Skip to content

st944452/PenTesting-Automation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

12 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ¦… Eagle Penetration Testing Platform

Python License MITRE ATT&CK BlackArch

Professional autonomous penetration testing platform with AI-powered vulnerability prediction and MITRE ATT&CK framework integration.

🎯 Overview

Eagle Penetration Testing Platform is a comprehensive, automated security assessment tool that combines:

  • πŸ›‘οΈ Autonomous Penetration Testing - Multi-phase automated scanning with intelligent tool selection
  • πŸ€– AI-Powered Analysis - Machine learning vulnerability prediction with 25-feature ML models
  • πŸ“Š MITRE ATT&CK Integration - Professional TA0043 Reconnaissance framework compliance
  • 🎨 Futuristic GUI - Real-time monitoring with professional reporting capabilities

✨ Key Features

πŸ” Comprehensive Scanning

  • Network Discovery: Nmap, RustScan with full 65,535 port coverage
  • Web Application Testing: Nikto, WhatWeb, ffuf, Dirb integration
  • Technology Detection: CMS identification, security header analysis
  • Vulnerability Assessment: Real-time threat classification

πŸ€– AI Intelligence

  • Machine Learning Models: 89%+ accuracy vulnerability prediction
  • Hybrid Classification: ML + Rule-based analysis system
  • Real-time Extraction: Dynamic endpoint discovery from live scans
  • Risk Scoring: Confidence-based threat assessment

πŸ“Š MITRE ATT&CK Framework

  • TA0043 Reconnaissance: 10 professional reconnaissance techniques
  • Industry Compliance: Structured attack pattern documentation
  • Professional Methodology: Enterprise-grade security assessment

🎨 Professional Interface

  • Futuristic GUI: Glow effects with real-time log monitoring
  • Interactive Visualizations: Vulnerability distribution charts
  • Comprehensive Reporting: Professional security assessment reports
  • Smart Installation: Linux distribution detection with package management
  • Out-of-Scope Management: Upload exclusion lists and generate filtered reports

πŸš€ Quick Start

⚠️ Important Security Notice

πŸ”‘ API Key Configuration Required:
   The demo API key in the code has been deactivated for security.
   You MUST configure your own Gemini API key to use AI features.
   See "AI Configuration" section below for setup instructions.

Prerequisites

# Supported Operating Systems
- BlackArch Linux (Recommended)
- Kali Linux
- Ubuntu/Debian
- Arch Linux
- CentOS/RHEL

# Requirements
- Python 3.9+
- 4GB RAM (8GB recommended)
- Internet connection

Installation

1. Clone Repository

git clone https://github.com/st944452/PenTesting-Automation.git
cd PenTesting-Automation

2. Install Dependencies

# Automated installation script
chmod +x install_mitre_dependencies.sh
./install_mitre_dependencies.sh

3. Configure AI Features (Optional)

# Get your free Gemini API key from Google AI Studio
# Visit: https://makersuite.google.com/app/apikey

# The application will prompt you to enter your API key on first launch
# Or you can set it as an environment variable:
export GEMINI_API_KEY="your_api_key_here"

4. Launch Application

# Standard launch
python3 eagle_pentest_gui.py

# Professional mode (with sudo privileges - recommended)
sudo python3 eagle_pentest_gui.py

πŸ—οΈ Architecture

Core Components

πŸ“ Eagle Pentest Platform
β”œβ”€β”€ πŸ–₯️ eagle_pentest_gui.py           # Main GUI Application
β”œβ”€β”€ πŸ€– eagle_ai_module.py             # AI Engine & ML Models
β”œβ”€β”€ 🎯 mitre_attack_recon.py          # MITRE ATT&CK Framework
β”œβ”€β”€ πŸ›‘οΈ mitre_attack_implementation.py # MITRE Implementations
β”œβ”€β”€ πŸ”§ distro_detector.py             # Smart Installation System
β”œβ”€β”€ πŸ“Š dynamic_scan_extractor.py      # Real-time Data Extraction
β”œβ”€β”€ 🧠 vulnerability_patterns.py      # Threat Intelligence
└── πŸ“‹ install_mitre_dependencies.sh  # Setup Script

Data Flow

🎯 Target Selection β†’ πŸ” MITRE Reconnaissance β†’ ⚑ Port Discovery β†’ 
🌐 Technology Detection β†’ πŸ”“ Vulnerability Scanning β†’ πŸ€– AI Analysis β†’ πŸ“Š Professional Reporting

πŸ›‘οΈ Security Tools Integration

Network Discovery

  • Nmap: Comprehensive port scanning with script engine
  • RustScan: Ultra-fast port discovery with intelligent timeout
  • Masscan: Internet-scale port scanner integration

Web Application Testing

  • Nikto: Web vulnerability scanner with comprehensive checks
  • WhatWeb: Technology stack detection and CMS identification
  • ffuf: Fast web fuzzer with custom wordlist support
  • Dirb: Directory brute forcing with recursive scanning

Specialized Tools

  • WPScan: WordPress security testing and plugin enumeration
  • SQLMap: Advanced SQL injection testing and exploitation
  • Burp Suite: Professional web application security testing

πŸ€– AI & Machine Learning

Vulnerability Prediction Engine

# 25-Point Feature Analysis
- Port scanning results analysis
- Service version enumeration  
- Directory discovery findings
- Technology stack detection
- Security header analysis
- Response time pattern analysis
- Error message classification
- Authentication mechanism detection

Prediction Capabilities

  • Vulnerability Probability: 0.0 - 1.0 confidence scoring
  • Severity Classification: Critical, High, Medium, Low risk levels
  • Vulnerability Type: SQLi, XSS, LFI, RFI, CSRF identification
  • Hybrid Analysis: ML + Expert system combination

πŸ“Š MITRE ATT&CK Integration

TA0043 - Reconnaissance Techniques

Technique Description Implementation
T1595 Active Scanning Nmap, RustScan, Nikto
T1592 Gather Victim Host Information OS detection, service enumeration
T1593 Gather Victim Identity Information Email harvesting, user enumeration
T1590 Gather Victim Network Information DNS enumeration, subdomain discovery
T1591 Gather Victim Organization Information OSINT data collection
T1598 Phishing for Information AI-powered with Gemini integration
T1597 Search Closed Sources Threat intelligence databases
T1596 Search Open Technical Databases Shodan, Censys integration
T1594 Search Open Websites/Domains Web reconnaissance techniques

πŸ’» Usage Examples

Basic Scanning

# Launch GUI
python3 eagle_pentest_gui.py

# Select target: mountaineer.thm
# Choose scan level: Professional
# Start autonomous assessment

Advanced Features

# MITRE ATT&CK Reconnaissance
from mitre_attack_recon import MITREReconnaissanceEngine

engine = MITREReconnaissanceEngine()
engine.set_target("target.com")
results = await engine.execute_full_reconnaissance()

Out-of-Scope Vulnerability Management

# 1. Navigate to "Out of Scope" tab in the GUI
# 2. Upload a text file with exclusion criteria:
#    - CVE numbers (CVE-2018-1000001)
#    - Vulnerability names (SSL Certificate)
#    - Pattern matching (phpinfo, .git)

# 3. Generate filtered reports:
#    - Main report excludes out-of-scope findings
#    - Separate report for excluded findings

# Example out-of-scope file format:
CVE-2018-1000001
Information Disclosure
phpinfo
.git
ssl certificate

AI Vulnerability Prediction

# Real-time vulnerability assessment
from eagle_ai_module import AdvancedAutonomousPentester

pentester = AdvancedAutonomousPentester(gemini_client)
pentester.set_target("vulnerable-app.com")
results = pentester.execute_autonomous_pentest()

πŸ“ˆ Performance & Capabilities

Scanning Performance

  • Port Coverage: Full 65,535 port range scanning
  • Speed: RustScan integration for ultra-fast discovery
  • Accuracy: 89%+ vulnerability prediction accuracy
  • Scalability: Multi-target parallel assessment ready

Professional Features

  • Comprehensive Reports: Executive and technical documentation
  • Real-time Monitoring: Live progress tracking and log viewing
  • Framework Compliance: MITRE ATT&CK professional standards
  • Tool Integration: 25+ professional security tools

πŸ”§ Configuration

BlackArch Linux Optimization

# Leverages pre-installed tools
- 2,393+ security tools available
- Zero installation overhead
- Professional-grade environment
- Optimized configurations

Smart Distribution Detection

# Automatic package manager detection
- apt (Debian/Ubuntu)
- pacman (Arch/BlackArch)  
- yum/dnf (RHEL/CentOS)
- zypper (openSUSE)
- apk (Alpine)

πŸ€– AI Configuration

Gemini AI Integration Setup

The Eagle platform includes powerful AI features powered by Google's Gemini AI. To enable these features:

1. Get Your Free API Key

# Visit Google AI Studio to get your free API key
οΏ½ https://makersuite.google.com/app/apikey

# Sign in with your Google account
# Create a new API key
# Copy the generated key

2. Configure API Access

# Method 1: Environment Variable (Recommended)
export GEMINI_API_KEY="your_actual_api_key_here"

# Method 2: GUI Configuration
# Launch the application and enter your API key in the AI Settings tab
# The key will be securely stored for future sessions

3. AI Features Available

βœ… Autonomous Penetration Testing
  β€’ Intelligent scan planning and execution
  β€’ Real-time vulnerability analysis
  β€’ Smart target assessment

βœ… Vulnerability Prediction
  β€’ ML-powered risk scoring (89% accuracy)
  β€’ 25-feature analysis engine
  β€’ Confidence-based recommendations

βœ… MITRE ATT&CK Integration
  β€’ AI-enhanced reconnaissance
  β€’ Intelligent attack pattern mapping
  β€’ Professional threat modeling

βœ… Natural Language Reporting
  β€’ Executive summary generation
  β€’ Technical finding explanations
  β€’ Next-step recommendations

4. Security Note

⚠️  IMPORTANT: Never commit API keys to version control
βœ… Use environment variables or secure configuration
πŸ”’ Keep your API key private and secure
♻️  Rotate keys regularly for enhanced security

πŸ”§ Configuration

🀝 Contributing

  1. Fork the repository
  2. Create feature branch (git checkout -b feature/amazing-feature)
  3. Commit changes (git commit -m 'Add amazing feature')
  4. Push to branch (git push origin feature/amazing-feature)
  5. Open Pull Request

πŸ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.

πŸ”— Links

πŸ™ Acknowledgments

  • MITRE Corporation - ATT&CK Framework methodology
  • BlackArch Linux Team - Comprehensive security tool platform
  • Security Community - Vulnerability research and pattern analysis
  • Open Source Contributors - Tool integrations and enhancements

⚑ Experience the future of autonomous penetration testing with Eagle Platform!

Professional β€’ Intelligent β€’ Autonomous

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors