mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-03-05 17:21:42 +00:00
116 modules | 100 vuln types | 18 API routes | 18 frontend pages Major features: - VulnEngine: 100 vuln types, 526+ payloads, 12 testers, anti-hallucination prompts - Autonomous Agent: 3-stream auto pentest, multi-session (5 concurrent), pause/resume/stop - CLI Agent: Claude Code / Gemini CLI / Codex CLI inside Kali containers - Validation Pipeline: negative controls, proof of execution, confidence scoring, judge - AI Reasoning: ReACT engine, token budget, endpoint classifier, CVE hunter, deep recon - Multi-Agent: 5 specialists + orchestrator + researcher AI + vuln type agents - RAG System: BM25/TF-IDF/ChromaDB vectorstore, few-shot, reasoning templates - Smart Router: 20 providers (8 CLI OAuth + 12 API), tier failover, token refresh - Kali Sandbox: container-per-scan, 56 tools, VPN support, on-demand install - Full IA Testing: methodology-driven comprehensive pentest sessions - Notifications: Discord, Telegram, WhatsApp/Twilio multi-channel alerts - Frontend: React/TypeScript with 18 pages, real-time WebSocket updates
25 lines
1.0 KiB
JSON
Executable File
25 lines
1.0 KiB
JSON
Executable File
{
|
|
"recon": {
|
|
"network_scan": "Analyze network scan results and identify attack vectors",
|
|
"web_enum": "Enumerate web application for vulnerabilities",
|
|
"osint": "Perform OSINT analysis on target organization"
|
|
},
|
|
"exploitation": {
|
|
"web_vuln": "Generate exploit for identified web vulnerability",
|
|
"network_exploit": "Create network service exploitation strategy",
|
|
"payload_generation": "Generate obfuscated payload for target system"
|
|
},
|
|
"privesc": {
|
|
"linux": "Analyze Linux system for privilege escalation paths",
|
|
"windows": "Identify Windows privilege escalation opportunities",
|
|
"kernel": "Recommend kernel exploits for target version"
|
|
},
|
|
"persistence": {
|
|
"backdoor": "Design stealthy persistence mechanism",
|
|
"scheduled_task": "Create covert scheduled task for persistence"
|
|
},
|
|
"lateral_movement": {
|
|
"ad_attack": "Plan Active Directory attack path",
|
|
"credential_reuse": "Strategy for credential reuse across network"
|
|
}
|
|
} |