AI-Powered Security Testing Platform with 18 Specialized Security Agents
Project description
🎯 CrossBow Security Agent
AI-Powered Security Testing Platform with 18 Specialized Security Agents
CrossBow is a comprehensive AI-powered security testing platform that orchestrates 18 specialized security agents to perform advanced security assessments, threat analysis, and vulnerability testing.
✨ Features
🤖 18 Specialized Security Agents
- SOC Analyst - Log analysis & attack investigation
- Threat Intelligence Analyst - IOC collection & threat profiling
- Android SAST Specialist - Android security testing
- Blue Team Defender - Defensive security measures
- Bug Bounty Hunter - Vulnerability discovery
- Security Developer - Security code development
- DFIR Investigator - Digital forensics & incident response
- Email Security Analyst - Email threat analysis
- Memory Forensics Expert - Memory analysis
- Network Security Analyst - Network monitoring & analysis
- Red Team Operator - Offensive security testing
- Replay Attack Specialist - Attack replay analysis
- Security Reporter - Report generation
- Vulnerability Validator - Exploit verification
- Reverse Engineer - Binary analysis
- RF Security Expert - Radio frequency security
- WiFi Security Tester - Wireless security
- Source Code Analyzer - Static code analysis
🎨 Two Interfaces
- CLI - Traditional command-line interface
- TUI - Modern terminal UI with rich formatting (Textual-based)
⚙️ Advanced Capabilities
- Multi-Model Support: GPT-4o, Claude, Gemini
- Conversation Memory: Persistent context across sessions
- Agent Storage: State persistence for complex tasks
- MCP Support: Model Context Protocol integration
- Auto-Configuration: Settings automatically saved
- 40+ Security Tools: Integrated security testing toolkit
🚀 Quick Start
Installation
pip install crossbow-agent
Basic Usage
Start the CLI:
crossbow
Start the Modern TUI:
crossbow-tui
First Steps
- Configure your AI model (choose from GPT-4o, Claude, Gemini)
- Enable features (memory, storage, MCP as needed)
- Ask security questions or give testing tasks
Example Queries
# Security Analysis
"Analyze authentication logs for suspicious activity"
# Threat Intelligence
"Research IP address 192.168.1.100 for malicious activity"
# Vulnerability Assessment
"Help me test my web application for SQL injection"
# Network Security
"Analyze this network traffic for anomalies"
# Code Security
"Review this Python code for security vulnerabilities"
# Incident Response
"Investigate this security incident and provide timeline"
📖 Documentation
Configuration
CrossBow automatically saves your preferences in crossbow_config.json:
{
"model": "claude-sonnet-4-5",
"memory": true,
"storage": true,
"mcp": false,
"mcp_servers": []
}
All settings changes are automatically persisted!
CLI Commands
/model - Choose AI model
/memory - Toggle conversation memory
/storage - Toggle agent storage
/mcp - Toggle MCP support
/config - Show configuration
/status - Show current session
/help - Show help
/quit - Exit
TUI Features
The modern TUI provides:
- Visual model selector - Dropdown menu
- Toggle buttons - One-click feature control
- Live status bar - Real-time configuration display
- Rich formatting - Markdown, syntax highlighting
- Keyboard shortcuts - Efficient navigation
- Color-coded panels - Clear visual hierarchy
Keyboard Shortcuts:
Ctrl+C- QuitCtrl+M- Toggle memoryCtrl+S- Toggle storageCtrl+L- Clear logEnter- Send message
🔧 Advanced Usage
API Keys
CrossBow requires API keys for AI models:
# Set via environment variables
export ANTHROPIC_API_KEY="your-key-here"
export OPENAI_API_KEY="your-key-here"
export GOOGLE_API_KEY="your-key-here"
Or create a .env file:
ANTHROPIC_API_KEY=your-key-here
OPENAI_API_KEY=your-key-here
GOOGLE_API_KEY=your-key-here
Programmatic Usage
from Agent import SecurityAgentSystem
# Initialize
system = SecurityAgentSystem(
model_name="claude-sonnet-4-5",
use_memory=True,
use_storage=True
)
# Run assessment
response = system.run_assessment(
"Analyze this security issue...",
stream=True
)
With Memory Persistence
system = SecurityAgentSystem(
model_name="gpt-4o",
use_memory=True, # Enable conversation history
use_storage=True # Enable agent state persistence
)
🛠️ Available Tools
CrossBow agents have access to 40+ security tools:
Network Tools:
- nmap, netcat, curl, wget
- DNS tools (dig, nslookup, whois)
- Traffic analysis (tcpdump, tshark)
Security Scanners:
- nuclei (10,200+ templates)
- bandit (Python SAST)
- semgrep (multi-language SAST)
Analysis Tools:
- Log parsing (grep, awk, sed)
- File operations
- Code execution
- Web browsing
And many more!
🎯 Use Cases
Security Operations Center (SOC)
- Log analysis and correlation
- Attack investigation
- Incident response
- Timeline reconstruction
Threat Intelligence
- IOC collection and validation
- Threat actor profiling
- Threat hunting
- MITRE ATT&CK mapping
Penetration Testing
- Vulnerability discovery
- Exploit development
- Attack simulation
- Security assessments
Digital Forensics
- Memory analysis
- Disk forensics
- Network forensics
- Evidence collection
Code Security
- Static code analysis
- Vulnerability detection
- Security code review
- Compliance checking
📊 Requirements
- Python: 3.9 or higher
- Terminal: 256 color support, UTF-8
- API Keys: For AI models (Anthropic, OpenAI, or Google)
🤝 Contributing
Contributions are welcome! Please feel free to submit issues or pull requests.
📄 License
MIT License - see LICENSE file for details.
👤 Author
Harish Santhanalakshmi Ganesan
- Email: harishsg99@gmail.com
- GitHub: @harishsg99
🙏 Acknowledgments
Built with:
📈 Project Status
CrossBow is actively maintained and under continuous development.
- ✅ 18 specialized security agents
- ✅ Multi-model AI support
- ✅ CLI and TUI interfaces
- ✅ Auto-configuration
- ✅ Comprehensive documentation
🔗 Links
⚡ Quick Examples
Example 1: Security Assessment
$ crossbow
crossbow-agent > Assess my web application for OWASP Top 10 vulnerabilities
Example 2: Log Analysis
$ crossbow
crossbow-agent > Analyze /var/log/auth.log for brute force attempts
Example 3: Threat Intelligence
$ crossbow
crossbow-agent > What are the latest IOCs for ransomware attacks?
Example 4: Code Review
$ crossbow
crossbow-agent > Review this Python code for security issues
Start securing your systems with AI-powered security agents today! 🎯🔒
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file crossbow_agent-1.0.0.tar.gz.
File metadata
- Download URL: crossbow_agent-1.0.0.tar.gz
- Upload date:
- Size: 78.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.14
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
89686057b3b164c4420c6377814f14ebf9975990f515a02733852b23a3a5cdf6
|
|
| MD5 |
7ac9b0b9953e0eaca157a416e267ae65
|
|
| BLAKE2b-256 |
2c4a58fb0b9efe6e26552e7afe7c4a5f4c99175fca5d4a1fab487134171126c4
|
File details
Details for the file crossbow_agent-1.0.0-py3-none-any.whl.
File metadata
- Download URL: crossbow_agent-1.0.0-py3-none-any.whl
- Upload date:
- Size: 6.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.14
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
153ca96a0846e8ab45f488e19207992b385d9b38615827b69732e3f63ab42cfd
|
|
| MD5 |
6e01839431cd3d7409f64c7a77a16561
|
|
| BLAKE2b-256 |
2d7351406b7c65cd46e3f0414ef49498bd7b7e57824bed9008b73a21a19c5fda
|