Skip to content

cawa102/VibeHackAI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

46 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation


CI Python License Status

πŸ” Reconnaissance Β· πŸ“‹ Enumeration Β· ⚑ Exploitation Β· πŸ›‘οΈ Human Control

Overview

This system provides an agentic AI experience as if you were leading an Penetration Test Team!

VibeHackAI is an interactive penetration testing support system that leverages Claude Code's agent capabilities and MCP (Model Context Protocol). Four specialized agents (Planner, Reconnaissance, Enumeration, Exploitation) work in coordination with an Orchestrator to execute safe and efficient security assessments under human supervision.

Two key differentiators

  1. vs. Autonomous penetration tools β€” VibeHackAI combines AI and human reasoning to prevent uncontrolled AI behavior. The human reviews the AI's plan, validates the logic, and provides course corrections before any action is taken.

  2. vs. PentestGPT-style tools β€” While PentestGPT requires humans to manually type and execute every command, VibeHackAI's AI handles command execution across all testing phases. Humans focus on strategic decisions rather than operational details.

The result: Higher success rates through collaborative intelligence. Humans contribute domain expertise and judgment; AI contributes speed, consistency, and comprehensive analysis. Neither works aloneβ€”both work together.

Why Human-in-the-Loop?

Fully autonomous penetration testing tools face fundamental limitations:

Problem Impact
Scope violations AI scans unrelated hosts without understanding authorization boundaries
False confidence AI reports "confirmed" vulnerabilities that don't exist
Dangerous actions AI executes destructive payloads without understanding consequences
Context loss AI forgets previous findings and repeats failed approaches

VibeHackAI addresses these issues by keeping humans in the decision loop. The AI handles analysis and suggestions; you make the final call on every significant action.

Architecture

               β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
               β”‚                   Human Interface                    β”‚
               β”‚          (Approval, Interaction, Oversight)          β”‚
               β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                          β”‚          
               β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
               β”‚                  Orchestrator Agent                   β”‚         γ€€β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”          
               β”‚                (Control Plane - Writer)               β”‚        γ€€ β”‚                Shared Workspace                  β”‚
               β”‚      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”‚        γ€€ β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
               β”‚      β”‚    State    β”‚  Approval   β”‚    Agent    β”‚      β”‚ β”€β”€β”€β”€β”€β”€β”€β–ΆοΈŽ β”‚  β”‚State Store β”‚  β”‚Evidence    β”‚  β”‚Retrieval   β”‚  β”‚
               β”‚      β”‚  Management β”‚    Gates    β”‚   Routing   β”‚      β”‚         γ€€β”‚  β”‚(Normalized)β”‚  β”‚Store       β”‚  β”‚Cache       β”‚  β”‚
               β”‚      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β”‚      γ€€   β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
               β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   γ€€      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                          β”‚
        β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
        β”‚                      β”‚                    β”‚                    β”‚
β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”
β”‚ Reconnaissance β”‚   β”‚   Enumeration    β”‚   β”‚  Exploitation  β”‚   β”‚    Planner    β”‚
β”‚     Agent      β”‚   β”‚      Agent       β”‚   β”‚      Agent     β”‚   β”‚     Agent     β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

✨ Key Features

πŸ€– Agent Configuration

Agent Role
Orchestrator Control plane responsible for phase transitions, approval gates, and state management
Planner CVE research, attack planning, and CVSS evaluation
Reconnaissance Passive/active information gathering (OSINT, Nmap, Shodan, etc.)
Enumeration Service enumeration and vulnerability candidate identification
Exploitation Exploit execution based on approved plans

πŸ›‘οΈ Safety Features

  • Scope Enforcement: All operations tagged with scope_tag to prevent out-of-scope access
  • Approval Gates: Dangerous operations require human approval
  • Evidence Management: All operation results stored in append-only Evidence Store
  • Automatic Stop Conditions: Auto-halt on consecutive errors or DoS indicators

πŸš€ Quick Start

# Clone and setup
git clone https://github.com/cawa102/VibeHackAI.git
cd VibeHackAI
cp .mcp.json.example .mcp.json
pip install -e .

# Launch Claude Code and start
Please launch pentest-orchestrator.
Target: example.com
Scope: Web application assessment

πŸ“‹ Prerequisites

Requirement Version Link
Claude Code CLI Latest Installation Guide
Docker Latest docker.com
Python 3.10+ python.org
hexstrike-ai MCP Server Required Setup Guide β†—

Important: hexstrike-ai MCP Server must be set up before using VibeHackAI. πŸ‘‰ Follow the instructions at github.com/0x4m4/hexstrike-ai

πŸ”§ Setup

1. Setup hexstrike-ai MCP Server

First, set up the hexstrike-ai MCP server by following the instructions at:

πŸ‘‰ https://github.com/0x4m4/hexstrike-ai

Make sure the server is running before proceeding.

2. Clone the Repository
git clone https://github.com/cawa102/VibeHackAI.git
cd VibeHackAI
3. MCP Configuration

Copy .mcp.json.example to .mcp.json and configure appropriately:

cp .mcp.json.example .mcp.json

Set the required environment variables:

  • GITHUB_PERSONAL_ACCESS_TOKEN: Token for GitHub API
  • hexstrike-ai server endpoint configuration (see hexstrike-ai docs)
4. Install Dependencies
pip install -e .

πŸ’‘ Usage

Starting a Session

  1. Launch Claude Code
  2. Provide target information (IP/CIDR/Domain)
  3. Invoke the Orchestrator agent
Please launch pentest-orchestrator.
Target: example.com (192.168.1.0/24)
Scope: Web application assessment

Workflow

                                    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                                    β”‚                                                             β”‚
    ╔═══════════════╗               β”‚    ╔═══════════════╗         ╔═══════════════╗             β”‚
    β•‘   πŸ‘€ Human    ║───Target───▢──┼──▢║ 🎯 Orchestrator║────────▢║  πŸ“ Planner   β•‘             β”‚
    β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•               β”‚    β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•         β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•             β”‚
            β”‚                       β”‚            β”‚                         β”‚                     β”‚
            β”‚                       β”‚            β”‚                         β”‚                     β”‚
    β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”               β”‚    β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”         β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”             β”‚
    β”‚   Approval    │◀──PhaseBrief──┼────│  State Mgmt   │◀─Patch──│   TestPlan    β”‚             β”‚
    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜               β”‚    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜         β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜             β”‚
                                    β”‚                                                             β”‚
                                    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                                          β”‚
                         β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                         β”‚                                β”‚                                β”‚
                         β–Ό                                β–Ό                                β–Ό
    ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┓    ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┓    ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┓
    ┃    πŸ” RECONNAISSANCE      ┃    ┃    πŸ“‹ ENUMERATION         ┃    ┃    ⚑ EXPLOITATION        ┃
    ┃  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  ┃    ┃  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  ┃    ┃  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  ┃
    ┃  β”‚ β€’ OSINT / Shodan    β”‚  ┃    ┃  β”‚ β€’ Service Analysis  β”‚  ┃    ┃  β”‚ β€’ PoC Execution     β”‚  ┃
    ┃  β”‚ β€’ Nmap Scanning     β”‚  ┃    ┃  β”‚ β€’ Entry Points      β”‚  ┃    ┃  β”‚ β€’ Metasploit        β”‚  ┃
    ┃  β”‚ β€’ DNS Enumeration   β”‚  ┃    ┃  β”‚ β€’ Auth Boundaries   β”‚  ┃    ┃  β”‚ β€’ Custom Payloads   β”‚  ┃
    ┃  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  ┃    ┃  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  ┃    ┃  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  ┃
    ┃           β”‚               ┃    ┃           β”‚               ┃    ┃           β”‚               ┃
    ┃     β”Œβ”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”         ┃    ┃     β”Œβ”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”         ┃    ┃     β”Œβ”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”         ┃
    ┃     β”‚  Result?  β”‚         ┃    ┃     β”‚  Result?  β”‚         ┃    ┃     β”‚  Result?  β”‚         ┃
    ┃     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜         ┃    ┃     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜         ┃    ┃     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜         ┃
    ┃       β”‚       β”‚           ┃    ┃       β”‚       β”‚           ┃    ┃       β”‚       β”‚           ┃
    ┃    Fail    Success        ┃    ┃    Fail    Success        ┃    ┃    Fail    Success        ┃
    ┃       β”‚       β”‚           ┃    ┃       β”‚       β”‚           ┃    ┃       β”‚       β”‚           ┃
    ┃   β”Œβ”€β”€β”€β–Όβ”€β”€β”€β”   β”‚           ┃    ┃   β”Œβ”€β”€β”€β–Όβ”€β”€β”€β”   β”‚           ┃    ┃   β”Œβ”€β”€β”€β–Όβ”€β”€β”€β”   β”‚           ┃
    ┃   β”‚ Retry β”‚   β”‚           ┃    ┃   β”‚ Retry β”‚   β”‚           ┃    ┃   β”‚ Retry β”‚   β”‚           ┃
    ┃   β”‚  πŸ”„   β”‚β”€β”€β”€β”˜           ┃    ┃   β”‚  πŸ”„   β”‚β”€β”€β”€β”˜           ┃    ┃   β”‚  πŸ”„   β”‚β”€β”€β”€β”˜           ┃
    ┃   β””β”€β”€β”€β”€β”€β”€β”€β”˜               ┃    ┃   β””β”€β”€β”€β”€β”€β”€β”€β”˜               ┃    ┃   β””β”€β”€β”€β”€β”€β”€β”€β”˜               ┃
    ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛    ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛    ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
                β”‚                                β”‚                                β”‚
                β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                                 β”‚
                                                 β–Ό
                              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                              β”‚       πŸ”„ POST-EXPLOITATION LOOP     β”‚
                              β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
                              β”‚  β”‚  Planner evaluates:           β”‚  β”‚
                              β”‚  β”‚  β€’ Privilege escalation?      β”‚  β”‚
                              β”‚  β”‚  β€’ Lateral movement?          β”‚  β”‚
                              β”‚  β”‚  β€’ Additional attack vectors? β”‚  β”‚
                              β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
                              β”‚         β”‚               β”‚           β”‚
                              β”‚     More Tests      Complete        β”‚
                              β”‚         β”‚               β”‚           β”‚
                              β”‚    β”Œβ”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”       β”‚
                              β”‚    β”‚ πŸ‘€ Ask  β”‚    β”‚ πŸ“Š Reportβ”‚       β”‚
                              β”‚    β”‚ Human   β”‚    β”‚ Generate β”‚       β”‚
                              β”‚    β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜       β”‚
                              β”‚         β”‚                            β”‚
                              β”‚    Approved ──▢ Back to Exploitation β”‚
                              β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ”„ Never Give Up

  • Each phase retries on failure
  • Alternative approaches on dead ends
  • Persistent until human says stop

βœ… Human Controls Everything

  • Approval required at every phase
  • Full visibility into all operations
  • Override and halt at any time

πŸ“ Shared Workspace

Each penetration testing session maintains an isolated workspace for state management, evidence collection, and reporting.

Directory Structure

/workspace/sessions/<session_id>/
β”œβ”€β”€ πŸ“Š state/           # Normalized state (Orchestrator write-only)
β”‚   β”œβ”€β”€ scope.json              # Target scope definition
β”‚   β”œβ”€β”€ target_profile.json     # Discovered target information
β”‚   β”œβ”€β”€ candidates_vuln.json    # Vulnerability candidates
β”‚   β”œβ”€β”€ candidates_exploit.json # Exploit candidates
β”‚   β”œβ”€β”€ execution_plans.json    # Approved execution plans
β”‚   β”œβ”€β”€ findings.json           # Confirmed findings
β”‚   └── state_version.json      # State version tracking
β”‚
β”œβ”€β”€ πŸ“¦ evidence/        # Raw data (append-only, sha256 verified)
β”‚   └── <evidence_id>/
β”‚       β”œβ”€β”€ raw.<ext>           # Raw tool output
β”‚       └── meta.json           # Metadata (timestamp, tool, params)
β”‚
β”œβ”€β”€ πŸ—„οΈ cache/           # Query result cache
β”‚   β”œβ”€β”€ cve/                    # CVE lookup cache
β”‚   β”œβ”€β”€ snyk/                   # Snyk vulnerability cache
β”‚   └── git/                    # Git repository cache
β”‚
└── πŸ“ reports/         # Final deliverables
    └── draft.md                # Generated penetration test report

Storage Roles

Directory Purpose Write Policy
state/ Tracks current session state, targets, and findings Orchestrator only
evidence/ Stores all raw tool outputs with integrity verification Append-only
cache/ Caches external API responses (CVE, Snyk) Read/Write
reports/ Contains final penetration test reports Write on completion

Note: All evidence is stored with SHA-256 hash verification to ensure integrity and reproducibility.

πŸ“š Documentation

Core Documentation
Document Contents
CLAUDE.md System Guidance (Main)
docs/001_shared_workspace.md Shared Workspace Specification
docs/002_common_schema.md Common Schema Definitions
docs/003_passer.md Normalization Engine Specification
docs/004_patch_protocol.md Patch Protocol Specification
docs/tool_manifest.yaml Available Tools List
Agent Specifications
Agent Specification
Orchestrator .claude/agents/pentest-orchestrator.md
Reconnaissance .claude/agents/reconnaissance-agent.md
Enumeration .claude/agents/enumeration-agent.md
Planner .claude/agents/planner-agent.md
Exploitation .claude/agents/exploitation-agent.md

πŸ—ΊοΈ Roadmap

  • Web UI Dashboard
  • Multi-target parallel scanning
  • Custom plugin system
  • Report template customization
  • Integration with more MCP servers

⚠️ Important Notes

Warning: Use this system only against authorized targets

  • Conduct all penetration tests with proper authorization
  • Indiscriminate scanning, DoS attacks, and data exfiltration are prohibited
  • This tool is for educational and authorized security testing only

🀝 Contributing

Contributions are welcome! Please see CONTRIBUTING.md for guidelines.

πŸ“„ License

MIT License - See LICENSE for details.

Acknowledgments

MCP Servers

This project integrates with the following open-source MCP servers:

Server Repository Description
GitHub MCP github/github-mcp-server GitHub's official MCP server
Filesystem MCP @modelcontextprotocol/server-filesystem Anthropic's official filesystem server
Hexstrike MCP github/github-mcp-server 150+ Tools Integration

We thank all the developers and maintainers of these projects for their contributions to the security community!


If you find this project useful, please consider giving it a ⭐

About

Human-led AI Penetration Team

Resources

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •