Skip to main content

Natural language to shell with explanations & confirmations

Project description

FlawHunt CLI

The smart CLI for cybersecurity professionals and ethical hackers

FlawHunt CLI is an AI-powered terminal assistant that transforms natural language into safe, effective cybersecurity operations. Built with security-first principles, it provides three specialized modes for different use cases while maintaining comprehensive safety controls.

๐ŸŽฏ Quick Summary

  • ๐Ÿค– SAGE Mode: Direct cybersecurity knowledge and guidance without tools
  • โš’๏ธ FORGE Mode: Command generation with confirmation for precise operations
  • ๐ŸŽฏ HUNTER Mode: Full AI agent with advanced tools for complete tactical operations
  • ๐Ÿ”’ Security-First: Safe by default with dangerous command blocking
  • ๐Ÿง  Smart Memory: Conversation history with semantic search and context awareness
  • ๐ŸŽจ Customizable: Multiple themes, verbose controls, and personalization options

โšก Quick Start

  1. Download the zip file for your platform:
  2. Extract the zip file: unzip flawhunt-cli-[platform].zip
  3. Get API Keys: Groq API key (recommended) or Google Gemini API key
  4. Get License: FlawHunt license key for full features
  5. Run: ./flawhunt and follow the setup wizard
  6. Start Hacking: Choose your mode and begin your cybersecurity operations!

๐Ÿš€ Key Features

๐Ÿ›ก๏ธ Security & Safety

  • Safe by Default: Automatically blocks dangerous commands and requires confirmation
  • Security Patterns: Built-in detection of potentially harmful operations
  • Ethical Focus: Designed for defensive security and ethical hacking practices
  • Command Validation: All shell operations are security-checked before execution

๐Ÿค– Three Operating Modes

1. ๐Ÿค– SAGE Mode (Ask Mode)

Your cybersecurity study buddy for direct knowledge and guidance.

  • Pure knowledge responses without tool execution
  • Perfect for learning concepts, theory, and best practices
  • Fast answers to security questions and explanations

2. โš’๏ธ FORGE Mode (Generate Mode)

The command craftsman for precision-crafted tools.

  • Generates commands with detailed explanations
  • Requires user confirmation before execution
  • Perfect for learning command syntax and understanding operations

3. ๐ŸŽฏ HUNTER Mode (Agent Mode)

Elite operative with full tool access for complete operations.

  • Advanced AI agent with comprehensive tool suite
  • Autonomous execution with safety controls
  • Complete cybersecurity workflow automation

๐Ÿง  Intelligent Memory System

  • Conversation History: Persistent memory across sessions with metadata
  • Semantic Search: Find past conversations by meaning and context
  • Session Management: Organize conversations by topics or projects
  • Context Awareness: AI remembers and builds on previous discussions
  • Vector Storage: Advanced similarity matching for relevant context injection

๐Ÿ› ๏ธ Comprehensive Tool Suite

  • Shell Operations: Safe command execution with explanations
  • File Management: Read, write, and navigate filesystem operations
  • Git Integration: Version control operations and workflow automation
  • Docker Support: Container management and deployment operations
  • Package Management: Multi-platform package installation and management
  • Cybersecurity Tools: Automated installation and usage of security tools
  • Environment Setup: Complete development environment configuration
  • Script Generation: Custom script creation for specific tasks

๐ŸŽจ Customization & Themes

  • Multiple Themes: Professional, hacker, minimal, and custom themes
  • Verbose Control: Toggle between detailed reasoning and clean output
  • Animation Effects: Matrix rain, glitch effects, and terminal animations
  • Progress Tracking: Visual progress bars and status indicators
  • Personalization: Configurable prompts, colors, and interface elements

๐Ÿ“Š Advanced Features

  • Backup & Sync: Cloud backup of conversation history across devices
  • Statistics: Detailed usage analytics and security metrics
  • Learning Mode: Built-in cybersecurity tool education and tutorials
  • Auto-completion: Intelligent command and path completion
  • File Monitoring: Real-time filesystem change detection
  • Cross-Platform: Full support for Windows, macOS, and Linux

๐Ÿ“ฆ Installation

๐Ÿš€ Quick Install (Recommended)

No Python installation required! Download the pre-built binary for your platform:

macOS โœ…

# Download and extract FlawHunt CLI for macOS
curl -L -o flawhunt-cli-macos.zip https://github.com/gamkers/FlawHunt_CLI/releases/download/v1.1/flawhunt-cli-macos.zip
unzip flawhunt-cli-macos.zip
chmod +x flawhunt
# Run: ./flawhunt

Linux โœ…

# Download and extract FlawHunt CLI for Linux
curl -L -o flawhunt-cli-linux.zip https://github.com/gamkers/FlawHunt_CLI/releases/download/v1.1/flawhunt-cli-linux.zip
unzip flawhunt-cli-linux.zip
chmod +x flawhunt
# Run: ./flawhunt

Windows ๐Ÿ”„

# Coming Soon!
# Windows binary is currently being prepared and will be available shortly

Android (Termux) ๐Ÿ”„

# Coming Soon!
# Android binary is currently being prepared and will be available shortly

๐Ÿ“‹ Requirements

You only need:

  • Groq API Key (primary, recommended) OR Google Gemini API Key (alternative)
  • FlawHunt License Key (for full features)

๐Ÿ› ๏ธ Advanced: Install from Source

For developers who want to modify the code:

git clone https://github.com/gamkers/GAMKERS_CLI.git
cd GAMKERS_CLI
pip install -r requirements.txt
pip install -e .

๐Ÿ”ง Configuration

๐Ÿ”‘ API Keys Setup

Set up your API keys using environment variables or during first run:

# Primary provider (recommended)
export GROQ_API_KEY=your_groq_key_here

# Alternative provider
export GOOGLE_API_KEY=your_gemini_key_here

# FlawHunt license key
export FLAWHUNT_KEY=your_flawhunt_key_here

๐Ÿš€ First Run

After downloading and extracting the zip file:

# Windows
./flawhunt.exe

# macOS/Linux/Android
./flawhunt

The application will guide you through:

  1. API key configuration (if not set via environment variables)
  2. FlawHunt license key setup
  3. Initial mode selection and preferences

๐Ÿ’ก Usage Examples

Basic Operations

# Start FlawHunt CLI
./flawhunt  # (or ./flawhunt.exe on Windows)

# Select mode (1=SAGE, 2=FORGE, 3=HUNTER)
Mode choice: 3

# Natural language commands
> scan this network for open ports
> install nmap and show me how to use it
> what are the best tools for web application testing?
> create a python script to parse log files
> explain what this command does: nmap -sS -O target

Mode Switching

# Switch between modes anytime
:mode sage     # Switch to SAGE mode
:mode forge    # Switch to FORGE mode  
:mode hunter   # Switch to HUNTER mode

Meta Commands

# System controls
:help          # Show all available commands
:safe on/off   # Toggle safety mode
:verbose on/off # Toggle detailed output
:clear         # Clear screen
:quit          # Exit application

# Customization
:theme         # Show available themes
:theme hacker  # Switch to hacker theme
:animation matrix # Run matrix animation

# Memory & History
:history       # Show recent conversations
:history search nmap # Search for nmap-related conversations
:session new "Web Testing" # Create new conversation session
:backup        # Create cloud backup

# Learning & Tools
:learn nmap    # Learn about nmap tool
:packages      # Show available security tools
:stats         # Show usage statistics

Advanced Workflows

# Cybersecurity reconnaissance workflow
> install and configure nmap for network discovery
> scan 192.168.1.0/24 for live hosts
> perform service detection on discovered hosts
> generate a report of findings

# Web application testing
> set up burp suite for web app testing
> install and configure sqlmap
> test this URL for SQL injection: http://example.com/page?id=1
> document findings in a structured report

# Environment setup
> set up a complete penetration testing environment
> install all essential cybersecurity tools
> configure my development environment for security research

๐ŸŽจ Themes & Customization

Available Themes

  • Professional: Clean, business-appropriate interface
  • Hacker: Green-on-black terminal aesthetic
  • Minimal: Simplified, distraction-free design
  • Custom: User-defined color schemes and layouts

Verbose Mode Control

:verbose off   # Clean, direct answers
:verbose on    # Detailed reasoning and steps

Animation Effects

:animation matrix           # Matrix digital rain
:animation glitch <text>    # Glitch text effect
:animation typewriter <text> # Typewriter effect
:animation scan            # Network scan simulation

๐Ÿ”’ Security Features

Built-in Safety Controls

  • Dangerous command pattern detection
  • Confirmation prompts for destructive operations
  • Safe mode toggle for additional protection
  • Command explanation before execution

Ethical Guidelines

  • Designed for defensive security practices
  • Educational focus on cybersecurity learning
  • No offensive capabilities or attack tools
  • Compliance with responsible disclosure principles

๐Ÿ“ Project Structure

FlawHunt CLI/
โ”œโ”€โ”€ main.py                 # Main application entry point
โ”œโ”€โ”€ ai_terminal/           # Core application modules
โ”‚   โ”œโ”€โ”€ __init__.py        # Package initialization
โ”‚   โ”œโ”€โ”€ agent.py           # AI agent implementation
โ”‚   โ”œโ”€โ”€ llm.py             # Language model wrapper
โ”‚   โ”œโ”€โ”€ tools.py           # Tool implementations
โ”‚   โ”œโ”€โ”€ safety.py          # Security and safety controls
โ”‚   โ”œโ”€โ”€ themes.py          # Theme management
โ”‚   โ”œโ”€โ”€ config.py          # Configuration management
โ”‚   โ”œโ”€โ”€ conversation_history.py # Memory system
โ”‚   โ”œโ”€โ”€ vector_store.py    # Semantic search
โ”‚   โ”œโ”€โ”€ animations.py      # Visual effects
โ”‚   โ””โ”€โ”€ utils.py           # Utility functions
โ”œโ”€โ”€ requirements.txt       # Python dependencies
โ”œโ”€โ”€ README.md             # This file
โ””โ”€โ”€ docs/                 # Additional documentation

๐Ÿค Contributing

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Make your changes with appropriate tests
  4. Commit your changes (git commit -m 'Add amazing feature')
  5. Push to the branch (git push origin feature/amazing-feature)
  6. Open a Pull Request

Development Setup

For contributors and developers:

git clone https://github.com/gamkers/GAMKERS_CLI.git
cd GAMKERS_CLI
pip install -r requirements.txt
pip install -e .
python main.py  # Run from source
python -m pytest tests/  # Run tests

๐Ÿ“„ License

MIT License - see LICENSE.md for details.

๐Ÿ†˜ Support & Documentation

  • Issues: GitHub Issues
  • Discussions: GitHub Discussions
  • Documentation: See /docs folder for detailed guides
  • Security: Report security issues privately via email

๐Ÿ™ Acknowledgments


FlawHunt CLI - Empowering ethical hackers with AI-assisted cybersecurity operations.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

flawhunt-1.0.0.tar.gz (129.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

flawhunt-1.0.0-py3-none-any.whl (131.0 kB view details)

Uploaded Python 3

File details

Details for the file flawhunt-1.0.0.tar.gz.

File metadata

  • Download URL: flawhunt-1.0.0.tar.gz
  • Upload date:
  • Size: 129.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.7

File hashes

Hashes for flawhunt-1.0.0.tar.gz
Algorithm Hash digest
SHA256 d711f1e245297ebed22f7bd2af391276ec0cd6180b4e6ed24bfd8ff3db1356cb
MD5 02717294a6025bda3247cede6d963a91
BLAKE2b-256 70fd94e586dfe54e1f4c039b2dafc0ee2af17f774394ca8c8060b34aa9bc4ac0

See more details on using hashes here.

File details

Details for the file flawhunt-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: flawhunt-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 131.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.7

File hashes

Hashes for flawhunt-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b296d040de335fbcf6356cbfde52a064a30f7748e395519980672c3f6aa9ab15
MD5 f1c5fa975c9353367be50761269bdaf8
BLAKE2b-256 0fe99f9f48ce1c9d7afc7453f5b820b9d845113edcb16beda088d2a28baa6499

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page