Skip to main content

AI-Powered Security Testing Platform with 18 Specialized Security Agents

Project description

🎯 CrossBow Security Agent

AI-Powered Security Testing Platform with 18 Specialized Security Agents

PyPI version Python Versions License: MIT

CrossBow is a comprehensive AI-powered security testing platform that orchestrates 18 specialized security agents to perform advanced security assessments, threat analysis, and vulnerability testing.

✨ Features

🤖 18 Specialized Security Agents

  1. SOC Analyst - Log analysis & attack investigation
  2. Threat Intelligence Analyst - IOC collection & threat profiling
  3. Android SAST Specialist - Android security testing
  4. Blue Team Defender - Defensive security measures
  5. Bug Bounty Hunter - Vulnerability discovery
  6. Security Developer - Security code development
  7. DFIR Investigator - Digital forensics & incident response
  8. Email Security Analyst - Email threat analysis
  9. Memory Forensics Expert - Memory analysis
  10. Network Security Analyst - Network monitoring & analysis
  11. Red Team Operator - Offensive security testing
  12. Replay Attack Specialist - Attack replay analysis
  13. Security Reporter - Report generation
  14. Vulnerability Validator - Exploit verification
  15. Reverse Engineer - Binary analysis
  16. RF Security Expert - Radio frequency security
  17. WiFi Security Tester - Wireless security
  18. Source Code Analyzer - Static code analysis

🎨 Two Interfaces

  • CLI - Traditional command-line interface
  • TUI - Modern terminal UI with rich formatting (Textual-based)

⚙️ Advanced Capabilities

  • Multi-Model Support: GPT-4o, Claude, Gemini
  • Conversation Memory: Persistent context across sessions
  • Agent Storage: State persistence for complex tasks
  • MCP Support: Model Context Protocol integration
  • Auto-Configuration: Settings automatically saved
  • 40+ Security Tools: Integrated security testing toolkit

🚀 Quick Start

Installation

pip install crossbow-agent

Basic Usage

Start the CLI:

crossbow

Start the Modern TUI:

crossbow-tui

First Steps

  1. Configure your AI model (choose from GPT-4o, Claude, Gemini)
  2. Enable features (memory, storage, MCP as needed)
  3. Ask security questions or give testing tasks

Example Queries

# Security Analysis
"Analyze authentication logs for suspicious activity"

# Threat Intelligence
"Research IP address 192.168.1.100 for malicious activity"

# Vulnerability Assessment
"Help me test my web application for SQL injection"

# Network Security
"Analyze this network traffic for anomalies"

# Code Security
"Review this Python code for security vulnerabilities"

# Incident Response
"Investigate this security incident and provide timeline"

📖 Documentation

Configuration

CrossBow automatically saves your preferences in crossbow_config.json:

{
  "model": "claude-sonnet-4-5",
  "memory": true,
  "storage": true,
  "mcp": false,
  "mcp_servers": []
}

All settings changes are automatically persisted!

CLI Commands

/model     - Choose AI model
/memory    - Toggle conversation memory
/storage   - Toggle agent storage
/mcp       - Toggle MCP support
/config    - Show configuration
/status    - Show current session
/help      - Show help
/quit      - Exit

TUI Features

The modern TUI provides:

  • Visual model selector - Dropdown menu
  • Toggle buttons - One-click feature control
  • Live status bar - Real-time configuration display
  • Rich formatting - Markdown, syntax highlighting
  • Keyboard shortcuts - Efficient navigation
  • Color-coded panels - Clear visual hierarchy

Keyboard Shortcuts:

  • Ctrl+C - Quit
  • Ctrl+M - Toggle memory
  • Ctrl+S - Toggle storage
  • Ctrl+L - Clear log
  • Enter - Send message

🔧 Advanced Usage

API Keys

CrossBow requires API keys for AI models:

# Set via environment variables
export ANTHROPIC_API_KEY="your-key-here"
export OPENAI_API_KEY="your-key-here"
export GOOGLE_API_KEY="your-key-here"

Or create a .env file:

ANTHROPIC_API_KEY=your-key-here
OPENAI_API_KEY=your-key-here
GOOGLE_API_KEY=your-key-here

Programmatic Usage

from Agent import SecurityAgentSystem

# Initialize
system = SecurityAgentSystem(
    model_name="claude-sonnet-4-5",
    use_memory=True,
    use_storage=True
)

# Run assessment
response = system.run_assessment(
    "Analyze this security issue...",
    stream=True
)

With Memory Persistence

system = SecurityAgentSystem(
    model_name="gpt-4o",
    use_memory=True,  # Enable conversation history
    use_storage=True  # Enable agent state persistence
)

🛠️ Available Tools

CrossBow agents have access to 40+ security tools:

Network Tools:

  • nmap, netcat, curl, wget
  • DNS tools (dig, nslookup, whois)
  • Traffic analysis (tcpdump, tshark)

Security Scanners:

  • nuclei (10,200+ templates)
  • bandit (Python SAST)
  • semgrep (multi-language SAST)

Analysis Tools:

  • Log parsing (grep, awk, sed)
  • File operations
  • Code execution
  • Web browsing

And many more!

🎯 Use Cases

Security Operations Center (SOC)

  • Log analysis and correlation
  • Attack investigation
  • Incident response
  • Timeline reconstruction

Threat Intelligence

  • IOC collection and validation
  • Threat actor profiling
  • Threat hunting
  • MITRE ATT&CK mapping

Penetration Testing

  • Vulnerability discovery
  • Exploit development
  • Attack simulation
  • Security assessments

Digital Forensics

  • Memory analysis
  • Disk forensics
  • Network forensics
  • Evidence collection

Code Security

  • Static code analysis
  • Vulnerability detection
  • Security code review
  • Compliance checking

📊 Requirements

  • Python: 3.9 or higher
  • Terminal: 256 color support, UTF-8
  • API Keys: For AI models (Anthropic, OpenAI, or Google)

🤝 Contributing

Contributions are welcome! Please feel free to submit issues or pull requests.

📄 License

MIT License - see LICENSE file for details.

👤 Author

Harish Santhanalakshmi Ganesan

🙏 Acknowledgments

Built with:

  • Agno - Agent orchestration
  • Textual - Modern TUI framework
  • Rich - Rich text formatting

📈 Project Status

CrossBow is actively maintained and under continuous development.

  • ✅ 18 specialized security agents
  • ✅ Multi-model AI support
  • ✅ CLI and TUI interfaces
  • ✅ Auto-configuration
  • ✅ Comprehensive documentation

🔗 Links

⚡ Quick Examples

Example 1: Security Assessment

$ crossbow
crossbow-agent > Assess my web application for OWASP Top 10 vulnerabilities

Example 2: Log Analysis

$ crossbow
crossbow-agent > Analyze /var/log/auth.log for brute force attempts

Example 3: Threat Intelligence

$ crossbow
crossbow-agent > What are the latest IOCs for ransomware attacks?

Example 4: Code Review

$ crossbow
crossbow-agent > Review this Python code for security issues

Start securing your systems with AI-powered security agents today! 🎯🔒

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

crossbow_agent-1.0.0.tar.gz (78.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

crossbow_agent-1.0.0-py3-none-any.whl (6.2 kB view details)

Uploaded Python 3

File details

Details for the file crossbow_agent-1.0.0.tar.gz.

File metadata

  • Download URL: crossbow_agent-1.0.0.tar.gz
  • Upload date:
  • Size: 78.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.14

File hashes

Hashes for crossbow_agent-1.0.0.tar.gz
Algorithm Hash digest
SHA256 89686057b3b164c4420c6377814f14ebf9975990f515a02733852b23a3a5cdf6
MD5 7ac9b0b9953e0eaca157a416e267ae65
BLAKE2b-256 2c4a58fb0b9efe6e26552e7afe7c4a5f4c99175fca5d4a1fab487134171126c4

See more details on using hashes here.

File details

Details for the file crossbow_agent-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: crossbow_agent-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 6.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.14

File hashes

Hashes for crossbow_agent-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 153ca96a0846e8ab45f488e19207992b385d9b38615827b69732e3f63ab42cfd
MD5 6e01839431cd3d7409f64c7a77a16561
BLAKE2b-256 2d7351406b7c65cd46e3f0414ef49498bd7b7e57824bed9008b73a21a19c5fda

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page