Skip to main content

Autonomous AI-driven network penetration testing library

Project description

Luvia

Autonomous AI-Driven Network Penetration Testing Library

Luvia orchestrates reconnaissance, vulnerability identification, and AI-powered remediation. It uses recursive logic to switch between ports and services until a vulnerability is found or the target is fully mapped.

Features

  • Stealth Scanning — SYN scans, fragmentation, decoy IPs for firewall evasion
  • Full Port Audit — Scan all 65,535 ports with service fingerprinting
  • Autonomous Port Routing — Automatically dispatches service-specific modules based on open ports
  • CVE Mapping — Local vulnerability database + NVD API lookups
  • Known Backdoor Detection — Hard-coded signatures for vsftpd 2.3.4, UnrealIRCd, Samba, etc.
  • Credential Spraying — Async SSH/FTP/Telnet/HTTP brute-force with IDS evasion
  • Web Security Audit — Headers, TLS, directory brute-force, WAF detection, CORS checking
  • Traffic Analysis — TShark pcap parsing with anomaly detection
  • OSINT & Discovery — Subdomain enumeration, DNS zone transfer, WHOIS, host discovery
  • AI Remediation Brain — OpenAI / Ollama / HuggingFace integration for intelligent analysis
  • Autonomous Pivoting — Detect internal networks for lateral movement
  • Professional Reports — JSON and PDF export with styled formatting

Prerequisites

Luvia depends on industry-standard security tools that must be installed on your system:

  • Nmap (Required for all scanning) — nmap.org
  • TShark / Wireshark (Optional, for traffic analysis) — wireshark.org
  • Ollama (Optional, for local AI remediation) — ollama.com

Installation

Method 1: Docker (One Command, Bundled Dependencies)

This is the recommended method as it automatically installs Nmap and TShark for you.

git clone https://github.com/luvia-team/luvia.git
cd luvia
docker compose up -d  # Spins up Luvia + Ollama
docker compose run luvia audit --target example.com

Method 2: pip (Custom Install)

pip install luvia
luvia setup   # One-command automated install of Nmap & TShark
luvia check   # Verify everything is ready

Quick Start

# Stealth scan
luvia scan --target 192.168.1.100 --type stealth

# Full vulnerability audit with AI analysis
luvia audit --target 192.168.1.100 --ai-backend openai --ai-key YOUR_KEY

# Analyse prior results
luvia analyze --input results.json --ai-backend ollama

# Reconnaissance
luvia discover --domain example.com --cidr 192.168.1.0/24

# Export reports
luvia report --input scan_results.json --format both

Architecture

luvia/
├── core/
│   ├── scanner.py        # Nmap/Scapy orchestration
│   ├── traffic.py        # TShark/Packet analysis
│   └── discovery.py      # Subdomain and OSINT logic
├── modules/
│   ├── web_audit.py      # HTTP/HTTPS security checks
│   ├── exploit_db.py     # CVE mapping logic
│   └── brute_force.py    # Credential testing
├── brain/
│   ├── ai_client.py      # LLM integration
│   └── remediator.py     # Findings → solutions
├── utils/
│   ├── reporters.py      # JSON/PDF export
│   └── logger.py         # Stealth-compliant logging
├── database/
│   ├── models.py         # Pydantic + SQLAlchemy models
│   └── checklist.json    # Security checklist (25 items)
├── main.py               # CLI entry point
└── __main__.py            # python -m luvia support

Requirements

  • Python 3.11+
  • Nmap (installed on PATH)
  • TShark (for traffic analysis)

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

luvia-0.1.0.tar.gz (51.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

luvia-0.1.0-py3-none-any.whl (56.3 kB view details)

Uploaded Python 3

File details

Details for the file luvia-0.1.0.tar.gz.

File metadata

  • Download URL: luvia-0.1.0.tar.gz
  • Upload date:
  • Size: 51.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for luvia-0.1.0.tar.gz
Algorithm Hash digest
SHA256 3c8538675152510943a1575b96a467f32c356a08ed9c70f602787e9c6560f966
MD5 dea91355232d25b5013e99ccf1194733
BLAKE2b-256 3dd33c9f170760fa7e332a56f5be14e628ad44abe89a300a34cc25f1e82ff4c0

See more details on using hashes here.

File details

Details for the file luvia-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: luvia-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 56.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.2

File hashes

Hashes for luvia-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b1c64d9261368664a425226397ddd98da4bba6016de0dfb6bf3a8b379ff7d044
MD5 03df93b21721bf5806f205934d765f64
BLAKE2b-256 edf7bef77a1d4b4cb2f5db31b51cce45fe543a94269ecff6ef724f4201ba53c2

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page