AI-Powered Penetration Testing Platform with 40+ integrated tools
Project description
SoulEyez — AI-Powered Penetration Testing Platform
What is SoulEyez?
SoulEyez is your penetration testing command center. Instead of juggling dozens of terminal windows and text files, SoulEyez gives you one organized place to:
- Run security scans — Execute tools like Nmap, Gobuster, SQLMap with simple commands
- Auto-discover next steps — When one scan finds something interesting, SoulEyez automatically suggests (or runs) the next logical tool
- Stay organized — Keep all your targets, findings, and credentials in one searchable database
- Generate reports — Export professional reports when you're done
Who is this for?
- Security professionals conducting authorized penetration tests
- CTF players who want better organization during competitions
- Students learning penetration testing methodology
Important: Only use SoulEyez on systems you have explicit authorization to test. Unauthorized scanning or exploitation is illegal.
Features
Core Capabilities
- 🎯 Interactive Dashboard — Real-time engagement monitoring with live updates
- 🔗 Smart Tool Chaining — Automatic follow-up scans based on discoveries
- 📊 Findings Management — Track and categorize vulnerabilities by severity
- 🔑 Credential Vault — Encrypted storage for discovered credentials
- 🌐 Network Mapping — Host discovery and service enumeration
- 📈 Progress Tracking — Monitor scan completion and tool execution
- 💾 SQLite Storage — Local database for all engagement data
- 🔄 Background Jobs — Queue-based tool execution with status monitoring
Integrated Tools (40+)
- Reconnaissance: nmap, masscan, theHarvester, whois, dnsrecon
- Web Testing: nikto, gobuster, ffuf, sqlmap, nuclei, wpscan
- Enumeration: enum4linux-ng, smbmap, crackmapexec, snmpwalk
- Exploitation: Metasploit integration, searchsploit
- Password Attacks: hydra, hashcat, john
- Post-Exploitation: impacket suite, bloodhound
Pentest Workflow & Intelligence
- 📁 Evidence Vault — Unified artifact collection organized by PTES phases
- 🎯 Attack Surface Dashboard — Track what's exploited vs pending with priority scoring
- 💣 Exploit Suggestions — Automatic CVE/Metasploit recommendations for discovered services
- 🔗 Correlation Engine — Cross-phase attack tracking and gap analysis
- 📝 Report Generator — Professional reports in Markdown/HTML/PDF formats
- ✅ Deliverable Tracking — Manage testing requirements and acceptance criteria
- 📸 Screenshot Management — Organized visual evidence by methodology phase
SIEM Integration
- 🛡️ SIEM Connectors — Connect to Wazuh, Splunk, and other SIEM platforms
- ✓ Detection Validation — Verify if your attacks triggered SIEM alerts
- 🔍 Vulnerability Management — View CVEs from SIEM vulnerability data
- ⚖️ Gap Analysis — Compare passive (SIEM) vs active (scan) findings
- 🗺️ MITRE ATT&CK Reports — Detection coverage heatmaps by technique
- 📡 Real-time Alerts — Monitor SIEM alerts during live engagements
FREE vs PRO
| Feature | FREE | PRO |
|---|---|---|
| Core features (scans, findings, credentials) | ✅ | ✅ |
| Report generation | ✅ | ✅ |
| AI-powered suggestions & auto-chaining | ❌ | ✅ |
| Metasploit integration & exploit suggestions | ❌ | ✅ |
| SIEM integration & detection validation | ❌ | ✅ |
| MITRE ATT&CK reports | ❌ | ✅ |
Quick Start
Step 1: Install Prerequisites
sudo apt install pipx # Install pipx
pipx ensurepath # Add pipx apps to your PATH
source ~/.bashrc # Reload shell (Kali: use ~/.zshrc)
Step 2: Install SoulEyez
pipx install souleyez
Step 3: Launch SoulEyez
souleyez interactive
Step 4: First-Time Setup
On your first run, the setup wizard guides you through:
- Vault Password — Create a master password that encrypts sensitive data
- First Engagement — Set up your first project and select engagement type
- Tool Check — Detect and optionally install missing security tools
- AI Setup — Configure Ollama for AI features (optional)
- Tutorial — Option to run the interactive tutorial (recommended)
Step 5: You're Ready!
Once setup completes, you'll see the main menu.
System Requirements
| Component | Minimum | Recommended |
|---|---|---|
| OS | Ubuntu 22.04+ | Kali Linux |
| Python | 3.9+ | 3.11+ |
| RAM | 4GB | 8GB+ |
| Disk | 10GB | 50GB+ |
Supported Operating Systems
| OS | Status | Notes |
|---|---|---|
| Kali Linux | ✅ Recommended | All pentesting tools pre-installed |
| Ubuntu 22.04+ | ✅ Supported | Tools installed via souleyez setup |
| Parrot OS | ✅ Supported | Security-focused distro |
| Debian 12+ | ✅ Supported | Stable base system |
| macOS/Windows | ❌ Not Supported | Use Linux in a VM |
Common Commands
| Command | What it does |
|---|---|
souleyez interactive |
Launch the main interface |
souleyez dashboard |
Real-time monitoring view |
souleyez doctor |
Check if everything is set up correctly |
souleyez setup |
Install/update pentesting tools |
souleyez --help |
Show all available commands |
Security & Encryption
SoulEyez encrypts all stored credentials using Fernet (AES-128-CBC + HMAC-SHA256) with PBKDF2 key derivation (600k iterations).
- Master password is never stored (cannot be recovered if lost)
- Credentials encrypted at rest with industry-standard cryptography
- Sensitive data is masked in the UI until explicitly revealed
See SECURITY.md for complete security guidelines.
Documentation
- Getting Started — Your first engagement in 10 minutes
- Installation Guide — Detailed setup instructions
- Workflows — Complete pentesting workflows
- Auto-Chaining — Automatic follow-up scans
- Configuration — All configuration options
- Troubleshooting — Common issues and fixes
Troubleshooting
| Problem | Solution |
|---|---|
| "command not found: souleyez" | Run pipx ensurepath then restart terminal |
| "Tool not found" errors | Run souleyez setup to install missing tools |
| Forgot vault password | Data is encrypted — start fresh with rm -rf ~/.souleyez |
| Something seems broken | Run souleyez doctor to diagnose |
Glossary
New to pentesting? Here are some common terms:
| Term | Meaning |
|---|---|
| Engagement | A project or assessment — contains all data for one test |
| Target/Host | A computer, server, or device you're testing |
| Finding | A security issue or vulnerability you discovered |
| Credential | Username/password combo found during testing |
Support & Feedback
- Issues: https://github.com/cyber-soul-security/souleyez/issues
- Security Issues: cysoul.secit@gmail.com (see SECURITY.md)
- General: cysoul.secit@gmail.com
License
See LICENSE for details.
Version: 2.43.21 | Maintainer: CyberSoul Security
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file souleyez-3.0.49.tar.gz.
File metadata
- Download URL: souleyez-3.0.49.tar.gz
- Upload date:
- Size: 2.0 MB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
bf6ec5013054d1280ccb1afbdec2baa35d7288ec9c51e1718c1f5d2ef795a221
|
|
| MD5 |
d7ff685705203eb6d90dbb1bbe61731a
|
|
| BLAKE2b-256 |
aedc3cb492ce56126145552513f212b94deaae6d5dcb97db10e441e90ab606a6
|
Provenance
The following attestation bundles were made for souleyez-3.0.49.tar.gz:
Publisher:
python-ci.yml on cyber-soul-security/SoulEyez
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
souleyez-3.0.49.tar.gz -
Subject digest:
bf6ec5013054d1280ccb1afbdec2baa35d7288ec9c51e1718c1f5d2ef795a221 - Sigstore transparency entry: 1003737305
- Sigstore integration time:
-
Permalink:
cyber-soul-security/SoulEyez@c8af97adb1eced848ee570d67fcc6c6106789b9a -
Branch / Tag:
refs/heads/main - Owner: https://github.com/cyber-soul-security
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-ci.yml@c8af97adb1eced848ee570d67fcc6c6106789b9a -
Trigger Event:
push
-
Statement type:
File details
Details for the file souleyez-3.0.49-py3-none-any.whl.
File metadata
- Download URL: souleyez-3.0.49-py3-none-any.whl
- Upload date:
- Size: 2.2 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
b7e82f2c8a25cb2bf474451123fceb0d19e1b0160830220c55a551cf8352dd4f
|
|
| MD5 |
53cce12f1ebc2c1bd1a7952e88e23772
|
|
| BLAKE2b-256 |
eeca7bb49d3a0ace8e3288dee099bad7c7a210c622a31afb3cd5d117d94a1cfb
|
Provenance
The following attestation bundles were made for souleyez-3.0.49-py3-none-any.whl:
Publisher:
python-ci.yml on cyber-soul-security/SoulEyez
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
souleyez-3.0.49-py3-none-any.whl -
Subject digest:
b7e82f2c8a25cb2bf474451123fceb0d19e1b0160830220c55a551cf8352dd4f - Sigstore transparency entry: 1003737315
- Sigstore integration time:
-
Permalink:
cyber-soul-security/SoulEyez@c8af97adb1eced848ee570d67fcc6c6106789b9a -
Branch / Tag:
refs/heads/main - Owner: https://github.com/cyber-soul-security
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
python-ci.yml@c8af97adb1eced848ee570d67fcc6c6106789b9a -
Trigger Event:
push
-
Statement type: