AI-powered cybersecurity and automation toolkit
Project description
Project Sentient
Project Sentient is an AI-powered command-line assistant designed for cybersecurity, automation, and digital forensics. First of its kind, Sentient acts as a helpful hacking AI, capable of understanding user commands and providing intelligent, conversational responses. It is modular, highly extensible, and leverages the Gemini API for advanced conversational AI—while giving the AI direct access to powerful cybersecurity, OSINT, and automation modules. This hybrid approach enables Sentient to not just chat, but to act, analyze, and automate complex security tasks far beyond standard AI assistants.
Features
- Conversational AI: Uses Gemini API for natural, context-aware chat, but with direct access to all modules and system actions.
- File Analysis: Examine, edit, and understand files for suspicious content, malware, or improvements.
- Virus Scanning: Scan files or directories for potential malware or viruses.
- PDF & Image Analysis: Extract text, metadata, and scan for hidden or malicious content in PDFs and images.
- SQL & Website Vulnerability Testing: Scan websites for SQL injection, XSS, sensitive files, and interesting paths.
- Traffic Sending & Imitation: Send traffic or imitate real human traffic to websites.
- Phishing Simulation: Copy entire websites to demonstrate phishing attacks.
- Malware & Virus Reverse Engineering: Analyze and deconstruct malware or viruses.
- Password & Key Encryption/Decryption: Encrypt, decrypt, and crack passwords and keys.
- Password Strength & Breach Checks: Test password strength and check for breaches using public databases.
- Google Dorking & OSINT: Perform advanced search and open-source intelligence gathering.
- Phone, Email, and Username Lookup: Lookup and track phone numbers, emails, and usernames across platforms.
- WHOIS, DNS, and Subdomain Enumeration: Gather domain intelligence and enumerate subdomains.
- Port Scanning & Directory Brute Forcing: Scan ports and brute-force directories for hidden resources.
- SSL/TLS Security Checks: Analyze SSL/TLS configurations for vulnerabilities.
- Log File Analysis: Analyze log files for anomalies or security events.
- Hash Generation, Identification, and Cracking: Work with hashes for security and forensics.
- GeoIP & Reverse IP Lookup: Find the geographical location of IPs and enumerate domains on an IP.
- Shodan & VirusTotal Integration: Search Shodan and scan files/URLs with VirusTotal.
- Username Checks & OSINT: Check username availability and gather OSINT.
- Packet Capture & Analysis: Analyze network packet captures (pcap files).
- Subdomain Takeover Detection: Detect vulnerable subdomains.
- CVE Search: Search for recent vulnerabilities (CVEs) for any software or technology.
- JWT Decoding & Analysis: Decode and analyze JWT tokens.
- URL Expansion & Shortening: Expand shortened URLs and check for malicious redirects.
- File Type Identification: Identify file types based on content, not just extension.
- Custom Wordlist Generation: Generate wordlists for brute-forcing.
- Threat Intelligence Feeds: Pull and search latest threat intel from public feeds.
- YARA Rule Scanning: Scan files with YARA rules for malware detection.
- Automated Report Generation: Generate detailed PDF/HTML reports for scans and analyses.
- Scheduling & Automation: Schedule scans and recurring tasks.
- Slack/Discord/Webhook Integration: Send alerts or results to Slack, Discord, or via webhooks.
- Plugin System: Easily add your own Python modules for new features.
- Auto-Update: Self-update from the official repository.
- And much more—constantly evolving to meet new threats and challenges!
Memory & Persistence
Sentient uses a MongoDB connection string (URI) to remember and store analysis results, file content, and other persistent data across sessions.
You will be prompted to enter your MongoDB connection string when starting Sentient.
If you do not have a MongoDB URI or are unsure how to set one up, you can request access or assistance by emailing:
muhammadhuzaifakhalidaziz@gmail.com
Getting Started
-
Clone the repository:
git clone https://github.com/yourusername/sentient.git cd sentient
-
Install dependencies:
pip install -r requirements.txt
-
Run the assistant:
python Sentient.py -
Configure your API key:
- Open
Sentient.pyand add your API key when prompted.
- Open
Usage
Interact with Sentient through the command line. Type your cybersecurity or automation queries and receive intelligent responses. Type exit or quit to end the session.
Access Key: Google Gemini API Token.
if needed email muhammadhuzaifakhalidaziz@gmail.com for a Premium Api key/Token.
Example Commands
scan website example.comanalyze file C:\path\to\file.exeemail lookup test@example.comphone lookup +1234567890geoip lookup 8.8.8.8shodan search apachevirustotal scan C:\path\to\file.exejwt decode <token>cve search apachesubdomain takeover example.compacket analyze C:\path\to\capture.pcapexport last scan scan_results.txt- ...and many more!
Disclaimer
This project is intended for educational and ethical cybersecurity purposes only.
The creator is not responsible for any misuse, illegal activity, or damage caused by the use of this software.
Users are solely responsible for ensuring their actions comply with all applicable laws and regulations.
License
This project is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).
- You may not use the material for commercial purposes.
- You may not distribute modified versions of the project.
- You must give appropriate credit if you share the project.
For more details, see CC BY-NC-ND 4.0 License
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file sentient_ai-1.0.3.tar.gz.
File metadata
- Download URL: sentient_ai-1.0.3.tar.gz
- Upload date:
- Size: 26.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
966c4f2c595ac8ce8a933c8b73da2257dd9f333752e5f55691a8675692968f52
|
|
| MD5 |
37b043972cc978fb6ae0b7a4ae7df2a7
|
|
| BLAKE2b-256 |
6bb333a658088259f67df358f62ef32ecf62c967e17efc6913a4a03067e832ad
|
File details
Details for the file sentient_ai-1.0.3-py3-none-any.whl.
File metadata
- Download URL: sentient_ai-1.0.3-py3-none-any.whl
- Upload date:
- Size: 30.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
6e0a15d6c86523b3d4996fc9ee05f5a2d9a53fa84640596521b39b2f280e2088
|
|
| MD5 |
b5f81f61200908af04c482b0c59c322d
|
|
| BLAKE2b-256 |
5acca226907fe3fc48baf2212ac3065129458a169ea9cf31fac5a9ca5b4d6c21
|