Skip to content

πŸ›‘οΈAI-Powered Penetration Testing Platform with intelligent filtering, automated vulnerability testing, and Burp-style request inspector

License

Notifications You must be signed in to change notification settings

Keyvanhardani/Vulna

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Vulna v4.0 - AI-Powered Penetration Testing Platform

License: MIT Python 3.12+ GitHub stars LinkedIn

Next-Generation Penetration Testing Tool with AI-Driven Request Filtering and Automated Vulnerability Verification


πŸš€ What's New in v4.0

πŸ€– AI-Powered Smart Filtering

  • Intelligent URL Analysis: AI decides what to analyze vs filter
  • Learning System: Improves filtering based on user feedback
  • Context-Aware Decisions: Considers headers, methods, and content types
  • Dynamic CDN Detection: Automatically identifies and filters CDN/script providers

πŸ”¬ Automated Vulnerability Testing

  • PoC Generation: AI creates executable proof-of-concept code
  • Automatic Verification: Tests vulnerabilities to reduce false positives
  • Safe Execution: Harmless payloads that verify without causing damage
  • Real-Time Validation: Instant feedback on vulnerability accuracy

πŸ” Request Inspector (Burp-Style)

  • Side-by-Side Request View: Original vs Modified request comparison
  • Live Request Editing: Modify method, URL, headers, and body
  • Payload Injection: One-click XSS and SQL injection payloads
  • Export Capabilities: Generate cURL commands and Burp Suite format
  • Professional Workflow: Integrates seamlessly with penetration testing

πŸ“Š Enhanced Analytics

  • False Positive Tracking: Monitors accuracy rates
  • Verification Statistics: Shows confirmed vs unconfirmed vulnerabilities
  • AI Learning Metrics: Tracks filter improvement over time
  • Performance Insights: Detailed analysis of system efficiency

🎯 Quick Start

# Clone and setup
git clone https://github.com/Keyvanhardani/Vulna.git
cd Vulna

# Install dependencies
python -m venv vulna-env
vulna-env\Scripts\activate  # Windows
pip install -r requirements.txt

# Ensure Ollama is running
ollama pull qwen2.5-coder:latest

# Start Vulna
python -m backend.main

Dashboard: http://localhost:3000
Smart Browser: Click "Start Browser" for auto-proxy setup


✨ Core Features

🧠 Intelligent Filtering Pipeline

Incoming Request
      ↓
πŸ€– AI Smart Filter (Stage 1)
   β”œβ”€ FILTER β†’ Skip (CDN, scripts, analytics)
   └─ ANALYZE β†’ Continue
      ↓
πŸ” Function Calling Analysis (Stage 2)  
   β”œβ”€ High Priority β†’ AI Deep Analysis
   β”œβ”€ Medium Priority β†’ AI Standard Analysis
   └─ Low Priority β†’ Pattern Matching
      ↓
πŸ”¬ Automated Testing (Stage 3)
   β”œβ”€ Generate PoC β†’ Execute β†’ Verify
   └─ Update Confidence Based on Results

🎯 What Gets Automatically Filtered

AI-Identified Targets (FILTERED):

  • CDN Services: Google, Cloudflare, JScdn, Bootstrap CDN
  • Analytics: Google Analytics, Facebook Pixel, YouTube nocookie
  • Static Assets: .js, .css, images, fonts, media files
  • Social Widgets: Twitter, LinkedIn, Instagram embeds
  • Ad Networks: DoubleClick, AdSense, Amazon ads

Penetration Testing Targets (ANALYZED):

  • API Endpoints: /api/, /rest/, /graphql, /v1/
  • Admin Interfaces: /admin/, /management/, /dashboard/
  • Authentication: /login, /auth/, /signin, /oauth/
  • Dynamic Content: POST/PUT/DELETE methods, parameters
  • File Operations: /upload, /download, /files/

πŸ”¬ Automated Vulnerability Testing

Supported Test Types:

  • SQL Injection: Time-based and error-based testing
  • XSS: Reflection and DOM-based payload testing
  • IDOR: Parameter manipulation and access testing
  • Open Redirect: Safe redirect validation
  • File Upload: Extension and validation testing

Safety Features:

  • Harmless payloads only (no destructive tests)
  • 10-second execution timeout
  • Sandboxed PoC execution
  • Ethical testing guidelines

πŸ” Request Inspector (Burp-Style Functionality)

Professional Request Manipulation:

  • Side-by-Side View: Original vs Modified request comparison
  • Live Editing: Real-time modification of HTTP requests
  • Method Tampering: Change GET/POST/PUT/DELETE methods
  • Header Manipulation: Add/modify/remove HTTP headers
  • Body Editing: Modify request body and parameters

Payload Injection System:

  • XSS Payloads: One-click Cross-Site Scripting injection
  • SQL Payloads: Automated SQL injection payload insertion
  • Custom Payloads: Manual payload crafting and testing
  • Parameter Fuzzing: Automated parameter manipulation

Export & Integration:

  • cURL Generation: Export modified requests as cURL commands
  • Burp Suite Format: Export requests in Burp Suite compatible format
  • Request History: Track all modified requests and responses
  • Copy/Paste Integration: Easy integration with external tools

Professional Workflow:

1. Vulnerability Detection β†’ Auto-populate Request Inspector
2. Manual Request Modification β†’ Real-time preview
3. Payload Injection β†’ One-click vulnerability testing
4. Response Analysis β†’ Immediate feedback
5. Export β†’ cURL/Burp integration for further testing

🌐 Enhanced Dashboard Features

AI Actions Panel

Integrated Testing Interface:

[πŸ”¬ Generate PoC] [πŸ’¬ Chat with AI] [⚑ Auto Test] [πŸ” Analyze Exploitation]

Request Inspector Integration:

[πŸ” Request Inspector] - Burp-Style request manipulation
β”œβ”€ Original Request View    β”œβ”€ Modified Request Editor
β”œβ”€ [πŸ’‰ Add XSS Payload]    β”œβ”€ [πŸ’‰ Add SQL Payload] 
β”œβ”€ [πŸ“‹ Generate cURL]      └─ [πŸ”₯ Generate Burp]

AI Filter Statistics:

AI Filter Efficiency: 87%
Domains Learned: 1,247
False Positive Rate: 12%
Verification Rate: 73%

Real-Time Testing Status:

πŸ”¬ Auto-Testing: SQL Injection at /api/users
βœ… VERIFIED: XSS in search parameter  
❌ FALSE POSITIVE: IDOR claim debunked
πŸ” REQUEST INSPECTOR: Modified POST to /login

API Endpoints

Core Vulnerability Testing:

  • POST /api/vulnerability/{id}/test - Manual vulnerability testing
  • POST /api/vulnerability/{id}/auto-test - Automated comprehensive testing
  • POST /api/vulnerability/{id}/generate-poc - Generate proof-of-concept
  • POST /api/vulnerability/{id}/feedback - Provide accuracy feedback

Request Inspector APIs:

  • GET /api/vulnerability/{id}/request-data - Get original request data
  • POST /api/vulnerability/{id}/send-request - Send modified request
  • POST /api/vulnerability/{id}/export-curl - Export as cURL command
  • POST /api/vulnerability/{id}/export-burp - Export in Burp Suite format

Statistics & Analytics:

  • GET /api/stats/ai-filter - AI filtering statistics
  • GET /api/stats/testing - Vulnerability testing metrics
  • GET /api/stats/inspector - Request inspector usage metrics

πŸ“Š Enhanced Monitoring

Real-Time Statistics

Runtime: 300s | Proxy: 8081 | Dashboard: 3000
πŸ“₯ Requests: 234 analyzed, 1,456 AI-filtered (86% reduction)
πŸ€– AI Analysis: Deep: 45, Standard: 123, Pattern: 66
πŸ”¬ Auto-Testing: 23 tests, 17 verified, 6 false positives
🎯 Verified Vulnerabilities: 17 (73% accuracy)
⚑ False Positive Rate: 26% (improving)

Learning System Metrics

🧠 AI Filter Learning:
   - Filtered Domains: 1,247 unique
   - User Feedback: 89 corrections
   - Filter Accuracy: 87% (↑5% this session)
   - Top CDNs Detected: cloudflare.com, googleapis.com, jsdelivr.net

πŸ”§ Configuration

AI System Configuration

# In .env file
AI_SMART_FILTER=true
AUTO_VULNERABILITY_TESTING=true
AI_LEARNING_ENABLED=true
POC_EXECUTION_TIMEOUT=10
AI_FILTER_CACHE_SIZE=1000

Filtering Sensitivity

# Adjust AI filter confidence thresholds
AI_FILTER_THRESHOLD=0.7    # Higher = more strict
AUTO_TEST_THRESHOLD=0.6    # When to auto-test findings
LEARNING_RATE=0.1          # How fast AI adapts to feedback

πŸ§ͺ Testing the New Features

# Test AI filtering and vulnerability testing
cd tests
python test_new_features.py

# Expected output:
# βœ“ AI Smart Filter working
# βœ“ Vulnerability testing functional  
# βœ“ PoC generation successful
# βœ“ False positive detection active

🎯 Use Cases

For Penetration Testers

  • Reduced Noise: 85%+ fewer irrelevant requests to review
  • Verified Results: Automatic validation reduces false positives
  • Time Savings: Focus on real vulnerabilities, not CDN requests
  • Confidence Boost: PoC verification proves exploitability
  • Burp-Style Workflow: Familiar request manipulation interface
  • Export Integration: Seamless cURL and Burp Suite integration

For Security Teams

  • Accurate Reporting: Verified vulnerabilities with proof
  • Learning System: Improves accuracy over time
  • Efficiency Metrics: Track false positive reduction
  • Custom Feedback: Train AI for your specific environment
  • Request Documentation: Complete audit trail of all testing

For Bug Bounty Hunters

  • Fast Scanning: AI filters out noise automatically
  • PoC Ready: Exploitable vulnerabilities come with working proof
  • Quality Focus: Higher confidence in submitted findings
  • Time Optimization: Spend time exploiting, not filtering
  • Professional Tools: Request Inspector for advanced payload crafting
  • Quick Exports: Instant cURL generation for external tool integration

πŸ”„ System Architecture

Browser Traffic β†’ mitmproxy β†’ AI Smart Filter β†’ Function Calling Analysis
                                     ↓
                              πŸ€– AI Decision Engine
                                     ↓
              β”Œβ”€ FILTER (CDN/Static) ─┴─ ANALYZE (Security-Relevant) ─┐
              ↓                                                        ↓
         Skip Analysis                                    LLM Analysis β†’ Finding
                                                               ↓
                                                    πŸ”¬ Auto-Testing Engine
                                                               ↓
                                               PoC Generation β†’ Execution β†’ Verification
                                                               ↓
                    πŸ“Š Enhanced Finding + Test Results ← πŸ” Request Inspector
                                                               ↓
                                                  Manual Testing & Payload Injection
                                                               ↓
                                                    πŸ“‹ cURL Export | πŸ”₯ Burp Export

πŸ” Request Inspector Integration

Vulnerability Detection β†’ Auto-populate Request Inspector
            ↓
    β”Œβ”€ Original Request ─┬─ Modified Request ─┐
    β”‚                   β”‚                    β”‚
    β”‚  β€’ Method: GET    β”‚  β€’ Method: POST    β”‚
    β”‚  β€’ Headers        β”‚  β€’ Headers + Auth  β”‚
    β”‚  β€’ Parameters     β”‚  β€’ Injected Payloadsβ”‚
    β”‚                   β”‚                    β”‚
    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
              β”‚                   β”‚
              β–Ό                   β–Ό
        Read-Only View    Live Editing + Testing
                               ↓
                    β”Œβ”€ Send Request ─┬─ Export ─┐
                    β”‚                β”‚          β”‚
                    β–Ό                β–Ό          β–Ό
               Response        cURL Command  Burp Format
               Analysis        Generation    Export
                                                πŸ“Š Enhanced Finding + Test Results

---

## πŸ“ˆ Performance Improvements

- **Request Processing**: 85% noise reduction through AI filtering
- **False Positive Rate**: Reduced from ~40% to ~15% with auto-testing
- **Analysis Speed**: Faster processing due to intelligent filtering
- **Accuracy**: 73% verification rate for detected vulnerabilities
- **Learning**: System improves continuously from user feedback

---

## πŸ”— Migration from v3.0

**Automatic Migration**: 
- All existing filtering rules preserved
- Enhanced with AI decision-making
- Backward compatible with existing configurations
- New features enabled by default

**New Dependencies**:
- No additional requirements
- Uses existing Ollama installation
- Leverages current qwen2.5-coder model

---

## 🏒 Enterprise Features

### Data Privacy & Security
- **Complete On-Premise Deployment**: All processing happens within your infrastructure
- **No External Dependencies**: Optional cloud features with explicit opt-in only
- **Encrypted Local Storage**: SQLite database with AES encryption
- **Audit Trail**: Complete logging of all analysis activities

### Enterprise Support
- **Custom Integration**: API endpoints for CI/CD pipeline integration
- **Compliance Ready**: GDPR, SOC 2, and industry-specific compliance support
- **Professional Support**: SLA-backed technical support and consultation
- **Custom Training**: AI model training on your specific environment

### Deployment Options
- **Docker Container**: Fully containerized deployment
- **Kubernetes**: Production-ready K8s manifests included  
- **Air-Gapped**: Complete offline operation capability
- **Multi-Tenant**: Separate analysis environments per team

**Enterprise Inquiry**: Contact enterprise@keyvan.ai with your requirements.

---

**Keyvan Hardani** - AI Engineer specializing in AI Safety, Automotive & Cloud Cyber Security, and Test Automation.

- πŸ”— **LinkedIn**: [linkedin.com/in/keyvanhardani](https://linkedin.com/in/keyvanhardani)
- 🌐 **Website**: [keyvan.ai](https://keyvan.ai)  
- πŸ“§ **ORCID**: [0009-0000-6003-8826](https://orcid.org/0009-0000-6003-8826)
- πŸ“ **Location**: Munich, Germany

---

## πŸ“„ License

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

**Β© 2025 Keyvan Hardani. All rights reserved.**

---

## 🀝 Contributing

Contributions, issues, and feature requests are welcome! Feel free to check the [issues page](https://github.com/Keyvanhardani/Vulna/issues).

**Found this project helpful?** ⭐ Give it a star on GitHub!

---

**Vulna v4.0 - Intelligent, Verified, Efficient** πŸ›‘οΈ

*Where AI meets Penetration Testing*

Ready for next-generation security assessments!