Skip to main content

Advanced AI-Powered Penetration Testing Framework with Multi-Agent Orchestration

Project description

Zen-AI-Pentest

๐Ÿ›ก๏ธ Professional AI-Powered Penetration Testing Framework

Python

  • Guest Control: Execute tools inside isolated VMs

๐Ÿš€ Modern API & Backend

  • FastAPI: High-performance REST API
  • PostgreSQL: Persistent data storage
  • WebSocket: Real-time scan updates
  • JWT Auth: Role-based access control (RBAC)
  • Background Tasks: Async scan execution

๐Ÿ“Š Reporting & Notifications

  • PDF Reports: Professional findings reports
  • HTML Dashboard: Interactive web interface
  • Slack/Email: Instant notifications
  • JSON/XML: Integration with other tools

๐Ÿณ Easy Deployment

  • Docker Compose: One-command full stack deployment
  • CI/CD: GitHub Actions pipeline
  • Production Ready: Optimized for enterprise use

๐Ÿš€ Quick Start

Version Python License

PyPI Marketplace Docker Tests

CI Status Security PyPI Deploy Deployment Status

Authors Roadmap Architecture

๐Ÿš€ Security Status

CodeQL Security Score Dependencies codecov


๐Ÿ“š Table of Contents


๐ŸŽฏ Overview

Zen-AI-Pentest is an autonomous, AI-powered penetration testing framework that combines cutting-edge language models with professional security tools. Built for security professionals, bug bounty hunters, and enterprise security teams.

  graph TB
      subgraph "User Interface"
          CLI[CLI]
          API[REST API]
          WebUI[Web UI]
      end

      subgraph "Core Engine"
          Orchestrator[Agent Orchestrator]
          StateMachine[State Machine]
          RiskEngine[Risk Engine]
      end

      subgraph "AI Agents"
          Recon[Reconnaissance]
          Vuln[Vulnerability]
          Exploit[Exploit]
          Report[Report]
      end

      subgraph "Tools"
          Nmap[Nmap]
          SQLMap[SQLMap]
          Metasploit[Metasploit]
      end

      subgraph "External APIs"
          OpenAI[OpenAI]
          Anthropic[Anthropic]
          ThreatIntel[Threat Intelligence]
      end

      CLI --> API
      WebUI --> API
      API --> Orchestrator
      Orchestrator --> StateMachine
      StateMachine --> Recon
      StateMachine --> Vuln
      StateMachine --> Exploit
      Exploit --> OpenAI
      RiskEngine --> ThreatIntel

Key Highlights

  • ๐Ÿค– AI-Powered: Leverages state-of-the-art LLMs for intelligent decision making
  • ๐Ÿ”’ Security-First: Multiple safety controls and validation layers
  • ๐Ÿš€ Production-Ready: Enterprise-grade with CI/CD, monitoring, and support
  • ๐Ÿ“Š Comprehensive: 20+ integrated security tools
  • ๐Ÿ”ง Extensible: Plugin system for custom tools and integrations

โœจ Features

๐Ÿค– Autonomous AI Agent

  • ReAct Pattern: Reason โ†’ Act โ†’ Observe โ†’ Reflect
  • State Machine: IDLE โ†’ PLANNING โ†’ EXECUTING โ†’ OBSERVING โ†’ REFLECTING โ†’ COMPLETED
  • Memory System: Short-term, long-term, and context window management
  • Tool Orchestration: Automatic selection and execution of 20+ pentesting tools
  • Self-Correction: Retry logic and adaptive planning
  • Human-in-the-Loop: Optional pause for critical decisions

๐ŸŽฏ Risk Engine

  • False Positive Reduction: Multi-factor validation with Bayesian filtering
  • Business Impact: Financial, compliance, and reputation risk calculation
  • CVSS/EPSS Scoring: Industry-standard vulnerability assessment
  • Priority Ranking: Automated finding prioritization
  • LLM Voting: Multi-model consensus for accuracy

๐Ÿ”’ Exploit Validation

  • Sandboxed Execution: Docker-based isolated testing
  • Safety Controls: 4-level safety system (Read-Only to Full)
  • Evidence Collection: Screenshots, HTTP captures, PCAP
  • Chain of Custody: Complete audit trail
  • Remediation: Automatic fix recommendations

๐Ÿ“Š Benchmarking

  • Competitor Comparison: vs PentestGPT, AutoPentest, Manual
  • Test Scenarios: HTB machines, OWASP WebGoat, DVWA
  • Metrics: Time-to-find, coverage, false positive rate
  • Visual Reports: Charts and statistical analysis
  • CI Integration: Automated regression testing

๐Ÿ”— CI/CD Integration

  • GitHub Actions: Native action support
  • GitLab CI: Pipeline integration
  • Jenkins: Plugin and pipeline support
  • Output Formats: JSON, JUnit XML, SARIF
  • Notifications: Slack, JIRA, Email alerts
  • Exit Codes: Pipeline-friendly status codes

๐Ÿ› ๏ธ 20+ Integrated Tools

Category Tools
Network Nmap, Masscan, Scapy, Tshark
Web BurpSuite, SQLMap, Gobuster, OWASP ZAP
Exploitation Metasploit Framework
Brute Force Hydra, Hashcat
Reconnaissance Amass, Nuclei, TheHarvester
Active Directory BloodHound, CrackMapExec, Responder
Wireless Aircrack-ng Suite

โ˜๏ธ Multi-Cloud & Virtualization

  • Local: VirtualBox VM Management
  • Cloud: AWS EC2, Azure VMs, Google Cloud Compute
  • Snapshots: Automated clean-state workflows

Option 1: Docker (Recommended)

# Clone repository
git clone https://github.com/SHAdd0WTAka/zen-ai-pentest.git
cd zen-ai-pentest

# Copy and configure environment
cp .env.example .env
# Edit .env with your settings

# Start full stack
docker-compose up -d

# Access:
# Dashboard: http://localhost:3000
# API Docs:  http://localhost:8000/docs
# API:       http://localhost:8000

Option 2: Local Installation

# Install dependencies
pip install -r requirements.txt

# Initialize database
python database/models.py

# Start API server
python api/main.py

Option 3: VirtualBox VM Setup

# Automated Kali Linux setup
python scripts/setup_vms.py --kali

# Manual setup
# See docs/setup/VIRTUALBOX_SETUP.md

๐Ÿ“– Installation

For detailed installation instructions, see:


๐Ÿ’ป Usage

Python API

from agents.react_agent import ReActAgent, ReActAgentConfig

# Configure agent
config = ReActAgentConfig(
    max_iterations=10,
    use_vm=True,
    vm_name="kali-pentest"
)

# Create agent
agent = ReActAgent(config)

# Run autonomous scan
result = agent.run(
    target="example.com",
    objective="Comprehensive security assessment"
)

# Generate report
print(agent.generate_report(result))

REST API

# Authentication
curl -X POST http://localhost:8000/auth/login \
  -H "Content-Type: application/json" \
  -d '{"username":"admin","password":"admin"}'

# Create scan
curl -X POST http://localhost:8000/scans \
  -H "Authorization: Bearer $TOKEN" \
  -H "Content-Type: application/json" \
  -d '{
    "name":"Network Scan",
    "target":"192.168.1.0/24",
    "scan_type":"network",
    "config":{"ports":"top-1000"}
  }'

# Execute tool
curl -X POST http://localhost:8000/tools/execute \
  -H "Authorization: Bearer $TOKEN" \
  -d '{
    "tool_name":"nmap_scan",
    "target":"scanme.nmap.org",
    "parameters":{"ports":"22,80,443"}
  }'

# Generate report
curl -X POST http://localhost:8000/reports \
  -H "Authorization: Bearer $TOKEN" \
  -d '{
    "scan_id":1,
    "format":"pdf",
    "template":"default"
  }'

WebSocket (Real-Time)

const ws = new WebSocket('ws://localhost:8000/ws/scans/1');

ws.onmessage = (event) => {
  const data = JSON.parse(event.data);
  console.log('Scan update:', data);
};

๐Ÿ—๏ธ Architecture

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                    ZEN-AI-PENTEST v2.2 - System Architecture             โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚                                                                          โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”‚
โ”‚  โ”‚                    FRONTEND LAYER                                โ”‚    โ”‚
โ”‚  โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚   React      โ”‚  โ”‚  WebSocket   โ”‚  โ”‚   CLI Interface      โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚  Dashboard   โ”‚  โ”‚   Client     โ”‚  โ”‚   (Rich/Typer)       โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚    โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ”‚
โ”‚                                โ”‚                                         โ”‚
โ”‚                                โ–ผ                                         โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”‚
โ”‚  โ”‚                      API LAYER (FastAPI)                         โ”‚    โ”‚
โ”‚  โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚   Auth       โ”‚  โ”‚    Scans     โ”‚  โ”‚   Integrations       โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚   (JWT)      โ”‚  โ”‚   CRUD API   โ”‚  โ”‚   (GitHub/Slack)     โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚    โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ”‚
โ”‚                                โ”‚                                         โ”‚
โ”‚                                โ–ผ                                         โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”‚
โ”‚  โ”‚                    AUTONOMOUS LAYER                              โ”‚    โ”‚
โ”‚  โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚   ReAct      โ”‚  โ”‚   Memory     โ”‚  โ”‚   Exploit Validator  โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚   Loop       โ”‚  โ”‚   System     โ”‚  โ”‚   (Sandboxed)        โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚    โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ”‚
โ”‚                                โ”‚                                         โ”‚
โ”‚                                โ–ผ                                         โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”‚
โ”‚  โ”‚                    RISK ENGINE LAYER                             โ”‚    โ”‚
โ”‚  โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚   False      โ”‚  โ”‚   Business   โ”‚  โ”‚   CVSS/EPSS          โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚   Positive   โ”‚  โ”‚   Impact     โ”‚  โ”‚   Scoring            โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚    โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ”‚
โ”‚                                โ”‚                                         โ”‚
โ”‚                                โ–ผ                                         โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”‚
โ”‚  โ”‚                    TOOLS LAYER (20+)                             โ”‚    โ”‚
โ”‚  โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”   โ”‚    โ”‚
โ”‚  โ”‚  โ”‚ Network: Nmap | Masscan | Scapy | Tshark                โ”‚   โ”‚    โ”‚
โ”‚  โ”‚  โ”‚ Web: BurpSuite | SQLMap | Gobuster | Nuclei | ZAP       โ”‚   โ”‚    โ”‚
โ”‚  โ”‚  โ”‚ Exploit: Metasploit | SearchSploit | ExploitDB          โ”‚   โ”‚    โ”‚
โ”‚  โ”‚  โ”‚ AD: BloodHound | CrackMapExec | Responder               โ”‚   โ”‚    โ”‚
โ”‚  โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜   โ”‚    โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ”‚
โ”‚                                โ”‚                                         โ”‚
โ”‚                                โ–ผ                                         โ”‚
โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”‚
โ”‚  โ”‚                    DATA & REPORTING LAYER                        โ”‚    โ”‚
โ”‚  โ”‚  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚  PostgreSQL  โ”‚  โ”‚ Benchmarks   โ”‚  โ”‚   Report Generator   โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ”‚   (Main DB)  โ”‚  โ”‚ & Metrics    โ”‚  โ”‚   (PDF/HTML/JSON)    โ”‚  โ”‚    โ”‚
โ”‚  โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ”‚    โ”‚
โ”‚  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ”‚
โ”‚                                                                          โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

For detailed architecture documentation, see docs/ARCHITECTURE.md.


๐Ÿ“ก API Reference


๐Ÿ“ Project Structure

zen-ai-pentest/
โ”œโ”€โ”€ api/                        # FastAPI Backend
โ”‚   โ”œโ”€โ”€ main.py                # API Server
โ”‚   โ”œโ”€โ”€ schemas.py             # Pydantic Models
โ”‚   โ”œโ”€โ”€ auth.py                # JWT Authentication
โ”‚   โ””โ”€โ”€ websocket.py           # WebSocket Manager
โ”œโ”€โ”€ agents/                     # AI Agents
โ”‚   โ”œโ”€โ”€ react_agent.py         # ReAct Agent
โ”‚   โ””โ”€โ”€ react_agent_vm.py      # VM-based Agent
โ”œโ”€โ”€ autonomous/                 # Autonomous Agent System
โ”‚   โ”œโ”€โ”€ agent_loop.py          # ReAct Loop Engine
โ”‚   โ”œโ”€โ”€ exploit_validator.py   # Exploit Validation
โ”‚   โ”œโ”€โ”€ memory.py              # Memory Management
โ”‚   โ””โ”€โ”€ tool_executor.py       # Tool Execution
โ”œโ”€โ”€ risk_engine/               # Risk Analysis
โ”‚   โ”œโ”€โ”€ false_positive_engine.py
โ”‚   โ”œโ”€โ”€ business_impact_calculator.py
โ”‚   โ”œโ”€โ”€ cvss.py
โ”‚   โ””โ”€โ”€ epss.py
โ”œโ”€โ”€ benchmarks/                # Benchmark Framework
โ”‚   โ”œโ”€โ”€ run_benchmarks.py
โ”‚   โ””โ”€โ”€ comparison.py
โ”œโ”€โ”€ integrations/              # CI/CD Integrations
โ”‚   โ”œโ”€โ”€ github.py
โ”‚   โ”œโ”€โ”€ gitlab.py
โ”‚   โ”œโ”€โ”€ jira.py
โ”‚   โ”œโ”€โ”€ slack.py
โ”‚   โ””โ”€โ”€ jenkins.py
โ”œโ”€โ”€ database/                   # Database Layer
โ”‚   โ””โ”€โ”€ models.py              # SQLAlchemy Models
โ”œโ”€โ”€ tools/                      # Pentesting Tools
โ”‚   โ”œโ”€โ”€ nmap_integration.py
โ”‚   โ”œโ”€โ”€ sqlmap_integration.py
โ”‚   โ”œโ”€โ”€ metasploit_integration.py
โ”‚   โ””โ”€โ”€ ... (20+ tools)
โ”œโ”€โ”€ gui/                        # Web Interface
โ”‚   โ””โ”€โ”€ vm_manager_gui.py      # React Dashboard
โ”œโ”€โ”€ reports/                    # Report Generation
โ”‚   โ””โ”€โ”€ generator.py           # PDF/HTML/JSON
โ”œโ”€โ”€ notifications/              # Alerts
โ”‚   โ”œโ”€โ”€ slack.py
โ”‚   โ””โ”€โ”€ email.py
โ”œโ”€โ”€ docker/                     # Deployment
โ”‚   โ”œโ”€โ”€ Dockerfile
โ”‚   โ””โ”€โ”€ docker-compose.full.yml
โ”œโ”€โ”€ docs/                       # Documentation
โ”‚   โ”œโ”€โ”€ ARCHITECTURE.md
โ”‚   โ”œโ”€โ”€ INSTALLATION.md
โ”‚   โ”œโ”€โ”€ API.md
โ”‚   โ””โ”€โ”€ setup/
โ”œโ”€โ”€ tests/                      # Test Suite
โ””โ”€โ”€ scripts/                    # Setup Scripts

๐Ÿ”ง Configuration

Environment Variables

# Database
DATABASE_URL=postgresql://postgres:password@localhost:5432/zen_pentest

# Security
SECRET_KEY=your-secret-key-here
JWT_EXPIRATION=3600

# AI Providers
OPENAI_API_KEY=sk-...
ANTHROPIC_API_KEY=sk-ant-...

# Notifications
SLACK_WEBHOOK_URL=https://hooks.slack.com/...
SMTP_HOST=smtp.gmail.com

# Cloud Providers
AWS_ACCESS_KEY_ID=AKIA...
AZURE_SUBSCRIPTION_ID=...

See .env.example for all options.


๐Ÿงช Testing

# Run all tests
pytest

# With coverage
pytest --cov=. --cov-report=html

# Specific test file
pytest tests/test_react_agent.py -v

# Integration tests
pytest tests/integration/ -v

๐Ÿ“š Documentation


๐Ÿค Contributing

We welcome contributions! Please see:

Quick start:

  1. Fork the repository
  2. Create feature branch (git checkout -b feature/amazing-feature)
  3. Commit changes (git commit -m 'Add amazing feature')
  4. Push to branch (git push origin feature/amazing-feature)
  5. Open Pull Request

๐Ÿ’ฌ Support

Need help? We've got you covered:

See SUPPORT.md for detailed support options.


โš ๏ธ Disclaimer

IMPORTANT: This tool is for authorized security testing only. Always obtain proper permission before testing any system you do not own. Unauthorized access to computer systems is illegal.

  • Use only on systems you have explicit permission to test
  • Respect privacy and data protection laws
  • The authors assume no liability for misuse or damage

๐Ÿ“„ License

This project is licensed under the MIT License - see LICENSE file for details.


๐Ÿ™ Acknowledgments

  • LangGraph - Agent framework
  • FastAPI - Web framework
  • Kali Linux - Penetration testing distribution
  • All open-source security tool creators

๐Ÿ‘ฅ Authors & Team

Core Development Team

SHAdd0WTAka
@SHAdd0WTAka

Project Founder & Lead Developer
Security Architect
Kimi AI
Kimi AI

AI Development Partner
Architecture & Design

AI Contributors

  • Kimi AI (Moonshot AI) - Primary AI development partner
    • Led architecture design for autonomous agent loop
    • Implemented Risk Engine with false-positive reduction
    • Created CI/CD integration templates
    • Developed benchmarking framework
    • Co-authored documentation and roadmaps

Special Thanks

  • Grok (xAI) - Strategic analysis and competitive research
  • GitHub Copilot - Code assistance and suggestions
  • Security Community - Feedback, bug reports, and feature requests

๐Ÿ—บ๏ธ Roadmap

See ROADMAP_2026.md for our detailed 2026 roadmap.

Highlights:

  • Q1 2026: SIEM integrations, React Dashboard
  • Q2 2026: Mobile app, quantum-resistant crypto
  • Q3 2026: Multi-cloud native, serverless support
  • Q4 2026: Autonomous SOC capabilities

Made with โค๏ธ for the security community
ยฉ 2026 Zen-AI-Pentest. All rights reserved.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

zen_ai_pentest-2.3.5.tar.gz (407.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

zen_ai_pentest-2.3.5-py3-none-any.whl (320.1 kB view details)

Uploaded Python 3

File details

Details for the file zen_ai_pentest-2.3.5.tar.gz.

File metadata

  • Download URL: zen_ai_pentest-2.3.5.tar.gz
  • Upload date:
  • Size: 407.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.12

File hashes

Hashes for zen_ai_pentest-2.3.5.tar.gz
Algorithm Hash digest
SHA256 39563c104a33723ea2a70677ff8339769666559fb2fd521df458077894e1555e
MD5 e3ffa9eb2588ed3ccd75a79c867b7220
BLAKE2b-256 b4f16026047750d1c0cc90e2c66c781ef062481e0baecb8cf6d81bc8c924ca80

See more details on using hashes here.

File details

Details for the file zen_ai_pentest-2.3.5-py3-none-any.whl.

File metadata

  • Download URL: zen_ai_pentest-2.3.5-py3-none-any.whl
  • Upload date:
  • Size: 320.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.12

File hashes

Hashes for zen_ai_pentest-2.3.5-py3-none-any.whl
Algorithm Hash digest
SHA256 f07e252679733ef8f8523a47c3e0096d415d35417e283af1adb652455969f597
MD5 c6334071945d7e2e2c7b7f2803f3f27e
BLAKE2b-256 b5f77da050537794e85b94642ffdacffa4dbf43a1bdebc677195fceae6b3fc44

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page