ExaaiAgnt - Advanced AI Security Agent for Comprehensive Penetration Testing
Project description
ExaAiAgent
Advanced AI-Powered Cybersecurity Agent for Comprehensive Penetration Testing
[!TIP] v2.0.4 Released! Agent Supervisor, WAF Bypass, Scan Modes, Shared Memory, 80% Token Reduction!
🔥 What's New in v2.0.4
| Feature | Description |
|---|---|
| 🛡️ Agent Supervisor | Self-healing, heartbeat, auto-recovery, priority levels |
| 🧠 Shared Memory | Inter-agent coordination, URL deduplication |
| 🎭 Scan Modes | Stealth (10/min) • Standard (60/min) • Aggressive (300/min) |
| 🔓 WAF Bypass | Cloudflare, Akamai, Imperva detection & bypass |
| ⚡ 80% Less Tokens | Smart output processing, summarization |
🔥 What's New in v2.0.0
✨ Smart Auto-Module Loading
ExaAiAgent now automatically detects the target type and loads relevant security modules:
- GraphQL endpoints →
graphql_securityauto-loaded - WebSocket URLs →
websocket_securityauto-loaded - OAuth/Auth endpoints →
oauth_oidcauto-loaded
🛡️ 5 New Security Modules
| Module | Focus |
|---|---|
graphql_security |
Introspection, Batching, DoS, Injection |
websocket_security |
CSWSH, Injection, Race Conditions |
oauth_oidc |
Redirect URI, Token Attacks, PKCE |
waf_bypass |
Encoding, Headers, Request Smuggling |
subdomain_takeover |
AWS, Azure, GitHub, Heroku takeover |
🔥 ExaAiAgent Overview
ExaAiAgent is an elite AI-powered cybersecurity agent that acts like a real penetration tester - running your code dynamically, finding vulnerabilities, and validating them through actual proof-of-concepts. Built for developers and security teams who need fast, accurate security testing.
Key Capabilities:
- 🔧 Full hacker toolkit out of the box
- 🤝 Teams of agents that collaborate and scale
- ✅ Real validation with PoCs, not false positives
- 💻 Developer‑first CLI with actionable reports
- 🔄 Auto‑fix & reporting to accelerate remediation
- 🧠 Multi-LLM Support - OpenAI, Anthropic, Gemini, local models
- 🌐 Cloud & Container Security testing capabilities
- 🚀 Smart Module Loading - Auto-detects and loads relevant modules
🎯 Use Cases
- Application Security Testing - Detect and validate critical vulnerabilities
- Rapid Penetration Testing - Get pentests done in hours, not weeks
- Bug Bounty Automation - Automate research and generate PoCs
- CI/CD Integration - Block vulnerabilities before production
- API Security Testing - REST, GraphQL, gRPC security analysis
- Cloud Security - AWS, Azure, GCP configuration review
🚀 Quick Start
Prerequisites:
- Docker (running)
- Python 3.12+
- An LLM provider (OpenAI, Anthropic, OpenRouter, Ollama, or any compatible provider)
Installation & First Scan
# Install ExaAiAgent
pipx install exaai-agent
# Configure your AI provider (choose one)
# Option 1: OpenAI
export EXAAI_LLM="openai/gpt-5"
export LLM_API_KEY="your-openai-key"
# Option 2: Anthropic
export EXAAI_LLM="anthropic/claude-sonnet-4-5"
export LLM_API_KEY="your-anthropic-key"
# Option 3: OpenRouter (access multiple models)
export EXAAI_LLM="openrouter/auto"
export LLM_API_KEY="your-openrouter-key"
export LLM_API_BASE="https://openrouter.ai/api/v1"
# Option 4: Ollama (local models)
export EXAAI_LLM="ollama/llama3"
export LLM_API_BASE="http://localhost:11434"
# Run your first security assessment (auto-detects modules!)
exaaiagnt --target https://your-app.com
[!NOTE] First run automatically pulls the sandbox Docker image. Results are saved to
exaai_runs/<run-name>
✨ Features
🛠️ Agentic Security Tools
ExaAiAgent agents come equipped with a comprehensive security testing toolkit:
- Full HTTP Proxy - Request/response manipulation and analysis
- Browser Automation - Multi-tab browser for XSS, CSRF, auth flows
- Terminal Environments - Interactive shells for command execution
- Python Runtime - Custom exploit development and validation
- Reconnaissance - Automated OSINT and attack surface mapping
- Code Analysis - Static and dynamic analysis capabilities
- API Fuzzing - Advanced REST/GraphQL API testing
🎯 Comprehensive Vulnerability Detection
ExaAiAgent identifies and validates a wide range of security vulnerabilities:
| Category | Vulnerabilities |
|---|---|
| Access Control | IDOR, privilege escalation, auth bypass |
| Injection | SQL, NoSQL, Command, GraphQL injection |
| Server-Side | SSRF, XXE, deserialization flaws |
| Client-Side | XSS, prototype pollution, DOM vulnerabilities |
| Business Logic | Race conditions, workflow manipulation |
| Authentication | JWT vulnerabilities, OAuth/OIDC flaws, session management |
| WebSocket | CSWSH, message injection, DoS |
| Infrastructure | Subdomain takeover, misconfigurations |
| WAF Bypass | Encoding, smuggling, header manipulation |
🕸️ Graph of Agents
Advanced multi-agent orchestration for comprehensive security testing:
- Distributed Workflows - Specialized agents for different attacks
- Scalable Testing - Parallel execution for fast coverage
- Dynamic Coordination - Agents collaborate and share discoveries
💻 Usage Examples
Basic Usage
# Scan a local codebase
exaaiagnt --target ./app-directory
# Security review of a GitHub repository
exaaiagnt --target https://github.com/org/repo
# Black-box web application assessment
exaaiagnt --target https://your-app.com
Smart Auto-Loading (New in v2.0!)
# GraphQL endpoint - auto-loads graphql_security
exaaiagnt --target https://api.example.com/graphql
# WebSocket - auto-loads websocket_security
exaaiagnt --target wss://chat.example.com/socket
# OAuth endpoint - auto-loads oauth_oidc
exaaiagnt --target https://auth.example.com/oauth/authorize
# Subdomain recon - auto-loads subdomain_takeover
exaaiagnt --target example.com --instruction "enumerate subdomains"
Advanced Testing Scenarios
# Grey-box authenticated testing
exaaiagnt --target https://your-app.com --instruction "Perform authenticated testing using credentials: user:pass"
# Multi-target testing (source code + deployed app)
exaaiagnt -t https://github.com/org/app -t https://your-app.com
# With specific modules (overrides auto-detection)
exaaiagnt --target https://api.example.com --prompt-modules graphql_security waf_bypass
# Lightweight mode (reduced token consumption)
export EXAAI_LIGHTWEIGHT_MODE=true
exaaiagnt --target https://example.com --instruction "quick security scan"
🤖 Headless Mode
Run ExaAiAgent programmatically without interactive UI:
exaaiagnt -n --target https://your-app.com
🔄 CI/CD (GitHub Actions)
name: exaaiagnt-security-test
on:
pull_request:
jobs:
security-scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Install ExaAiAgent
run: pipx install exaai-agent
- name: Run ExaAiAgent
env:
EXAAI_LLM: ${{ secrets.EXAAI_LLM }}
LLM_API_KEY: ${{ secrets.LLM_API_KEY }}
run: exaaiagnt -n -t ./
⚙️ Configuration
# Required
export EXAAI_LLM="openai/gpt-5"
export LLM_API_KEY="your-api-key"
# Optional - Performance tuning
export EXAAI_LIGHTWEIGHT_MODE=true # Reduced token consumption
export EXAAI_MAX_TOKENS=2048 # Max output tokens
export LLM_API_BASE="your-api-base" # For local models
export PERPLEXITY_API_KEY="key" # For search capabilities
Recommended Models:
- OpenAI GPT-5 (
openai/gpt-5) - Anthropic Claude Sonnet 4.5 (
anthropic/claude-sonnet-4-5) - Google Gemini 2.0 (
gemini/gemini-2.0-flash)
📦 Available Security Modules
Vulnerability Modules
| Module | Description |
|---|---|
sql_injection |
SQL/NoSQL injection testing |
xss |
Cross-site scripting attacks |
ssrf |
Server-side request forgery |
xxe |
XML external entity attacks |
rce |
Remote code execution |
idor |
Insecure direct object reference |
authentication_jwt |
Auth & JWT vulnerabilities |
business_logic |
Business logic flaws |
csrf |
Cross-site request forgery |
race_condition |
Race condition exploits |
graphql_security |
GraphQL-specific attacks |
websocket_security |
WebSocket vulnerabilities |
oauth_oidc |
OAuth2/OIDC flaws |
waf_bypass |
WAF bypass techniques |
subdomain_takeover |
Subdomain takeover |
🆕 Changelog
v2.0.4 (Latest)
- 🛡️ Agent Supervisor - Self-healing with heartbeat & auto-recovery
- 🧠 Shared Memory - Inter-agent coordination, URL deduplication
- 🎭 Scan Modes - Stealth / Standard / Aggressive
- 🔓 WAF Bypass - Cloudflare, Akamai, Imperva detection & bypass
- ⚡ 80% Token Reduction - Smart output processing
v2.0.0
- ✨ Smart Auto-Module Loading - Automatically detects target type
- ⚡ Token Optimization - Lightweight mode & task scaling
- 🛡️ 5 New Security Modules - GraphQL, WebSocket, OAuth, WAF, Subdomain
- 🎨 New UI/Branding - Fresh ExaAi logo with Cyan/Purple theme
v1.0.0
- Multi-LLM Load Balancing
- Enhanced Context Management
- Specialized Agents
- Advanced Prompts
- Improved Reporting
🤝 Contributing
We welcome contributions! Check out our Contributing Guide.
🌟 Support the Project
Love ExaAiAgent? Give us a ⭐ on GitHub!
🙏 Acknowledgements
ExaAiAgent builds on incredible open-source projects like LiteLLM, Caido, ProjectDiscovery, Playwright, and Textual.
[!WARNING] Only test apps you own or have permission to test. You are responsible for using ExaAiAgent ethically and legally.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file exaai_agent-2.0.5.tar.gz.
File metadata
- Download URL: exaai_agent-2.0.5.tar.gz
- Upload date:
- Size: 280.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0a746a266231afde2112e72b789673c4e3baf3303d9657252fac8b7d016c3acf
|
|
| MD5 |
57a1fba9be59394e2218ce10a583fc24
|
|
| BLAKE2b-256 |
0d554406fe923789797ca66ba246e620299e1423d3aab0912c7716861467fc03
|
Provenance
The following attestation bundles were made for exaai_agent-2.0.5.tar.gz:
Publisher:
publish.yml on hleliofficiel/ExaAiAgent
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
exaai_agent-2.0.5.tar.gz -
Subject digest:
0a746a266231afde2112e72b789673c4e3baf3303d9657252fac8b7d016c3acf - Sigstore transparency entry: 760347641
- Sigstore integration time:
-
Permalink:
hleliofficiel/ExaAiAgent@8680f2e039d312b9c799f997e2c70ab1bb85571f -
Branch / Tag:
refs/tags/v2.0.5 - Owner: https://github.com/hleliofficiel
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@8680f2e039d312b9c799f997e2c70ab1bb85571f -
Trigger Event:
push
-
Statement type:
File details
Details for the file exaai_agent-2.0.5-py3-none-any.whl.
File metadata
- Download URL: exaai_agent-2.0.5-py3-none-any.whl
- Upload date:
- Size: 342.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
555c6444210488c05d5d6b4929f2fa0e611cb688a37622c1fb65fb57e278b62a
|
|
| MD5 |
1f92029aab076f0ede042b75f70e0203
|
|
| BLAKE2b-256 |
edaa9a4be9ebf13315edd008ec36c3876b08f51be4bedcc1fd8842728c87b989
|
Provenance
The following attestation bundles were made for exaai_agent-2.0.5-py3-none-any.whl:
Publisher:
publish.yml on hleliofficiel/ExaAiAgent
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
exaai_agent-2.0.5-py3-none-any.whl -
Subject digest:
555c6444210488c05d5d6b4929f2fa0e611cb688a37622c1fb65fb57e278b62a - Sigstore transparency entry: 760347643
- Sigstore integration time:
-
Permalink:
hleliofficiel/ExaAiAgent@8680f2e039d312b9c799f997e2c70ab1bb85571f -
Branch / Tag:
refs/tags/v2.0.5 - Owner: https://github.com/hleliofficiel
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@8680f2e039d312b9c799f997e2c70ab1bb85571f -
Trigger Event:
push
-
Statement type: