world map
RedAmon

RedAmon

AI-Powered Offensive Security Platform

······ ··· ······ ······ ··· ····· ····

A parallelized recon engine maps every domain, port, endpoint, secret, and CVE into a graph database. A fireteam of autonomous AI specialists then queries that graph in real time to plan, exploit, and pivot with full battlefield awareness.

What attackers run against you, you run first.

A full offensive stack of recon engines, exploit frameworks, and AI agents, sandboxed in containers and gated by engagement phase.
One command to deploy.

RedAmon agent live demo
1.8k
GitHub stars
live count, click to star us
385
GitHub forks
community forks of the repo
394
Total commits
across the default branch
MIT
License
free for commercial and personal use
30+
Agent tools
across 5 MCP servers + agentic toolset
3
Phase-gated tools
Informational / Exploitation / Post-Exploitation
24
Recon pipeline modules
deterministic, parallelized, graph-fed
100+
Pre-installed CLI tools
Kali sandbox + recon + scanner containers
70+
Community Agent Skills
Built-in workflows, community packs, on-demand /skill library
27
Containerized services
PostgreSQL, Neo4j, GVM, MCP servers, agent…
20
OSINT sources
Shodan, Censys, OTX, FOFA, Uncover, ZoomEye, CriminalIP…
40+
Graph node types
full attack surface, from domain to secret to vuln
500+
Project settings
fine-grained control over agent and tool behavior
400+
LLM models
OpenAI, Anthropic, Gemini, DeepSeek, xAI, Mistral, Bedrock…
Kali
Linux sandbox
Metasploit, Impacket, BloodHound, Hydra, Nuclei…
1
Command to deploy
docker compose up -d, fully isolated
Fully isolated & containerized
Every tool, scanner and agent runs in its own container, with no host-level execution. Sibling containers are spawned per scan job. Each job is fully isolated, with its own ephemeral filesystem and network namespace, and is torn down as soon as the work completes. This keeps the host clean, prevents cross-job contamination, and contains the blast radius of any exploit or misbehaving tool.
RedAmon recon pipeline live demo

Install in Three Commands

Self-hosted Docker stack. One script bootstraps Postgres, Neo4j, the agent, the recon containers and the webapp. No external accounts required to run a scan.

~/redamon
1# Clone the repository
$git clone https://github.com/samugit83/redamon.git
$cd redamon
2# Install (without GVM — lighter, faster startup)
$./redamon.sh install

Your AI Offensive Engineer

An autonomous agent that thinks, plans, and attacks like a human pentester. It chooses targets, picks tools, adapts to findings, and keeps going until the objective is reached or escalation is needed.

Agent Tool Belt

The dedicated tools the agent calls directly, each with structured I/O, timeout discipline and graph-aware routing.

  • query_graph
    Natural-language queries over the Neo4j attack-surface graph (Domains, Subdomains, IPs, Ports, Endpoints, CVEs, Secrets, Technologies). Primary recon source.
  • web_search
    KB-first hybrid search (FAISS + Neo4j) over GTFOBins, LOLBAS, NVD, ExploitDB, OWASP, Nuclei templates and tool docs. Falls back to Tavily when confidence is low.
  • cve_intel
    ProjectDiscovery vulnx CLI: NVD + CISA KEV + EPSS + HackerOne + public PoC links + Nuclei template availability in one passive query.
  • shodan
    Internet-wide OSINT: search exposed devices, fetch host details, reverse DNS, domain DNS, count without burning credits.
  • google_dork
    Passive Google search via SerpAPI with site:, inurl:, intitle:, filetype:, intext: operators.
  • execute_nuclei
    8000+ YAML templates for CVE verification and exploitation. Custom templates served from /opt/nuclei-templates.
  • execute_curl
    HTTP requests for reachability, headers, status codes, banners and baseline diffing.
  • execute_httpx
    Fast HTTP prober with status, title, server, redirect chain and technology detection in JSONL output.
  • execute_naabu
    Fast TCP/SYN port scanning to verify open ports or scan targets not yet in the graph.
  • execute_nmap
    Deep scanning with version detection, OS fingerprint and the full NSE script library.
  • execute_subfinder
    Passive subdomain enumeration via certificate transparency, DNS datasets and search engines. No traffic to target.
  • execute_amass
    OWASP Amass subdomain discovery with passive, active, brute-force and ASN intel modes.
  • execute_gau
    Passive URL discovery from Wayback Machine, Common Crawl, AlienVault OTX and URLScan.
  • execute_katana
    JS-aware web crawler that finds endpoints, paths and known files (robots.txt, sitemap.xml).
  • execute_jsluice
    Static analysis of downloaded JavaScript for hidden API endpoints, parameters and embedded secrets.
  • execute_arjun
    Brute-forces ~25,000 parameter names to surface hidden GET, POST, JSON and XML params before injection testing.
  • execute_ffuf
    Fast web fuzzer for directory, virtual host and parameter discovery with SecLists wordlists.
  • execute_wpscan
    WordPress scanner for vulnerable plugins, themes, users and config backups.
  • execute_hydra
    THC Hydra brute-force across 50+ protocols (SSH, FTP, RDP, SMB, MySQL, PostgreSQL, HTTP forms, Tomcat, WordPress).
  • metasploit_console
    Persistent msfconsole singleton with module context and live Meterpreter sessions across calls.
  • msf_restart
    Full Metasploit reset: kills every active session and clears module config. Takes 60-120s.
  • execute_playwright
    Real-browser automation for SPAs, dynamic pages, form filling, XSS dialog proof and multi-step flows.
  • execute_code
    Run multi-line Python, bash, ruby, perl, C or C++ exploit scripts without shell escaping. 120s timeout.
  • tradecraft_lookup
    Auto-fetch curated security URLs (HackTricks, PayloadsAllTheThings, custom user library) and embed them into reasoning steps.
  • kali_shell
    General bash -c gateway to the full Kali toolset. See the catalog below for everything reachable from here.

kali_shell catalog

Single bash -c gateway to the full Kali toolset, wordlists, Python libraries and pre-staged post-exploit binaries.

Exploitation
msfvenomsearchsploitsqlmapdalfoxkxssinteractsh-clientcommixsstimaptplmapysoserialphpggc
Password cracking
hashcatjohnhashidcewl
Web / infra scanning
niktowhatwebtestsslparamspider
DNS & subdomain takeover
dignslookuphostdnsrecondnsxsubzy
Active Directory
smbclientsshpassenum4linux-ngnetexec / nxckerbrutebloodhound-pythonbhgraphcertipy-adbloodyADgMSADumpergpp-decryptldapdomaindumpimpacket-wmiexecimpacket-psexecimpacket-smbexecimpacket-secretsdumpimpacket-GetNPUsersimpacket-GetUserSPNsimpacket-ticketerimpacket-getSTimpacket-addcomputerimpacket-rbcdimpacket-dacleditimpacket-changepasswdimpacket-ntlmrelayx
API & GraphQL
jwt_toolgraphql-copgraphqlmap
Secrets & SAST
gitleakssemgrep
DoS / stress
hping3slowhttptest
Tunneling
ngrokchisel
General utilities
netcatsocatrlwrapjqgitwgetperlgcc / g++ / makenode / npm
Wordlists
SecLists common.txtSecLists big.txtraft-medium-directoriesrockyou.txt10k-most-commonxato-net 9M usernameshashcat best64.rulejohn rules
Python libraries
requestsbeautifulsoup4pycryptodomePyJWTparamikoimpacketpwntoolswebsocketszeeppython3-samlboto3msalazure-identityazure-mgmt-resourcegoogle-authgoogle-api-python-clientgoogle-cloud-storage
Post-exploit toolkits
linpeas.shLinEnum.shpspy64deepce.shwinPEASx64.exePowerUp.ps1PrivescCheck.ps1

Fireteam Parallel Specialists

Deploy N specialist sub-agents investigating independent attack angles concurrently. Each runs its own ReAct loop and approval queue.

Scatter-Gather ReAct pattern: asyncio fan-out, fan-in to unified context, no recursion, per-agent attribution.

EvoGraph Attack Chain Evolution

Every tool, finding, exploit and dead-end persists as a queryable graph that survives across sessions. New sessions auto-load prior context.

5-node attack taxonomy, dual-layer in-memory + async Neo4j writes, cross-session learning at session init.

Wave Runner Parallel Tools

When the agent spots independent tools, it runs them all at once under a single Wave card and merges their analysis.

asyncio batched tool execution, single streaming card, joint output reasoning, slashing wall-clock time by N.

Three-Path Exploitation Routing

AI auto-classifies findings as CVE-exploit / brute-force / phishing and routes to Metasploit, Hydra or msfvenom without manual selection.

LLM tagging with cve_exploit / brute_force / phishing labels; payload type auto-pick (staged/stageless, reverse/bind).

Deep Think Strategic Reasoning

At session start, phase transitions and 3+ failure loops the agent pauses for structured Situation / Vectors / Approach / Priority / Risks analysis.

Four trigger conditions, five-section output, injected into all subsequent reasoning. Counts as roughly 1 extra LLM call per engagement.

Stateful Meterpreter Sessions

Keep post-exploit shells open and run lateral movement, privilege escalation and exfil interactively, not as one-shot payloads.

Stateful + stateless modes, persistent session state, 70+ post-exploit commands, Meterpreter-aware routing.

NAT-Transparent Reverse Shells

Auto-tunnel reverse shells over ngrok or Chisel. LHOST and LPORT are auto-discovered and payloads are pre-configured for the agent.

Two providers (ngrok TCP single-port, Chisel multi-port bidirectional), auto-started inside Kali sandbox, hidden endpoint config.

10-Layer Safety Guardrails

Multi-level scope enforcement: LLM ethics gate, 250+ hard-coded .gov / .mil / critical-infra blocklist, RoE parser, stealth mode, phase gating, HITL approvals, tenant-isolated Cypher, sandboxed Kali container.

Soft LLM guardrail, deterministic regex blocklist, three-tier RoE enforcement, stealth-mode tool restrictions, phase-gated tool map, 27-tool confirmation list, phase-transition approval, per-skill OOB toggles, read-only Cypher with user_id+project_id filters, containerized execution.

Bounded Approval Workflow

Human-in-the-loop gates on Metasploit, Hydra, code execution and phase transitions. Flip a switch for fully autonomous mode.

Per-project Agent Behaviour, deterministic dangerous-tool list, stealth mode disables noisy tools and blocks live scanning.

Live Guidance Steering

Type a message while the agent is mid-engagement and it gets injected into the next reasoning step. Refocus, redirect or veto without stopping the session.

Examples: 'focus on SSH vulnerabilities', 'skip the web app, look at network services', 'try a different exploit module'. Acknowledged by the agent before the next think iteration.

Parallel Pentest Sessions

Run multiple independent agentic conversations per project, each with its own phase, todo list and execution trace. Switch between them without losing state.

Per-conversation checkpointing, days-later resume, agent-running indicators, auto-generated titles, Markdown export. Stop and Resume preserve full context.

Offline Security Knowledge Base

Local FAISS + Neo4j RAG index over curated security datasets (GTFOBins, LOLBAS, NVD, ExploitDB, OWASP, Nuclei, MITRE) queried before any external web search.

6-stage pipeline: hybrid retrieval, source boosts, cross-encoder rerank, MMR diversity, sufficiency check. ~250 ms vs 1-3 s Tavily, works offline, falls back automatically when confidence is low.

Natural Language → Cypher

Ask the agent “show endpoints with injectable params” and it generates the Cypher query, with 3-attempt error recovery.

25+ example patterns, automatic parameter binding, write ops blocked, tenant-filtered to prevent cross-project leakage.

Tradecraft Lookup

Curate trusted hacking sources (HackTricks, PayloadsAllTheThings). The agent fetches and cites pages mid-attack.

Per-user URL library, auto-fetch during chains, content embedded into reasoning steps with source attribution.

400+ LLM Models, 12 Providers

Swap the agent brain across OpenAI, Anthropic, OpenRouter, Google Gemini, DeepSeek, GLM, Kimi, Qwen, xAI Grok, Mistral, AWS Bedrock and any OpenAI-compatible endpoint, per project or per session.

Model-tuned system prompts, hot-swap, dynamic model fetching, OpenAI-compatible bucket covers Ollama, vLLM, LM Studio, Groq, Together AI, Fireworks AI, Deepinfra.

Built-in Agent Skills

Phase-aware workflows for CVE/MSF, SQLi, XSS, SSRF, RCE, Path Traversal/LFI/RFI, Hydra brute force, phishing simulation and availability testing. Auto-selected by the Intent Router from a single user message.

Per-skill tool routing (sqlmap, dalfox, commix, sstimap, ysoserial, hydra, msfvenom, slowhttptest), OWASP 4-stage rigor, OOB oracles via interactsh, RoE-gated activation.

User Agent Skills

Drop-in Markdown attack workflows from the community: XXE, BFLA, IDOR/BOLA, SSTI, insecure deserialization, mass assignment, subdomain takeover, insecure file uploads, advanced API/SQLi/XSS exploitation.

Each skill is a single .md file with phased steps and a description for classification, injected verbatim across all three phases. Upload your own from Global Settings, toggled per project.

Chat Skills

Reference library for tool flags, vulnerability theory and framework quirks. Inject any of them mid-conversation with /skill ffuf, /skill nextjs, /skill jwt, etc.

Categories cover Active Directory, Cloud, Post-Exploitation, Tooling, Protocols, API Security, Technologies, Frameworks, Vulnerabilities. Persist across messages, swap on demand, no impact on classification.

Recon as a Living Knowledge Graph

Industry-standard scanners chained so each tool's output feeds the next, then merged into a single Neo4j knowledge graph. Findings are deduplicated, relationships are explicit, and the agent inherits a structured, fully connected attack surface ready to query in natural language.

Recon Pipeline Modules

Each module is an independent stage of the deterministic recon engine. Findings flow downstream as graph nodes and relationships, ready for the agent to query.

Subdomain Discovery
Passive subdomain enumeration via certificate transparency, DNS datasets and search engines, plus optional active brute-force. Produces Subdomain, IP and DNSRecord nodes.
subfinderamassdnsrecondnsxURLScanProjectDiscovery UncoverDNS brute-force
Domain & WHOIS Recon
WHOIS / RDAP lookups, DNS record enumeration (A, AAAA, MX, TXT, NS, CAA, SOA), domain age, registrar and zone transfers.
whoisRDAPdigdnsrecon zone transferDNS records
Shodan Internet OSINT
Per-IP host details: open ports, service banners, CVEs, SSL info, OS guess. Also reverse DNS, domain DNS and result counting without burning credits.
Shodan hostShodan searchShodan dns_reverseShodan dns_domain
OSINT Enrichment (7-Source)
Passive intelligence enrichment from seven independent sources, merged into Domain, IP, Port and Service nodes without sending traffic to the target.
CensysFOFAAlienVault OTXNetlasVirusTotalZoomEyeCriminalIP
Port Scanning
Active TCP / SYN port discovery and service version detection. Naabu and Masscan run fast sweeps; Nmap follows up with NSE scripts and OS fingerprinting.
naabumasscannmapNSE scripts
HTTP Probing & Tech Detection
Probes discovered hosts for live HTTP / HTTPS, extracts status, title, server, redirect chain, certificates and detected technologies. Produces BaseURL, Certificate, Technology and Header nodes.
httpxtech detectionTLS / certificate parsing
Web Crawling & Resource Enumeration
Crawl, fuzz and discover endpoints, parameters and hidden paths. Output flows into Endpoint, Parameter, BaseURL, ExternalDomain and Secret nodes.
katanahakrawlerffufgauparamspiderkiterunnerarjun
JS Deep Reconnaissance
Six-stage static analysis of JavaScript bundles: secret patterns, secret validation, source map discovery, dependency confusion, endpoint extraction, framework + DOM sinks + dev comments.
jsluice90+ secret patternsAWS / GCP / Stripe / Twilio validatorssource map probesdependency confusion detectionframework fingerprintingDOM sinksdev-comment scrape
GraphQL Security Testing
Auto-discover GraphQL endpoints, run full schema introspection and 12 OWASP-aligned misconfiguration checks. Sensitive-field flagging.
graphql-copintrospection probesalias / fragment / mutation handlersgraphql-cop misconfig checks
VHost & SNI Hidden Host Discovery
Find admin panels, staging sites and k8s ingress backends hidden behind reverse proxies. L7 Host header probes plus L4 SNI handshake probes.
ffuf vhost modeL7 Host header probesL4 SNI handshake probesCloudflare routing checks
Subdomain Takeover Detection
Three engines run in parallel, dedup, confidence-score and auto-claim 12+ providers (Heroku, GitHub Pages, AWS S3, Azure, Vercel, Netlify, Fastly, Shopify and more).
subjacknuclei takeover templatesBadDNS (AGPL sidecar)
Nuclei Template Scanning
8000+ YAML templates for CVE verification and exploitation, plus custom templates served from /opt/nuclei-templates. Produces Vulnerability, CVE, MitreData and Capec nodes.
nuclei8000+ YAML templatescustom templates
GVM / OpenVAS Network Vuln Scan
Real network-level NVT scans against live IPs (not just DAST) with QoD scoring and CVSS-rated findings. Configurable scan profiles, parallel container.
gvmdopenvasd170k+ NVTsFull+fast / Full+slow profiles
TruffleHog Secret Scanning
Scan public or private repos for 700+ secret patterns and live-verify they actually authenticate against the issuing API.
trufflehogregex + entropylive API verifier
GitHub Secret Hunting
Mine GitHub search, repos and full commit history for hardcoded credentials with 40+ entropy-validated patterns.
GitHub Search API40+ entropy patternscommit history scan
CVE & MITRE Enrichment
Technology-based CVE lookup plus MITRE ATT&CK / CWE / CAPEC mapping. Vulnx aggregates NVD, CISA KEV, EPSS, HackerOne, public PoCs and Nuclei template availability.
vulnxNVDCISA KEVEPSSMITRE ATT&CKCWECAPEC
Security Configuration Checks
26 deterministic configuration checks covering TLS, security headers, DNS hygiene, authentication and exposure of sensitive endpoints.
testsslHSTS / CSP / X-Frame-OptionsDMARC / SPF / DKIMexposure rules

Tool Output → Agent Knowledge

The modules are not isolated scanners. Each tool's output is the next tool's input: subdomains feed port scans, ports feed HTTP probes, URLs feed crawlers, JS bundles feed secret detectors. Every finding lands in the graph as a node, every dependency as a relationship.

Producer / consumer mapping locks every stage to the next, MERGE-based writes deduplicate across runs, and the resulting graph becomes the structured knowledge the agent reasons over via query_graph and Cypher.

17 Parallel Recon Modules

Independent modules running concurrently end-to-end: subdomain discovery, OSINT enrichment, port scanning, HTTP probing, web crawling, JS analysis, GraphQL testing, vhost discovery, takeover detection, vulnerability scanning, secret hunting and security configuration checks.

ThreadPoolExecutor fan-out, MERGE-based graph writes, RoE-aware tool gating, partial recon to re-run any single tool without redoing the pipeline.

80+ Tools, Libraries and Sources

Battle-tested CLI tools, APIs and detector libraries shipped across the modules: Subfinder, Amass, Nuclei, Httpx, Naabu, Masscan, Nmap, Katana, FFuf, jsluice, GVM, TruffleHog, Subjack, BadDNS, vulnx and 60+ more.

Full ProjectDiscovery suite, OWASP Amass, OpenVAS NVT corpus, vulnx + NVD + KEV + EPSS + MITRE ATT&CK / CWE / CAPEC, 7 passive OSINT sources, 90+ JS secret patterns, 700+ TruffleHog detectors, 40+ takeover provider fingerprints.

32-Node Attack Surface Graph

Every recon stage feeds a single Neo4j knowledge graph the agent reasons over: Domain → Subdomain → IP → Port → Service → CVE → Endpoint → Vuln.

32 node types, 50+ relationships, multi-tenant scoped (user_id + project_id on every node), EvoGraph bridges to attack chains.

JS Deep Reconnaissance

Extract API endpoints, cloud keys, JWT secrets, source maps and dependency confusion vectors from JavaScript bundles.

jsluice + 90+ regex patterns (AWS, GCP, Stripe, Twilio), framework fingerprinting, graph-indexed for agent reuse.

Every Tool Fully Configurable

Each module exposes its full parameter surface in the project settings UI: thread counts, rate limits, scan profiles, wordlists, severity filters, custom flags. UI fields become the tool's CLI arguments at scan time.

169+ project settings across dedicated per-tool forms, sensible defaults, validated input, immutable post-apply for reproducible scans, free-form custom-args field for power users.

170k+ NVT Network Vuln Scanning

Real network-level GVM/OpenVAS scans against live IPs (not just DAST) with QoD scoring and CVSS-rated findings.

Parallel container, configurable scan profiles (Full+fast, Full+slow), CVE/Vulnerability node feeds linked to IP/Port/Service.

TruffleHog 700+ Detectors

Scan repos for 700+ secret patterns and live-verify they actually authenticate against the issuing API.

Regex + entropy detection, optional API verification, verified flag on Secret nodes, supports private repos.

GitHub Secret Hunter

Mine GitHub search, repos and commit history for hardcoded credentials with 40+ entropy-validated patterns.

Public + private repos, full commit history, PDCP-compatible, results merged into the graph as Secret nodes.

VHost & SNI Hidden Host Discovery

Find admin panels, staging sites and k8s ingress backends hidden behind reverse proxies via L7 Host + L4 SNI probing.

Per IP×subdomain pair, separate BaseURL nodes, detection method tagged, exposes Cloudflare routing inconsistencies.

21 Recon Presets + AI-Generated

One-click profiles for API, web, internal, cloud or IoT. Or ask the AI to generate a custom preset for your target.

328+ pipeline parameters, immutable post-apply for reproducible scans, AI generation via LLM on demand.

Workflow View + Chain-Break Detection

Visual 11-stage pipeline diagram with animated edges and amber/red warnings when tool dependencies are starved.

Three-band layout (data / tools / data), click-through tool config modal, Tab/Workflow toggle, real-time edge animation.

Partial Recon Single-Tool Runner

Re-run any tool (Nuclei, Naabu, Katana) on custom inputs without redoing the full pipeline. Results MERGE into the graph with no duplicates.

Per-tool play button, custom-targets modal, MERGE logic with orphan UserInput cleanup, saved tool settings honoured.

7-Source OSINT Enrichment

Passively enrich discovered IPs and domains with intelligence from Censys, FOFA, OTX, Netlas, VirusTotal, ZoomEye and CriminalIP without touching the target.

Pure passive enrichment for certificates, ports, historical data, threat intel; merged into IP/Domain/Port nodes as properties.

CypherFix Closes the Vulnerability Loop

Two specialized AI agents pick up where reconnaissance and exploitation leave off. The triage agent reads the graph, dedupes findings across scanners, prioritizes by exploitability and proposes ranked remediation. The CodeFix agent then implements those fixes against your real repository and ships them as a pull request.

CypherFix triage and CodeFix agents producing a pull request

Everything Else in the Box

Beyond the agent and the recon engine: governance, surface slicing, dashboards, training labs, knowledge base, reports, exports and multi-tenancy. The full toolkit a security team needs around an autonomous pentester.

Surface Shaper

Describe an attack surface in plain English (“CVEs CVSS>9 affecting our stack”). AI generates a read-only Cypher slice and saves named surfaces.

20 example queries, scopes both agent + canvas, infrastructure / vulnerability / web-app / threat-intel categories, reusable across sessions.

RoE Parsing & 3-Layer Enforcement

Upload a Rules-of-Engagement PDF. AI parses it into structured constraints, enforced at agent prompt + tool executor + pipeline filter.

Three-layer enforcement, deterministic hard gate, scope / exclusions / time windows / rate limits / compliance frameworks; non-bypassable by prompt injection.

Red Zone 2D / 3D Graph Canvas

Explore your full attack surface on a force-directed 2D or WebGL 3D graph, with real-time updates during scans and a click-through node drawer.

Node coloring per type, filter + legend, live properties drawer, pan/zoom/rotate, agent + scan toolbar controls.

16 Data Table Views

Switch from graph to table mode and slice the findings by type: Node Inspector, All Nodes, JS Recon, plus 13 dedicated finding tables (Vulnerabilities, CVEs, Subdomains, Endpoints, Secrets, Certificates, Ports, Services, Headers and more). Search, sort and export every one.

16 presets (3 base + 13 finding tables), per-table search and refresh, XLSX / JSON / Markdown export buttons on every preset, Node Inspector for property-level node drill-down.

HackLab: 48 Autonomous Scenarios

Proof your agent can actually pwn things: 48 scenarios across SQLi, NoSQL, RCE, XXE, SSRF, JWT, IDOR, prototype pollution.

Decoded walkthroughs, video demos, community submissions welcome, 12 categories on a deliberately vulnerable DVWS-Node + CVE lab.

Insights Dashboard Risk Analytics

Single-pane KPIs: 6-axis security radar, composite risk score 0 to 100, trend charts across the whole instance.

12 weighted signals (CVSS, EPSS, KEV, CAPEC, GVM, secrets), log-normalized radar prevents saturation, real-time aggregation.

CVE Intel Exploitability Engine

Query CVEs by CVSS≥8, EPSS≥0.5, KEV status and Nuclei template availability via Lucene syntax, with no manual KEV lookups.

vulnx CLI wrapper across NVD + KEV + EPSS + HackerOne + GitHub PoCs + Nuclei + CPE; 69 searchable fields, 6h refresh.

Offline Knowledge Base + Web Fallback

Agent queries a local KB (GTFOBins, LOLBAS, NVD, ExploitDB, OWASP, Nuclei) first. Web search runs only when KB confidence is low.

FAISS vector index + Neo4j fulltext, ≥0.35 confidence skips Tavily, works zero-API-key for sensitive engagements.

Browser-Based Kali Terminal

Full interactive xterm.js shell into the Kali sandbox container, with all 70+ pentesting tools pre-installed and no SSH needed.

WebSocket PTY (port 8016), signal handling, color support, agent proxy → kali-sandbox terminal server → /bin/bash.

Pentest Report Templates

Export findings as templated PDF / DOCX / HTML reports with executive summary, severity filters and embedded graph visualizations.

Multiple templates (executive, technical, compliance), auto-TOC, tool-output appendices, raw Cypher logs.

Data Export & Import

16 export presets covering Node Inspector, all nodes, JS Recon and 13 finding tables, in XLSX, JSON or Markdown.

Styled headers, per-column filters preserved, hyperlinks, full-project or per-table; programmatic JSON for downstream tools.

Multi-Tenant Project Management

Multi-user / multi-project tenancy with admin & standard roles, 169+ project settings and global API key rotation.

DB-level user_id + project_id filtering, per-project LLM provider, key rotation for rate-limit management, shared key vault.

See It In Action

Real RedAmon engagements recorded end to end. The agent picks targets, runs tools, adapts to findings and pwns the target while you watch. Unscripted, full timeline, no edits.

Your Red Team Is One Command Away.

Clone the repo. Run ./redamon.sh install. By the time you finish your coffee, an autonomous offensive operator is mapping your attack surface.

The rest is up to you.