Professional autonomous penetration testing platform with AI-powered vulnerability prediction and MITRE ATT&CK framework integration.
Eagle Penetration Testing Platform is a comprehensive, automated security assessment tool that combines:
- π‘οΈ Autonomous Penetration Testing - Multi-phase automated scanning with intelligent tool selection
- π€ AI-Powered Analysis - Machine learning vulnerability prediction with 25-feature ML models
- π MITRE ATT&CK Integration - Professional TA0043 Reconnaissance framework compliance
- π¨ Futuristic GUI - Real-time monitoring with professional reporting capabilities
- Network Discovery: Nmap, RustScan with full 65,535 port coverage
- Web Application Testing: Nikto, WhatWeb, ffuf, Dirb integration
- Technology Detection: CMS identification, security header analysis
- Vulnerability Assessment: Real-time threat classification
- Machine Learning Models: 89%+ accuracy vulnerability prediction
- Hybrid Classification: ML + Rule-based analysis system
- Real-time Extraction: Dynamic endpoint discovery from live scans
- Risk Scoring: Confidence-based threat assessment
- TA0043 Reconnaissance: 10 professional reconnaissance techniques
- Industry Compliance: Structured attack pattern documentation
- Professional Methodology: Enterprise-grade security assessment
- Futuristic GUI: Glow effects with real-time log monitoring
- Interactive Visualizations: Vulnerability distribution charts
- Comprehensive Reporting: Professional security assessment reports
- Smart Installation: Linux distribution detection with package management
- Out-of-Scope Management: Upload exclusion lists and generate filtered reports
π API Key Configuration Required:
The demo API key in the code has been deactivated for security.
You MUST configure your own Gemini API key to use AI features.
See "AI Configuration" section below for setup instructions.# Supported Operating Systems
- BlackArch Linux (Recommended)
- Kali Linux
- Ubuntu/Debian
- Arch Linux
- CentOS/RHEL
# Requirements
- Python 3.9+
- 4GB RAM (8GB recommended)
- Internet connectiongit clone https://github.com/st944452/PenTesting-Automation.git
cd PenTesting-Automation# Automated installation script
chmod +x install_mitre_dependencies.sh
./install_mitre_dependencies.sh# Get your free Gemini API key from Google AI Studio
# Visit: https://makersuite.google.com/app/apikey
# The application will prompt you to enter your API key on first launch
# Or you can set it as an environment variable:
export GEMINI_API_KEY="your_api_key_here"# Standard launch
python3 eagle_pentest_gui.py
# Professional mode (with sudo privileges - recommended)
sudo python3 eagle_pentest_gui.pyπ Eagle Pentest Platform
βββ π₯οΈ eagle_pentest_gui.py # Main GUI Application
βββ π€ eagle_ai_module.py # AI Engine & ML Models
βββ π― mitre_attack_recon.py # MITRE ATT&CK Framework
βββ π‘οΈ mitre_attack_implementation.py # MITRE Implementations
βββ π§ distro_detector.py # Smart Installation System
βββ π dynamic_scan_extractor.py # Real-time Data Extraction
βββ π§ vulnerability_patterns.py # Threat Intelligence
βββ π install_mitre_dependencies.sh # Setup Script
π― Target Selection β π MITRE Reconnaissance β β‘ Port Discovery β
π Technology Detection β π Vulnerability Scanning β π€ AI Analysis β π Professional Reporting
- Nmap: Comprehensive port scanning with script engine
- RustScan: Ultra-fast port discovery with intelligent timeout
- Masscan: Internet-scale port scanner integration
- Nikto: Web vulnerability scanner with comprehensive checks
- WhatWeb: Technology stack detection and CMS identification
- ffuf: Fast web fuzzer with custom wordlist support
- Dirb: Directory brute forcing with recursive scanning
- WPScan: WordPress security testing and plugin enumeration
- SQLMap: Advanced SQL injection testing and exploitation
- Burp Suite: Professional web application security testing
# 25-Point Feature Analysis
- Port scanning results analysis
- Service version enumeration
- Directory discovery findings
- Technology stack detection
- Security header analysis
- Response time pattern analysis
- Error message classification
- Authentication mechanism detection- Vulnerability Probability: 0.0 - 1.0 confidence scoring
- Severity Classification: Critical, High, Medium, Low risk levels
- Vulnerability Type: SQLi, XSS, LFI, RFI, CSRF identification
- Hybrid Analysis: ML + Expert system combination
| Technique | Description | Implementation |
|---|---|---|
| T1595 | Active Scanning | Nmap, RustScan, Nikto |
| T1592 | Gather Victim Host Information | OS detection, service enumeration |
| T1593 | Gather Victim Identity Information | Email harvesting, user enumeration |
| T1590 | Gather Victim Network Information | DNS enumeration, subdomain discovery |
| T1591 | Gather Victim Organization Information | OSINT data collection |
| T1598 | Phishing for Information | AI-powered with Gemini integration |
| T1597 | Search Closed Sources | Threat intelligence databases |
| T1596 | Search Open Technical Databases | Shodan, Censys integration |
| T1594 | Search Open Websites/Domains | Web reconnaissance techniques |
# Launch GUI
python3 eagle_pentest_gui.py
# Select target: mountaineer.thm
# Choose scan level: Professional
# Start autonomous assessment# MITRE ATT&CK Reconnaissance
from mitre_attack_recon import MITREReconnaissanceEngine
engine = MITREReconnaissanceEngine()
engine.set_target("target.com")
results = await engine.execute_full_reconnaissance()# 1. Navigate to "Out of Scope" tab in the GUI
# 2. Upload a text file with exclusion criteria:
# - CVE numbers (CVE-2018-1000001)
# - Vulnerability names (SSL Certificate)
# - Pattern matching (phpinfo, .git)
# 3. Generate filtered reports:
# - Main report excludes out-of-scope findings
# - Separate report for excluded findings
# Example out-of-scope file format:
CVE-2018-1000001
Information Disclosure
phpinfo
.git
ssl certificate# Real-time vulnerability assessment
from eagle_ai_module import AdvancedAutonomousPentester
pentester = AdvancedAutonomousPentester(gemini_client)
pentester.set_target("vulnerable-app.com")
results = pentester.execute_autonomous_pentest()- Port Coverage: Full 65,535 port range scanning
- Speed: RustScan integration for ultra-fast discovery
- Accuracy: 89%+ vulnerability prediction accuracy
- Scalability: Multi-target parallel assessment ready
- Comprehensive Reports: Executive and technical documentation
- Real-time Monitoring: Live progress tracking and log viewing
- Framework Compliance: MITRE ATT&CK professional standards
- Tool Integration: 25+ professional security tools
# Leverages pre-installed tools
- 2,393+ security tools available
- Zero installation overhead
- Professional-grade environment
- Optimized configurations# Automatic package manager detection
- apt (Debian/Ubuntu)
- pacman (Arch/BlackArch)
- yum/dnf (RHEL/CentOS)
- zypper (openSUSE)
- apk (Alpine)The Eagle platform includes powerful AI features powered by Google's Gemini AI. To enable these features:
# Visit Google AI Studio to get your free API key
οΏ½ https://makersuite.google.com/app/apikey
# Sign in with your Google account
# Create a new API key
# Copy the generated key# Method 1: Environment Variable (Recommended)
export GEMINI_API_KEY="your_actual_api_key_here"
# Method 2: GUI Configuration
# Launch the application and enter your API key in the AI Settings tab
# The key will be securely stored for future sessionsβ
Autonomous Penetration Testing
β’ Intelligent scan planning and execution
β’ Real-time vulnerability analysis
β’ Smart target assessment
β
Vulnerability Prediction
β’ ML-powered risk scoring (89% accuracy)
β’ 25-feature analysis engine
β’ Confidence-based recommendations
β
MITRE ATT&CK Integration
β’ AI-enhanced reconnaissance
β’ Intelligent attack pattern mapping
β’ Professional threat modeling
β
Natural Language Reporting
β’ Executive summary generation
β’ Technical finding explanations
β’ Next-step recommendationsβ οΈ IMPORTANT: Never commit API keys to version control
β
Use environment variables or secure configuration
π Keep your API key private and secure
β»οΈ Rotate keys regularly for enhanced security- Installation Guide - Complete setup instructions
- MITRE ATT&CK Guide - Framework implementation details
- Project Presentation - Comprehensive project overview
- API Documentation - Developer integration guide
- Fork the repository
- Create feature branch (
git checkout -b feature/amazing-feature) - Commit changes (
git commit -m 'Add amazing feature') - Push to branch (
git push origin feature/amazing-feature) - Open Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
- GitHub Repository: PenTesting-Automation
- MITRE ATT&CK Framework: TA0043 Reconnaissance
- BlackArch Linux: Official Website
- MITRE Corporation - ATT&CK Framework methodology
- BlackArch Linux Team - Comprehensive security tool platform
- Security Community - Vulnerability research and pattern analysis
- Open Source Contributors - Tool integrations and enhancements
β‘ Experience the future of autonomous penetration testing with Eagle Platform!
Professional β’ Intelligent β’ Autonomous