AI-Powered Penetration Testing Platform with 40+ integrated tools
Project description
SoulEyez Beta Program
Welcome to the SoulEyez beta! Thank you for helping us test and improve this penetration testing management platform.
What is SoulEyez?
SoulEyez is your penetration testing command center. Instead of juggling dozens of terminal windows and text files, SoulEyez gives you one organized place to:
- Run security scans - Execute tools like Nmap, Gobuster, SQLMap with simple commands
- Auto-discover next steps - When one scan finds something interesting, SoulEyez automatically suggests (or runs) the next logical tool
- Stay organized - Keep all your targets, findings, and credentials in one searchable database
- Generate reports - Export professional reports when you're done
Who is this for?
- Security professionals conducting authorized penetration tests
- CTF players who want better organization during competitions
- Students learning penetration testing methodology
⚠️ Important: Only use SoulEyez on systems you have explicit authorization to test.
Version: 2.0.14
What's Included
| Feature | FREE Tier | PRO Tier |
|---|---|---|
| Run security scans | ✅ | ✅ |
| Organize targets & findings | ✅ | ✅ |
| Encrypted credential storage | ✅ | ✅ |
| 20+ integrated tools | ✅ | ✅ |
| Report generation | ✅ | ✅ |
| AI-powered suggestions | ❌ | ✅ |
| Automatic tool chaining | ❌ | ✅ |
| Metasploit integration | ❌ | ✅ |
System Requirements
- Operating System: Kali Linux or Ubuntu 22.04+ (Windows users: use WSL)
- Python: 3.8 or newer
- Storage: ~500MB for SoulEyez + tools
Known Issues
- Very large scan outputs (>10MB) may slow the interface
- Some edge cases in tool output parsing
Quick Start (Step-by-Step)
Step 1: Install Prerequisites
First, we need pipx - a tool that safely installs Python CLI apps:
sudo apt install pipx # Install pipx
pipx ensurepath # Add pipx apps to your PATH
source ~/.bashrc # Reload your shell (or close and reopen terminal)
💡 What's pipx? It's like
aptbut for Python command-line tools. It keeps each tool isolated so they don't conflict with each other.
Step 2: Install SoulEyez
pipx install souleyez
This downloads SoulEyez and all its dependencies. Takes 1-2 minutes.
Step 3: Launch SoulEyez
souleyez dashboard
Step 4: First-Time Setup Wizard
On your first run, SoulEyez guides you through setup:
- Tool Installation - Detects missing security tools (nmap, sqlmap, etc.) and offers to install them
- Vault Password - You'll create a master password that encrypts sensitive data
- Admin Account - Create your login credentials
- First Engagement - Set up your first project (like "Home Lab Test" or "CTF Challenge")
💡 What's an engagement? Think of it as a project folder. Everything you discover during a test (hosts, services, credentials) is stored in that engagement.
Step 5: You're Ready!
Once setup completes, you'll see the main dashboard. From here you can:
- Press
[t]to add target hosts - Press
[r]to run scans - Press
[h]for help at any time
Your First Scan (Tutorial)
Here's a quick walkthrough to run your first scan:
1. Add a Target
From the dashboard, press [t] for Targets, then [a] to add a host:
Enter host IP or hostname: 192.168.1.100
2. Run an Nmap Scan
Press [r] for Run Tool, select nmap, and enter your target:
Target: 192.168.1.100
Arguments: -sV -sC (service detection + default scripts)
3. Watch Results
The scan runs in the background. Press [j] to view running jobs, or wait for the dashboard to update with discovered services.
4. Auto-Chaining Magic ✨
If Nmap finds a web server on port 80, SoulEyez will automatically suggest (or run) follow-up tools like:
- Gobuster - Find hidden directories
- Nikto - Check for web vulnerabilities
This is the power of SoulEyez - it thinks like a pentester and queues the logical next steps.
5. View Findings
Press [f] to see all discovered vulnerabilities, organized by severity.
Common Commands
Here are the commands you'll use most often:
| Command | What it does |
|---|---|
souleyez dashboard |
Launch the main interface |
souleyez doctor |
Check if everything is set up correctly |
souleyez setup |
Install/update pentesting tools |
souleyez --help |
Show all available commands |
souleyez <command> --help |
Get help for a specific command |
Quick Troubleshooting
| Problem | Solution |
|---|---|
| "command not found: souleyez" | Run pipx ensurepath then restart your terminal |
| "Tool not found" errors | Run souleyez setup to install missing tools |
| Forgot your password | Data is encrypted - you'll need to start fresh with rm -rf ~/.souleyez |
| Something seems broken | Run souleyez doctor to diagnose the issue |
Reporting Issues & Feedback
Email (Preferred for Beta)
When reporting issues, please include:
- SoulEyez version (
souleyez --version) - Operating system and version
- Steps to reproduce
- Error messages (screenshots or copy/paste)
- Expected vs actual behavior
Bug Report Template
**Description:**
[Brief description of the issue]
**Steps to Reproduce:**
1.
2.
3.
**Expected Behavior:**
[What should happen]
**Actual Behavior:**
[What actually happens]
**Environment:**
- OS:
- Python:
- SoulEyez version:
**Screenshots/Logs:**
[If applicable]
Feature Requests
We welcome feature suggestions! Please prefix your issue title with [Feature Request].
Security Vulnerabilities
For security-related issues, please do NOT open a public GitHub issue.
Contact: cysoul.secit@gmail.com
Or see SECURITY.md for our security policy.
Beta Feedback Survey
Help us improve SoulEyez by completing our quick feedback survey:
Beta Testing Guidelines
What We Need Tested
- Full workflow: Create engagement → Add hosts → Run scans → Record findings → Generate report
- Credential encryption/decryption cycle
- Multi-user collaboration features
- Tool parsers (especially edge cases)
- Auto-chaining behavior
- Report generation quality
- UI responsiveness and navigation
What to Avoid
- Don't test on production networks without authorization
- Don't store real client data in the beta (use test data)
- Don't share your vault password
Support
- Email: cysoul.secit@gmail.com
- Built-in Help: Run
souleyez --helporsouleyez <command> --help - Diagnostics: Run
souleyez doctorto check your setup
Glossary (New to Pentesting?)
| Term | Meaning |
|---|---|
| Engagement | A project or assessment - contains all data for one test |
| Target/Host | A computer, server, or device you're testing |
| Service | A program running on a port (like a web server on port 80) |
| Finding | A security issue or vulnerability you discovered |
| Credential | Username/password combo found during testing |
| Port | A numbered "door" on a computer where services listen (e.g., 22=SSH, 80=HTTP) |
| Nmap | Network scanner - finds open ports and services |
| Gobuster | Directory scanner - finds hidden web pages |
| SQLMap | Automatically tests for SQL injection vulnerabilities |
| Metasploit | Framework for running exploits (PRO feature) |
Thank You!
Your feedback is invaluable in making SoulEyez better. Every bug report, feature suggestion, and piece of feedback helps us build a tool that truly serves the security community.
Happy hacking! 🛡️
Version: 2.0.14 | Release Date: December 2025 | Maintainer: CyberSoul Security
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file souleyez-2.0.14.tar.gz.
File metadata
- Download URL: souleyez-2.0.14.tar.gz
- Upload date:
- Size: 1.2 MB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
b89b0a8d3af96c39b5bc976b702ee035c3f4da9c05767d5cd41d9b79cf8e0a88
|
|
| MD5 |
ee770ad7f443dd49880120cd410e7bd1
|
|
| BLAKE2b-256 |
387324211bf2cf6d334c994ba7e84cc602dbc4db1ec17df882211be25cb7c0a9
|
Provenance
The following attestation bundles were made for souleyez-2.0.14.tar.gz:
Publisher:
publish-pypi.yml on cyber-soul-security/SoulEyez
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
souleyez-2.0.14.tar.gz -
Subject digest:
b89b0a8d3af96c39b5bc976b702ee035c3f4da9c05767d5cd41d9b79cf8e0a88 - Sigstore transparency entry: 779995371
- Sigstore integration time:
-
Permalink:
cyber-soul-security/SoulEyez@ac93f69d20fe5d6456e21f3cad5fe2abdf79dbee -
Branch / Tag:
refs/tags/v2.0.14 - Owner: https://github.com/cyber-soul-security
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@ac93f69d20fe5d6456e21f3cad5fe2abdf79dbee -
Trigger Event:
release
-
Statement type:
File details
Details for the file souleyez-2.0.14-py3-none-any.whl.
File metadata
- Download URL: souleyez-2.0.14-py3-none-any.whl
- Upload date:
- Size: 1.4 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
727d1379fe8f6720921c609ad0e8838715c77df8fb5732325c2889a9cfa010e4
|
|
| MD5 |
d3d15fdb2f88002e6f20793e59586f8f
|
|
| BLAKE2b-256 |
e5b701551759dfa87ef58b56d035c5701b0ec1903dfc2e00febaad7a2cdf8e82
|
Provenance
The following attestation bundles were made for souleyez-2.0.14-py3-none-any.whl:
Publisher:
publish-pypi.yml on cyber-soul-security/SoulEyez
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
souleyez-2.0.14-py3-none-any.whl -
Subject digest:
727d1379fe8f6720921c609ad0e8838715c77df8fb5732325c2889a9cfa010e4 - Sigstore transparency entry: 779995374
- Sigstore integration time:
-
Permalink:
cyber-soul-security/SoulEyez@ac93f69d20fe5d6456e21f3cad5fe2abdf79dbee -
Branch / Tag:
refs/tags/v2.0.14 - Owner: https://github.com/cyber-soul-security
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@ac93f69d20fe5d6456e21f3cad5fe2abdf79dbee -
Trigger Event:
release
-
Statement type: