HOS_Vortex - Advanced Red Team Penetration AI Toolkit
Project description
hos_vortex - Advanced Red Team Penetration Testing Framework
Overview
hos_vortex is a comprehensive red team penetration testing framework that integrates traditional penetration testing techniques with AI-powered attack analysis. It provides a modular, extensible platform for authorized security testing, vulnerability assessment, and security research.
IMPORTANT: This tool is designed exclusively for authorized security testing and educational purposes with explicit permission from system owners. Unauthorized use is illegal and unethical.
Features
Core Modules
- scan.py - Comprehensive network and system vulnerability scanning
- escalate.py - Privilege escalation techniques for multiple operating systems
- lateral_move.py - Network lateral movement with multiple protocol support
- exfiltrate.py - Sensitive data identification, extraction, and secure transfer
- c2_communication.py - Command and control framework with secure communication
- ai_engine.py - AI-powered attack pattern analysis and prediction
Utility Components
- config.py - Flexible configuration management with nested settings
- logger.py - Comprehensive logging with rotation, context-awareness, and security events
- auth.py - Robust authorization system with API keys and role-based access control
Key Benefits
- Modular Architecture: Independent modules that can be used together or separately
- AI-Enhanced Analysis: Advanced pattern recognition and behavior prediction
- Dual Operation Modes: Development mode (analysis) and Production mode (testing)
- Enterprise-Grade Security: Secure authentication, authorization, and audit logging
- Extensible Design: Easy to add new techniques and capabilities
Installation
From Source
git clone https://github.com/yourusername/hos_vortex.git
cd hos_vortex
pip install -r requirements.txt
Requirements
- Python 3.8 or higher
- See
requirements.txtfor detailed dependencies
Usage
Running Modules
Each core module can be executed directly:
# Run vulnerability scan
python -m hos_vortex.core.scan --target 192.168.1.0/24
# Attempt privilege escalation
python -m hos_vortex.core.escalate --target localhost
# Perform lateral movement
python -m hos_vortex.core.lateral_move --source 192.168.1.10 --destination 192.168.1.20
# Extract sensitive data
python -m hos_vortex.core.exfiltrate --target ./data --pattern "password"
# Setup C2 server
python -m hos_vortex.core.c2_communication --mode server --port 443
# Use AI for attack analysis
python -m hos_vortex.ai.ai_engine --action analyze --input logs.txt
Development Mode
Run any module in development mode for blue team analysis and non-intrusive operations:
python -m hos_vortex.core.scan --target 192.168.1.1 --development
Command-Line Options
All modules support the following common options:
--development- Run in development mode (safer analysis mode)--verbose- Enable verbose output--debug- Enable debug level logging--help- Show detailed help for the module
Module Details
Scan Module
The scanning module provides:
- Network service discovery
- Vulnerability detection with CVSS scoring
- Misconfiguration identification
- Weak password detection
- SSL/TLS security assessment
- Web application vulnerability scanning
Escalate Module
Privilege escalation capabilities include:
- Local privilege escalation checks
- Kernel exploit identification
- Service misconfiguration detection
- Sudo/root access vulnerabilities
- Windows privilege escalation techniques
- Container escape methods
Lateral Movement Module
Network lateral movement features:
- Credential-based access (password, hash, token)
- Protocol-specific movement (SMB, SSH, RDP)
- Pass-the-hash and pass-the-ticket attacks
- Port forwarding and tunneling
- Lateral movement path analysis
Exfiltrate Module
Data extraction capabilities:
- Sensitive data pattern matching
- File type-based extraction
- Data compression and encryption
- Covert exfiltration methods
- Transfer protocols: HTTP(S), SMB, DNS, custom
- Exfiltration size and rate limiting
C2 Communication Module
Command and control framework:
- Multiple protocol support (HTTP, Socket, Socket.IO)
- Encrypted communication channels
- Command execution and result retrieval
- Persistence mechanism management
- Session handling and tracking
- Anti-detection techniques
AI Engine Module
Artificial intelligence capabilities:
- Attack pattern recognition
- Behavior prediction and anomaly detection
- Threat intelligence integration
- Attack path analysis
- Automated recommendations
- Historical attack correlation
Configuration
Configuration is managed through config.py with settings stored in ~/.hos_vortex/:
config.json- Main configuration file with nested settingsapi_keys.json- Securely stored API keys (hashed)logs/- Log files directory with rotation
Key Configuration Areas:
- Scan settings (ports, timeouts, techniques)
- Escalation preferences
- Lateral movement protocols
- Exfiltration methods and destinations
- C2 communication parameters
- AI model configuration
- Logging and reporting preferences
Security and Authorization
Role-Based Access Control
The authorization system includes predefined roles:
- admin: Full system access and user management
- operator: Execute penetration testing operations
- analyst: View results and generate reports
- guest: Limited access to public data
API Key Authentication
Secure authentication using generated API keys with:
- Cryptographic signing
- Key expiration and rotation
- Usage tracking and auditing
- Secure storage (hashed)
Logging and Auditing
Comprehensive logging system with:
- Daily log rotation
- Colored console output
- Context-aware logging
- Security event tracking
- Module-specific activity logs
- Network communication logging
Documentation
Detailed documentation is available in the docs/ directory:
- Getting Started: Installation and basic usage
- Module Guides: In-depth documentation for each module
- API Reference: Programmatic usage details
- Security Considerations: Best practices and safety guidelines
- Development Guide: Extending the framework
Contributing
Contributions to hos_vortex are welcome! Please follow these guidelines:
- Fork the repository
- Create a feature branch
- Submit a pull request with detailed changes
- Include tests for new functionality
License
This project is licensed under the MIT License - see the LICENSE file for details.
Disclaimer
IMPORTANT: This tool is provided for educational and authorized security testing purposes only. The developers assume no liability and are not responsible for any misuse or damage caused by this tool. Users must comply with all applicable laws and regulations and obtain explicit permission before testing any systems.
By using this software, you agree to:
- Use it only with proper authorization
- Conduct testing in compliance with laws
- Take responsibility for your actions
- Not use it for malicious purposes
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file hos_vortex-0.1.0.tar.gz.
File metadata
- Download URL: hos_vortex-0.1.0.tar.gz
- Upload date:
- Size: 51.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
63a50c50ecc56397cbbe4276d540659074475c36547799b60adc79c6a60edeba
|
|
| MD5 |
5e410139088862e6779a2f285d2947a7
|
|
| BLAKE2b-256 |
ebc7e718d8162e0b21113852799821838223ee49aa921ac16e1f69983a67bf87
|
File details
Details for the file hos_vortex-0.1.0-py3-none-any.whl.
File metadata
- Download URL: hos_vortex-0.1.0-py3-none-any.whl
- Upload date:
- Size: 53.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
42d3b768514f31ac0e136e8fa567f411959b9f5a2c52e72f8a4b89e489d6ae09
|
|
| MD5 |
7f67d6ecbc405da7c82080fc7d25fc05
|
|
| BLAKE2b-256 |
39a22de5ed8c34c41bfcad5f98cf47c067029ff75facb8ef9e1975a2ce9c4cec
|