MMR diversity, sufficiency check. ~250 ms vs 1-3 s Tavily, works offline, falls back automatically when confidence is low.
Ask the agent “show endpoints with injectable params” and it generates the Cypher query, with 3-attempt error recovery.
25+ example patterns, automatic parameter binding, write ops blocked, tenant-filtered to prevent cross-project leakage.
Curate trusted hacking sources (HackTricks, PayloadsAllTheThings). The agent fetches and cites pages mid-attack.
Per-user URL library, auto-fetch during chains, content embedded into reasoning steps with source attribution.
Swap the agent brain across OpenAI, Anthropic, OpenRouter, Google Gemini, DeepSeek, GLM, Kimi, Qwen, xAI Grok, Mistral, AWS Bedrock and any OpenAI-compatible endpoint, per project or per session.
Model-tuned system prompts, hot-swap, dynamic model fetching, OpenAI-compatible bucket covers Ollama, vLLM, LM Studio, Groq, Together AI, Fireworks AI, Deepinfra.
Phase-aware workflows for CVE/MSF, SQLi, XSS, SSRF, RCE, Path Traversal/LFI/RFI, Hydra brute force, phishing simulation and availability testing. Auto-selected by the Intent Router from a single user message.
Per-skill tool routing (sqlmap, dalfox, commix, sstimap, ysoserial, hydra, msfvenom, slowhttptest), OWASP 4-stage rigor, OOB oracles via interactsh, RoE-gated activation.
Drop-in Markdown attack workflows from the community: XXE, BFLA, IDOR/BOLA, SSTI, insecure deserialization, mass assignment, subdomain takeover, insecure file uploads, advanced API/SQLi/XSS exploitation.
Each skill is a single .md file with phased steps and a description for classification, injected verbatim across all three phases. Upload your own from Global Settings, toggled per project.
Reference library for tool flags, vulnerability theory and framework quirks. Inject any of them mid-conversation with /skill ffuf, /skill nextjs, /skill jwt, etc.
Categories cover Active Directory, Cloud, Post-Exploitation, Tooling, Protocols, API Security, Technologies, Frameworks, Vulnerabilities. Persist across messages, swap on demand, no impact on classification.
Industry-standard scanners chained so each tool's output feeds the next, then merged into a single Neo4j knowledge graph. Findings are deduplicated, relationships are explicit, and the agent inherits a structured, fully connected attack surface ready to query in natural language.
Each module is an independent stage of the deterministic recon engine. Findings flow downstream as graph nodes and relationships, ready for the agent to query.
The modules are not isolated scanners. Each tool's output is the next tool's input: subdomains feed port scans, ports feed HTTP probes, URLs feed crawlers, JS bundles feed secret detectors. Every finding lands in the graph as a node, every dependency as a relationship.
Producer / consumer mapping locks every stage to the next, MERGE-based writes deduplicate across runs, and the resulting graph becomes the structured knowledge the agent reasons over via query_graph and Cypher.
Independent modules running concurrently end-to-end: subdomain discovery, OSINT enrichment, port scanning, HTTP probing, web crawling, JS analysis, GraphQL testing, vhost discovery, takeover detection, vulnerability scanning, secret hunting and security configuration checks.
ThreadPoolExecutor fan-out, MERGE-based graph writes, RoE-aware tool gating, partial recon to re-run any single tool without redoing the pipeline.
Battle-tested CLI tools, APIs and detector libraries shipped across the modules: Subfinder, Amass, Nuclei, Httpx, Naabu, Masscan, Nmap, Katana, FFuf, jsluice, GVM, TruffleHog, Subjack, BadDNS, vulnx and 60+ more.
Full ProjectDiscovery suite, OWASP Amass, OpenVAS NVT corpus, vulnx + NVD + KEV + EPSS + MITRE ATT&CK / CWE / CAPEC, 7 passive OSINT sources, 90+ JS secret patterns, 700+ TruffleHog detectors, 40+ takeover provider fingerprints.
Every recon stage feeds a single Neo4j knowledge graph the agent reasons over: Domain → Subdomain → IP → Port → Service → CVE → Endpoint → Vuln.
32 node types, 50+ relationships, multi-tenant scoped (user_id + project_id on every node), EvoGraph bridges to attack chains.
Extract API endpoints, cloud keys, JWT secrets, source maps and dependency confusion vectors from JavaScript bundles.
jsluice + 90+ regex patterns (AWS, GCP, Stripe, Twilio), framework fingerprinting, graph-indexed for agent reuse.
Each module exposes its full parameter surface in the project settings UI: thread counts, rate limits, scan profiles, wordlists, severity filters, custom flags. UI fields become the tool's CLI arguments at scan time.
169+ project settings across dedicated per-tool forms, sensible defaults, validated input, immutable post-apply for reproducible scans, free-form custom-args field for power users.
Real network-level GVM/OpenVAS scans against live IPs (not just DAST) with QoD scoring and CVSS-rated findings.
Parallel container, configurable scan profiles (Full+fast, Full+slow), CVE/Vulnerability node feeds linked to IP/Port/Service.
Scan repos for 700+ secret patterns and live-verify they actually authenticate against the issuing API.
Regex + entropy detection, optional API verification, verified flag on Secret nodes, supports private repos.
Mine GitHub search, repos and commit history for hardcoded credentials with 40+ entropy-validated patterns.
Public + private repos, full commit history, PDCP-compatible, results merged into the graph as Secret nodes.
Find admin panels, staging sites and k8s ingress backends hidden behind reverse proxies via L7 Host + L4 SNI probing.
Per IP×subdomain pair, separate BaseURL nodes, detection method tagged, exposes Cloudflare routing inconsistencies.
One-click profiles for API, web, internal, cloud or IoT. Or ask the AI to generate a custom preset for your target.
328+ pipeline parameters, immutable post-apply for reproducible scans, AI generation via LLM on demand.
Visual 11-stage pipeline diagram with animated edges and amber/red warnings when tool dependencies are starved.
Three-band layout (data / tools / data), click-through tool config modal, Tab/Workflow toggle, real-time edge animation.
Re-run any tool (Nuclei, Naabu, Katana) on custom inputs without redoing the full pipeline. Results MERGE into the graph with no duplicates.
Per-tool play button, custom-targets modal, MERGE logic with orphan UserInput cleanup, saved tool settings honoured.
Passively enrich discovered IPs and domains with intelligence from Censys, FOFA, OTX, Netlas, VirusTotal, ZoomEye and CriminalIP without touching the target.
Pure passive enrichment for certificates, ports, historical data, threat intel; merged into IP/Domain/Port nodes as properties.
Two specialized AI agents pick up where reconnaissance and exploitation leave off. The triage agent reads the graph, dedupes findings across scanners, prioritizes by exploitability and proposes ranked remediation. The CodeFix agent then implements those fixes against your real repository and ships them as a pull request.

Beyond the agent and the recon engine: governance, surface slicing, dashboards, training labs, knowledge base, reports, exports and multi-tenancy. The full toolkit a security team needs around an autonomous pentester.
Describe an attack surface in plain English (“CVEs CVSS>9 affecting our stack”). AI generates a read-only Cypher slice and saves named surfaces.
20 example queries, scopes both agent + canvas, infrastructure / vulnerability / web-app / threat-intel categories, reusable across sessions.
Upload a Rules-of-Engagement PDF. AI parses it into structured constraints, enforced at agent prompt + tool executor + pipeline filter.
Three-layer enforcement, deterministic hard gate, scope / exclusions / time windows / rate limits / compliance frameworks; non-bypassable by prompt injection.
Explore your full attack surface on a force-directed 2D or WebGL 3D graph, with real-time updates during scans and a click-through node drawer.
Node coloring per type, filter + legend, live properties drawer, pan/zoom/rotate, agent + scan toolbar controls.
Switch from graph to table mode and slice the findings by type: Node Inspector, All Nodes, JS Recon, plus 13 dedicated finding tables (Vulnerabilities, CVEs, Subdomains, Endpoints, Secrets, Certificates, Ports, Services, Headers and more). Search, sort and export every one.
16 presets (3 base + 13 finding tables), per-table search and refresh, XLSX / JSON / Markdown export buttons on every preset, Node Inspector for property-level node drill-down.
Proof your agent can actually pwn things: 48 scenarios across SQLi, NoSQL, RCE, XXE, SSRF, JWT, IDOR, prototype pollution.
Decoded walkthroughs, video demos, community submissions welcome, 12 categories on a deliberately vulnerable DVWS-Node + CVE lab.
Single-pane KPIs: 6-axis security radar, composite risk score 0 to 100, trend charts across the whole instance.
12 weighted signals (CVSS, EPSS, KEV, CAPEC, GVM, secrets), log-normalized radar prevents saturation, real-time aggregation.
Query CVEs by CVSS≥8, EPSS≥0.5, KEV status and Nuclei template availability via Lucene syntax, with no manual KEV lookups.
vulnx CLI wrapper across NVD + KEV + EPSS + HackerOne + GitHub PoCs + Nuclei + CPE; 69 searchable fields, 6h refresh.
Agent queries a local KB (GTFOBins, LOLBAS, NVD, ExploitDB, OWASP, Nuclei) first. Web search runs only when KB confidence is low.
FAISS vector index + Neo4j fulltext, ≥0.35 confidence skips Tavily, works zero-API-key for sensitive engagements.
Full interactive xterm.js shell into the Kali sandbox container, with all 70+ pentesting tools pre-installed and no SSH needed.
WebSocket PTY (port 8016), signal handling, color support, agent proxy → kali-sandbox terminal server → /bin/bash.
Export findings as templated PDF / DOCX / HTML reports with executive summary, severity filters and embedded graph visualizations.
Multiple templates (executive, technical, compliance), auto-TOC, tool-output appendices, raw Cypher logs.
16 export presets covering Node Inspector, all nodes, JS Recon and 13 finding tables, in XLSX, JSON or Markdown.
Styled headers, per-column filters preserved, hyperlinks, full-project or per-table; programmatic JSON for downstream tools.
Multi-user / multi-project tenancy with admin & standard roles, 169+ project settings and global API key rotation.
DB-level user_id + project_id filtering, per-project LLM provider, key rotation for rate-limit management, shared key vault.
Real RedAmon engagements recorded end to end. The agent picks targets, runs tools, adapts to findings and pwns the target while you watch. Unscripted, full timeline, no edits.