Skip to main content

AI-powered terminal assistant with production-ready code generation and security scanning

Project description

TermiGPT v2.0.0 ๐Ÿ›ก๏ธ AI-Powered Security Research Terminal Assistant Professional tool for cybersecurity researchers, penetration testers, and security students. Combines AI intelligence with security automation for reconnaissance, exploitation, and reporting.

๐ŸŽฏ Features ๐Ÿ” Security Research Capabilities

Reconnaissance - Automated subdomain enumeration, port scanning, service detection Payload Generation - Create exploit code, reverse shells, custom scripts Vulnerability Scanning - Automated vulnerability assessment with AI analysis VAPT Reporting - Generate professional penetration testing reports with CVEs OSINT Integration - Threat intelligence correlation and IP reputation checks Tool Management - Install and configure security tools (nmap, subfinder, nuclei, etc.)

๐Ÿค– AI-Powered Assistance

5 AI Models - GPT-4o, GPT-4o Mini, GPT-4 Turbo, Perplexity, Mistral Production Code - Generate complete, working security tools and scripts Learning Mode - Explains commands, CVEs, and security concepts Real-time Guidance - Command syntax help, tool flag explanations Adaptive Intelligence - Supports beginners to advanced users

๐Ÿ› ๏ธ Advanced Features

Session Management - Command history, resume sessions Piped Input - cat file.txt | termi -p "analyze" Multi-format Output - Reports in text, JSON, HTML, PDF Auto-Install - Automatically installs missing dependencies Ethical Safeguards - Built-in ethical use reminders Cross-Platform - Works on Linux, macOS, Windows, Termux

๐Ÿš€ Installation bashpip install termingpt Post-Install After installation, you'll see a welcome banner with all commands and examples. ๐Ÿ“‹ Quick Start Interactive Mode (Recommended) bashtermi Direct Commands bash# Reconnaissance termi recon example.com termi enum subdomains of target.com

Payload Generation

termi create a Python port scanner with threading termi code a PowerShell reverse shell for 192.168.1.10:4444

Security Scanning

termi scan target.com termi vuln-scan https://example.com

Tool Management

termi list-tools termi install-tool recon

Reporting

termi report generate from last scan

AI Chat

termi ask "explain CVE-2024-1234" termi ask "what is MITRE ATT&CK" ๐Ÿ“š Complete Command Reference Core Commands CommandDescriptionExampletermiInteractive modetermitermi helpShow help menutermi helptermi --continueResume last sessiontermi --continue Reconnaissance CommandDescriptionExamplerecon Full reconnaissance workflowtermi recon example.comenum Subdomain enumerationtermi enum target.comportscan Port scanningtermi portscan 192.168.1.1 Code Generation CommandDescriptionExamplecreate

subfinder - Fast subdomain discovery amass - In-depth DNS enumeration httpx - Fast HTTP probe nuclei - Fast vulnerability scanner

Scanning

nmap - Network exploration and security scanner masscan - Fast TCP port scanner rustscan - Modern fast port scanner

Exploitation

metasploit - Penetration testing framework sqlmap - Automatic SQL injection tool

Wireless

aircrack-ng - WiFi security auditing tools

Web

gobuster - Directory/file & DNS busting ffuf - Fast web fuzzer wpscan - WordPress security scanner

๐Ÿ’ก Usage Examples Example 1: Reconnaissance Workflow bash$ termi recon example.com

๐Ÿ” RECONNAISSANCE: example.com

AI Reconnaissance Plan:

  1. Subdomain Enumeration Tools: subfinder, amass Expected: 10-50 subdomains

  2. Port Scanning Tools: nmap, rustscan Ports: 1-1000 common ports

  3. Service Detection Command: nmap -sV -sC target Look for: Version info, vulnerabilities

  4. DNS Analysis Records: A, AAAA, MX, TXT, NS Tools: dig, nslookup

  5. OSINT Gathering Sources: WHOIS, certificate transparency Look for: Email addresses, infrastructure Example 2: Generate Exploit Code bash$ termi create a Python reverse shell for 192.168.1.10:4444

๐Ÿ”ง Generating Security Tool

โš ๏ธ Reminder: For authorized security testing only

๐Ÿ“ Project: python-reverse-shell

โœ… reverse_shell.py โœ… requirements.txt โœ… README.md โœ… .gitignore

โœ… SUCCESS! 4 files created ๐Ÿ“ Location: ./python-reverse-shell ๐Ÿ’ก Next: cd python-reverse-shell && cat README.md Example 3: Security Scan with AI Analysis bash$ termi scan target.com

๐Ÿ”’ SECURITY SCAN: target.com

๐ŸŽฏ Scan Types:

  1. Quick Scan (Top ports)
  2. Full Scan (1-1000)
  3. Comprehensive (1-65535)
  4. DNS Analysis
  5. Service Detection

Select (1-5): 1

๐Ÿ” Scanning 15 ports... โœ“ Found: 22/SSH โœ“ Found: 80/HTTP โœ“ Found: 443/HTTPS

Found 3 open ports

๐Ÿค– Generating AI security assessment...

๐Ÿ›ก๏ธ AI SECURITY ASSESSMENT

Executive Summary: Target shows standard web services with SSH management access. Overall security posture: MEDIUM risk.

Key Findings:

  • Port 22 (SSH) exposed - potential RISK
  • Standard web ports (80, 443) functional
  • HTTPS enabled - SECURE

Risk Assessment:

  1. SSH Exposure - MEDIUM Recommendations: Implement fail2ban, use key authentication

  2. HTTP to HTTPS redirect - Check required Recommendations: Ensure proper redirect configuration

Vulnerabilities:

  • Potential brute force on SSH (Port 22)
  • Check for outdated SSL/TLS versions

Recommendations:

  1. Implement SSH key authentication
  2. Configure fail2ban for brute force protection
  3. Verify HTTPS configuration and certificates
  4. Regular security updates Example 4: Tool Installation bash$ termi install-tool recon

๐Ÿ“ฆ Available Tool Categories:

Recon: โŒ subfinder: Fast subdomain discovery tool โŒ amass: In-depth DNS enumeration โœ… httpx: Fast HTTP probe utility โŒ nuclei: Fast vulnerability scanner

Select category (or 'cancel'): recon

Tools to install:

  1. subfinder: Fast subdomain discovery tool โŒ Not installed
  2. amass: In-depth DNS enumeration โŒ Not installed
  3. httpx: Fast HTTP probe utility โœ… Already installed
  4. nuclei: Fast vulnerability scanner โŒ Not installed

Select tool number (or 'all'): 1

Installing subfinder... โœ… subfinder installed successfully Example 5: Generate VAPT Report bash$ termi report

๐Ÿ“Š GENERATING VAPT REPORT

Enter scan findings or path to scan file: ./scan_results.txt

๐Ÿค– AI analyzing โœ…

PROFESSIONAL PENETRATION TEST REPORT

Executive Summary: Assessment performed on target.com revealed 3 findings of varying severity...

Methodology:

  • Port scanning using Nmap 7.94
  • Service enumeration with version detection
  • Manual vulnerability verification

Findings:

  1. [CRITICAL] SQL Injection - /admin/login.php CVE: N/A (Application-specific) Description: SQL injection vulnerability in login form Impact: Full database compromise possible Remediation: Implement parameterized queries

  2. [HIGH] Outdated Apache Version CVE: CVE-2024-1234 Description: Apache 2.4.41 running with known vulnerabilities Impact: Remote code execution possible Remediation: Update to Apache 2.4.58+

  3. [MEDIUM] Directory Listing Enabled CVE: N/A (Configuration issue) Description: /backup/ directory listing exposed Impact: Information disclosure Remediation: Disable directory listing in Apache config

Risk Ratings:

  • CRITICAL: 1 finding
  • HIGH: 1 finding
  • MEDIUM: 1 finding
  • LOW: 0 findings

Recommendations:

  1. Immediate patching of critical SQL injection
  2. Update Apache to latest stable version
  3. Review and harden web server configuration
  4. Implement Web Application Firewall (WAF)
  5. Regular security assessments

Conclusion: Target requires immediate attention for critical findings...

โœ… Report saved to: vapt_report_20251018_152900.txt Example 6: Piped Input Analysis bash$ cat nmap_scan.xml | termi -p "analyze for vulnerabilities"

๐Ÿค– AI analyzing

NMAP SCAN ANALYSIS

Detected Services:

  1. SSH (Port 22) - OpenSSH 7.6p1 Status: Outdated version Risk: MEDIUM CVE: CVE-2018-15473 (User enumeration)

  2. HTTP (Port 80) - Apache 2.4.41 Status: Vulnerable Risk: HIGH CVE: CVE-2024-1234 (RCE possible)

  3. MySQL (Port 3306) - MySQL 5.7.30 Status: Externally accessible Risk: CRITICAL Issue: Database should not be internet-facing

Recommendations:

  1. Update all services to latest versions
  2. Restrict MySQL access to localhost only
  3. Implement fail2ban for SSH
  4. Configure WAF for web services ๐ŸŽ“ Learning Examples Explain Security Concepts bash$ termi ask "explain what is CVE-2024-1234" $ termi ask "what is MITRE ATT&CK framework" $ termi ask "explain nmap flags: -sV -A -T4" $ termi ask "difference between white box and black box testing" Tool-Specific Help bash$ termi ask "how to use Metasploit for Windows exploitation" $ termi ask "best practices for using sqlmap" $ termi ask "aircrack-ng commands for WPA2 cracking" โš ๏ธ Ethical Use Disclaimer TermiGPT is designed for authorized security testing only.

Always obtain written permission before testing any system Unauthorized access to computer systems is illegal Use this tool responsibly and ethically The authors are not responsible for misuse

๐Ÿ” Security & Privacy

No data is stored on external servers All API communication is encrypted Session data stored locally only No telemetry or tracking

๐Ÿค Contributing Contributions are welcome! Please feel free to submit a Pull Request. ๐Ÿ“„ License MIT License - see LICENSE file for details ๐Ÿ‘จโ€๐Ÿ’ป Author TheNooB

GitHub: https://github.com/thenoob4 GitHub: https://github.com/codelabwithosman

๐Ÿ†˜ Support

Issues: https://github.com/thenoob4/termingpt/issues Documentation: https://github.com/thenoob4/termingpt#readme

๐ŸŽฏ Requirements

Python 3.7+ Internet connection (Optional) Security tools for advanced features

๐Ÿ”„ Version History v2.0.0 (Current)

Professional security research focus Enhanced reconnaissance capabilities AI-powered vulnerability assessment VAPT report generation Tool management system Session persistence Improved error handling Piped input support

v1.0.0

Initial release Basic code generation Simple security scanning

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

termingpt-2.0.1.tar.gz (34.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

termingpt-2.0.1-py3-none-any.whl (18.8 kB view details)

Uploaded Python 3

File details

Details for the file termingpt-2.0.1.tar.gz.

File metadata

  • Download URL: termingpt-2.0.1.tar.gz
  • Upload date:
  • Size: 34.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.2

File hashes

Hashes for termingpt-2.0.1.tar.gz
Algorithm Hash digest
SHA256 eafb08d10403dd9103a69377d3456c6c2540adb5f7f217e13a539e819f9b0c21
MD5 763202dd3d3a048da605a9a6a3d379da
BLAKE2b-256 b9cf1ddbc31ea1eea98290198a29d5bfca457bd2b9fd42f33a60b311bfed7160

See more details on using hashes here.

File details

Details for the file termingpt-2.0.1-py3-none-any.whl.

File metadata

  • Download URL: termingpt-2.0.1-py3-none-any.whl
  • Upload date:
  • Size: 18.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.2

File hashes

Hashes for termingpt-2.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 e24b75e163348045fe5a15a619dc9bfda698122c853f0d3b34ffc3d8150fd319
MD5 21d7b5ed53501f6119fc61e3b4105ef6
BLAKE2b-256 e62f191f6495ced1ed3f08b309b39dc955782a0454af894e1161f1980462189f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page