mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-05-20 05:34:45 +02:00
NeuroSploit v3.2.2 - Full LLM Pentest Mode
New feature: Full LLM Pentest mode where the AI drives the entire penetration test cycle autonomously. The LLM plans HTTP requests, the system executes them, and the LLM analyzes real responses to identify vulnerabilities — like a human pentester using Burp Suite. - New OperationMode.FULL_LLM_PENTEST + AgentMode enum - _run_full_llm_pentest(): 30-round ReACT loop (plan→execute→analyze→adapt) - 3 new prompt functions in ai_prompts.py (system, round, report) - Anti-hallucination: findings without real evidence are rejected - All findings routed through ValidationJudge pipeline - FullIATestingPage updated: 4-phase UI (Recon→Testing→PostExploit→Report) - No Kali sandbox required — uses system HTTP client directly - Methodology injection from pentestcompleto_en.md (118KB) Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -105,6 +105,7 @@ class AgentMode(str, Enum):
|
||||
ANALYZE_ONLY = "analyze_only" # Analysis without testing
|
||||
AUTO_PENTEST = "auto_pentest" # One-click full auto pentest
|
||||
CLI_AGENT = "cli_agent" # AI CLI tool inside Kali sandbox
|
||||
FULL_LLM_PENTEST = "full_llm_pentest" # LLM drives the entire pentest cycle
|
||||
|
||||
|
||||
class AgentRequest(BaseModel):
|
||||
@@ -251,6 +252,7 @@ async def run_agent(request: AgentRequest, background_tasks: BackgroundTasks):
|
||||
"analyze_only": "Analysis only, no active testing",
|
||||
"auto_pentest": "One-click auto pentest: Full recon + 100 vuln types + AI report",
|
||||
"cli_agent": "CLI Agent: AI CLI tool (Claude/Gemini/Codex) inside Kali sandbox",
|
||||
"full_llm_pentest": "Full LLM Pentest: AI drives the entire pentest cycle autonomously",
|
||||
}
|
||||
|
||||
return AgentResponse(
|
||||
@@ -379,6 +381,7 @@ async def _run_agent_task(
|
||||
AgentMode.ANALYZE_ONLY: OperationMode.ANALYZE_ONLY,
|
||||
AgentMode.AUTO_PENTEST: OperationMode.AUTO_PENTEST,
|
||||
AgentMode.CLI_AGENT: OperationMode.CLI_AGENT,
|
||||
AgentMode.FULL_LLM_PENTEST: OperationMode.FULL_LLM_PENTEST,
|
||||
}
|
||||
op_mode = mode_map.get(mode, OperationMode.FULL_AUTO)
|
||||
|
||||
|
||||
Reference in New Issue
Block a user