NeuroSploit v3.2.2 - Full LLM Pentest Mode

New feature: Full LLM Pentest mode where the AI drives the entire
penetration test cycle autonomously. The LLM plans HTTP requests,
the system executes them, and the LLM analyzes real responses to
identify vulnerabilities — like a human pentester using Burp Suite.

- New OperationMode.FULL_LLM_PENTEST + AgentMode enum
- _run_full_llm_pentest(): 30-round ReACT loop (plan→execute→analyze→adapt)
- 3 new prompt functions in ai_prompts.py (system, round, report)
- Anti-hallucination: findings without real evidence are rejected
- All findings routed through ValidationJudge pipeline
- FullIATestingPage updated: 4-phase UI (Recon→Testing→PostExploit→Report)
- No Kali sandbox required — uses system HTTP client directly
- Methodology injection from pentestcompleto_en.md (118KB)

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
CyberSecurityUP
2026-02-24 00:28:26 -03:00
parent 79acfe04a3
commit e5857d00c1
4 changed files with 721 additions and 85 deletions
+3
View File
@@ -105,6 +105,7 @@ class AgentMode(str, Enum):
ANALYZE_ONLY = "analyze_only" # Analysis without testing
AUTO_PENTEST = "auto_pentest" # One-click full auto pentest
CLI_AGENT = "cli_agent" # AI CLI tool inside Kali sandbox
FULL_LLM_PENTEST = "full_llm_pentest" # LLM drives the entire pentest cycle
class AgentRequest(BaseModel):
@@ -251,6 +252,7 @@ async def run_agent(request: AgentRequest, background_tasks: BackgroundTasks):
"analyze_only": "Analysis only, no active testing",
"auto_pentest": "One-click auto pentest: Full recon + 100 vuln types + AI report",
"cli_agent": "CLI Agent: AI CLI tool (Claude/Gemini/Codex) inside Kali sandbox",
"full_llm_pentest": "Full LLM Pentest: AI drives the entire pentest cycle autonomously",
}
return AgentResponse(
@@ -379,6 +381,7 @@ async def _run_agent_task(
AgentMode.ANALYZE_ONLY: OperationMode.ANALYZE_ONLY,
AgentMode.AUTO_PENTEST: OperationMode.AUTO_PENTEST,
AgentMode.CLI_AGENT: OperationMode.CLI_AGENT,
AgentMode.FULL_LLM_PENTEST: OperationMode.FULL_LLM_PENTEST,
}
op_mode = mode_map.get(mode, OperationMode.FULL_AUTO)