{"id":32460353,"url":"https://github.com/cybersecurityup/neurosploit","last_synced_at":"2026-01-17T17:41:08.204Z","repository":{"id":310291705,"uuid":"1039350096","full_name":"CyberSecurityUP/NeuroSploit","owner":"CyberSecurityUP","description":"NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive security operations. Leveraging the capabilities of large language models (LLMs).","archived":false,"fork":false,"pushed_at":"2026-01-14T19:23:24.000Z","size":1923,"stargazers_count":620,"open_issues_count":2,"forks_count":176,"subscribers_count":9,"default_branch":"main","last_synced_at":"2026-01-14T22:59:14.457Z","etag":null,"topics":["ai-agents","cybersecurity","framework","hacking","llm","pentesting"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/CyberSecurityUP.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2025-08-17T02:58:58.000Z","updated_at":"2026-01-14T19:00:12.000Z","dependencies_parsed_at":"2025-12-19T06:03:48.558Z","dependency_job_id":null,"html_url":"https://github.com/CyberSecurityUP/NeuroSploit","commit_stats":null,"previous_names":["cybersecurityup/neurosploit"],"tags_count":3,"template":false,"template_full_name":null,"purl":"pkg:github/CyberSecurityUP/NeuroSploit","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CyberSecurityUP%2FNeuroSploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CyberSecurityUP%2FNeuroSploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CyberSecurityUP%2FNeuroSploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CyberSecurityUP%2FNeuroSploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/CyberSecurityUP","download_url":"https://codeload.github.com/CyberSecurityUP/NeuroSploit/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/CyberSecurityUP%2FNeuroSploit/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28513972,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-17T13:38:16.342Z","status":"ssl_error","status_checked_at":"2026-01-17T13:37:44.060Z","response_time":85,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ai-agents","cybersecurity","framework","hacking","llm","pentesting"],"created_at":"2025-10-26T11:56:17.858Z","updated_at":"2026-01-17T17:41:08.192Z","avatar_url":"https://github.com/CyberSecurityUP.png","language":"Python","readme":"# NeuroSploit v2\n\n![NeuroSploitv2](https://img.shields.io/badge/NeuroSploitv2-AI--Powered%20Pentesting-blueviolet)\n![Version](https://img.shields.io/badge/Version-2.0.0-blue)\n![License](https://img.shields.io/badge/License-MIT-green)\n![Python](https://img.shields.io/badge/Python-3.8+-yellow)\n\n**AI-Powered Penetration Testing Framework with Adaptive Intelligence**\n\nNeuroSploit v2 is an advanced security assessment framework that combines reconnaissance tools with adaptive AI analysis. It intelligently collects data, analyzes attack surfaces, and performs targeted security testing using LLM-powered decision making.\n\n---\n\n## What's New in v2\n\n- **Adaptive AI Mode** - AI automatically determines if context is sufficient; runs tools only when needed\n- **3 Execution Modes** - CLI, Interactive, and guided Experience/Wizard mode\n- **Consolidated Recon** - All reconnaissance outputs merged into a single context file\n- **Context-Based Analysis** - Analyze pre-collected recon data without re-running tools\n- **Professional Reports** - Auto-generated HTML reports with charts and findings\n\n---\n\n## Table of Contents\n\n- [Features](#features)\n- [Installation](#installation)\n- [Quick Start](#quick-start)\n- [3 Execution Modes](#3-execution-modes)\n- [Workflow](#workflow)\n- [Adaptive AI Mode](#adaptive-ai-mode)\n- [Configuration](#configuration)\n- [CLI Reference](#cli-reference)\n- [Agent Roles](#agent-roles)\n- [Built-in Tools](#built-in-tools)\n- [Output Files](#output-files)\n- [Examples](#examples)\n- [Architecture](#architecture)\n- [Security Notice](#security-notice)\n\n---\n\n## Features\n\n### Core Capabilities\n\n| Feature | Description |\n|---------|-------------|\n| **Adaptive AI** | Automatically runs tools when context is insufficient |\n| **Multi-Mode** | CLI, Interactive, and Wizard execution modes |\n| **Consolidated Recon** | All tool outputs merged into single context file |\n| **Multi-LLM Support** | Claude, OpenAI, Gemini, Ollama, LM Studio |\n| **Professional Reports** | HTML reports with charts and findings |\n| **Extensible** | Custom agents, tools, and prompts |\n\n### Security Testing\n\n| Category | Tests |\n|----------|-------|\n| **Injection** | SQL Injection, XSS, Command Injection, Template Injection |\n| **File Attacks** | LFI, Path Traversal, File Upload, XXE |\n| **Server-Side** | SSRF, RCE, Deserialization |\n| **Authentication** | Auth Bypass, IDOR, Session Issues, JWT |\n| **Reconnaissance** | Subdomain Enum, Port Scan, Tech Detection, URL Collection |\n\n### Reconnaissance Tools\n\n| Tool | Purpose |\n|------|---------|\n| subfinder, amass, assetfinder | Subdomain enumeration |\n| httpx, httprobe | HTTP probing |\n| gau, waybackurls, waymore | URL collection |\n| katana, gospider | Web crawling |\n| naabu, nmap | Port scanning |\n| nuclei | Vulnerability scanning |\n\n---\n\n## Installation\n\n### Prerequisites\n\n```bash\n# Python 3.8+\npython3 --version\n\n# Install dependencies\npip3 install -r requirements.txt\n```\n\n### Setup\n\n```bash\n# Clone repository\ngit clone https://github.com/CyberSecurityUP/NeuroSploit\ncd NeuroSploitv2\n\n# Create config from example\ncp config/config-example.json config/config.json\n\n# Edit with your LLM API keys\nnano config/config.json\n\n# Create required directories\nmkdir -p results reports logs\n\n# Install security tools (recommended)\npython3 neurosploit.py --install-tools\n```\n\n### Environment Variables\n\n```bash\n# Set in .bashrc, .zshrc, or .env\nexport ANTHROPIC_API_KEY=\"your_key\"\nexport OPENAI_API_KEY=\"your_key\"\nexport GEMINI_API_KEY=\"your_key\"\n```\n\n---\n\n## Quick Start\n\n### Option 1: Wizard Mode (Recommended for beginners)\n\n```bash\npython3 neurosploit.py -e\n```\n\nFollow the guided prompts to configure your scan.\n\n### Option 2: Two-Step Workflow\n\n```bash\n# Step 1: Run reconnaissance\npython3 neurosploit.py --recon example.com\n\n# Step 2: AI analysis\npython3 neurosploit.py --input \"Find XSS and SQLi vulnerabilities\" \\\n  -cf results/context_*.json \\\n  --llm-profile claude_opus_default\n```\n\n### Option 3: Interactive Mode\n\n```bash\npython3 neurosploit.py -i\n```\n\n---\n\n## 3 Execution Modes\n\n### 1. CLI Mode\n\nDirect command-line execution with all parameters:\n\n```bash\n# Reconnaissance\npython3 neurosploit.py --recon example.com\n\n# AI Analysis with context\npython3 neurosploit.py --input \"Analyze for XSS and SQLi\" \\\n  -cf results/context_X.json \\\n  --llm-profile claude_opus_default\n\n# Full pentest scan\npython3 neurosploit.py --scan https://example.com\n\n# Quick scan\npython3 neurosploit.py --quick-scan https://example.com\n```\n\n### 2. Interactive Mode (`-i`)\n\nREPL interface with tab completion:\n\n```bash\npython3 neurosploit.py -i\n```\n\n```\n        ╔═══════════════════════════════════════════════════════════╗\n        ║         NeuroSploitv2 - AI Offensive Security             ║\n        ║                  Interactive Mode                         ║\n        ╚═══════════════════════════════════════════════════════════╝\n\nNeuroSploit\u003e help\nNeuroSploit\u003e recon example.com\nNeuroSploit\u003e analyze results/context_X.json\nNeuroSploit\u003e scan https://example.com\nNeuroSploit\u003e experience\nNeuroSploit\u003e exit\n```\n\n**Available Commands:**\n\n| Command | Description |\n|---------|-------------|\n| `recon \u003ctarget\u003e` | Run full reconnaissance |\n| `analyze \u003cfile.json\u003e` | LLM analysis of context file |\n| `scan \u003ctarget\u003e` | Full pentest with tools |\n| `quick_scan \u003ctarget\u003e` | Fast essential checks |\n| `experience` / `wizard` | Start guided setup |\n| `set_agent \u003cname\u003e` | Set default agent role |\n| `set_profile \u003cname\u003e` | Set LLM profile |\n| `list_roles` | Show available agents |\n| `list_profiles` | Show LLM profiles |\n| `check_tools` | Check installed tools |\n| `install_tools` | Install required tools |\n| `discover_ollama` | Find local Ollama models |\n\n### 3. Experience/Wizard Mode (`-e`)\n\nGuided step-by-step configuration:\n\n```bash\npython3 neurosploit.py -e\n```\n\n```\n        ╔═══════════════════════════════════════════════════════════╗\n        ║       NEUROSPLOIT - EXPERIENCE MODE (WIZARD)              ║\n        ║           Step-by-step Configuration                      ║\n        ╚═══════════════════════════════════════════════════════════╝\n\n[STEP 1/6] Choose Operation Mode\n--------------------------------------------------\n  1. AI Analysis   - Analyze recon context with LLM (no tools)\n  2. Full Scan     - Run real pentest tools + AI analysis\n  3. Quick Scan    - Fast essential checks + AI analysis\n  4. Recon Only    - Run reconnaissance tools, save context\n\n[STEP 2/6] Set Target\n[STEP 3/6] Context File\n[STEP 4/6] LLM Profile\n[STEP 5/6] Agent Role\n[STEP 6/6] Custom Prompt\n\n============================================================\n  CONFIGURATION SUMMARY\n============================================================\n  Mode:         analysis\n  Target:       example.com\n  Context File: results/context_20240115.json\n  LLM Profile:  claude_opus_default\n  Agent Role:   bug_bounty_hunter\n  Prompt:       Find XSS and SQLi vulnerabilities...\n============================================================\n\n  Execute with this configuration? [Y/n]:\n```\n\n---\n\n## Workflow\n\n### Recommended Workflow\n\n```\n┌─────────────────┐     ┌─────────────────┐     ┌─────────────────┐\n│   STEP 1        │     │   STEP 2        │     │   STEP 3        │\n│   RECON         │────▶│   AI ANALYSIS   │────▶│   REPORT        │\n│                 │     │                 │     │                 │\n│ - Subdomains    │     │ - Adaptive AI   │     │ - HTML Report   │\n│ - URLs          │     │ - Auto-test     │     │ - JSON Results  │\n│ - Ports         │     │ - if needed     │     │ - Findings      │\n│ - Technologies  │     │                 │     │                 │\n└─────────────────┘     └─────────────────┘     └─────────────────┘\n```\n\n### Step 1: Reconnaissance\n\n```bash\npython3 neurosploit.py --recon example.com\n```\n\nRuns all discovery tools and consolidates output:\n\n- **Subdomain Enumeration**: subfinder, amass, assetfinder\n- **HTTP Probing**: httpx, httprobe\n- **URL Collection**: gau, waybackurls, waymore\n- **Web Crawling**: katana, gospider\n- **Port Scanning**: naabu, nmap\n- **Vulnerability Scanning**: nuclei\n\n**Output:** `results/context_YYYYMMDD_HHMMSS.json`\n\n### Step 2: AI Analysis\n\n```bash\npython3 neurosploit.py --input \"Test for SQL injection and XSS\" \\\n  -cf results/context_X.json \\\n  --llm-profile claude_opus_default\n```\n\nThe Adaptive AI:\n1. Analyzes your request\n2. Checks if context has sufficient data\n3. Runs additional tests if needed\n4. Provides comprehensive analysis\n\n---\n\n## Adaptive AI Mode\n\nThe AI automatically determines if context data is sufficient:\n\n```\n======================================================================\n  NEUROSPLOIT ADAPTIVE AI - BUG_BOUNTY_HUNTER\n======================================================================\n  Mode: Adaptive (LLM + Tools when needed)\n  Target: testphp.vulnweb.com\n  Context loaded with:\n    - Subdomains: 1\n    - URLs: 12085\n    - URLs with params: 10989\n======================================================================\n\n[PHASE 1] Analyzing Context Sufficiency\n--------------------------------------------------\n  [*] User wants: xss, sqli\n  [*] Data sufficient: No\n  [*] Missing: XSS test results, SQL injection evidence\n\n[PHASE 2] Collecting Missing Data\n--------------------------------------------------\n  [!] Context insufficient for: XSS test results\n  [*] Running tools to collect data...\n\n  [XSS] Running XSS tests...\n  [\u003e] curl: -s -k \"http://target.com/search?q=%3Cscript%3Ealert(1)%3C/script%3E\"\n  [!] FOUND: XSS\n\n  [SQLi] Running SQL Injection tests...\n  [\u003e] curl: -s -k \"http://target.com/product?id=1'\"\n  [!] FOUND: SQL Injection\n\n  [+] Ran 15 tool commands to fill context gaps\n\n[PHASE 3] AI Analysis\n--------------------------------------------------\n  [*] Generating final analysis with collected evidence...\n  [+] Analysis complete\n```\n\n### How It Works\n\n| Scenario | AI Action |\n|----------|-----------|\n| Context has XSS evidence | LLM-only analysis (no tools) |\n| Context missing XSS evidence | Run XSS tests, then analyze |\n| User asks for port scan | Check context, run nmap if missing |\n| General analysis request | Use available context data |\n\n### Supported Auto-Tests\n\nWhen context is insufficient, AI can automatically run:\n\n| Test | Trigger Keywords |\n|------|------------------|\n| XSS | xss, cross-site, reflected, stored |\n| SQLi | sqli, sql, injection, database |\n| LFI | lfi, file, inclusion, traversal |\n| SSRF | ssrf, server-side, request |\n| RCE | rce, command, execution, shell |\n| Crawl | crawl, discover, spider, urls |\n| Port Scan | port, scan, nmap, service |\n\n---\n\n## Configuration\n\n### config/config.json\n\n```json\n{\n  \"llm\": {\n    \"default_profile\": \"claude_opus_default\",\n    \"profiles\": {\n      \"claude_opus_default\": {\n        \"provider\": \"claude\",\n        \"model\": \"claude-sonnet-4-20250514\",\n        \"api_key\": \"${ANTHROPIC_API_KEY}\",\n        \"temperature\": 0.7,\n        \"max_tokens\": 8192,\n        \"guardrails_enabled\": true,\n        \"hallucination_mitigation_strategy\": \"grounding\"\n      },\n      \"ollama_local\": {\n        \"provider\": \"ollama\",\n        \"model\": \"llama3:8b\",\n        \"api_key\": \"\",\n        \"temperature\": 0.7\n      },\n      \"gpt_4o\": {\n        \"provider\": \"gpt\",\n        \"model\": \"gpt-4o\",\n        \"api_key\": \"${OPENAI_API_KEY}\",\n        \"temperature\": 0.7\n      }\n    }\n  },\n  \"agent_roles\": {\n    \"bug_bounty_hunter\": {\n      \"enabled\": true,\n      \"description\": \"Aggressive bug bounty hunting\",\n      \"llm_profile\": \"claude_opus_default\",\n      \"tools_allowed\": [\"subfinder\", \"nuclei\", \"sqlmap\"]\n    },\n    \"red_team_agent\": {\n      \"enabled\": true,\n      \"description\": \"Red team operations specialist\"\n    }\n  },\n  \"tools\": {\n    \"nmap\": \"/usr/bin/nmap\",\n    \"sqlmap\": \"/usr/bin/sqlmap\",\n    \"nuclei\": \"/usr/local/bin/nuclei\"\n  }\n}\n```\n\n### LLM Providers\n\n| Provider | Config Value | Notes |\n|----------|--------------|-------|\n| Claude (Anthropic) | `\"provider\": \"claude\"` | Best for security analysis |\n| OpenAI | `\"provider\": \"gpt\"` | GPT-4, GPT-4o |\n| Google | `\"provider\": \"gemini\"` | Gemini Pro |\n| Ollama | `\"provider\": \"ollama\"` | Local models |\n| LM Studio | `\"provider\": \"lmstudio\"` | Local with OpenAI API |\n\n---\n\n## CLI Reference\n\n```\nusage: neurosploit.py [-h] [--recon TARGET] [--context-file FILE]\n                      [--target TARGET] [--scan TARGET] [--quick-scan TARGET]\n                      [--install-tools] [--check-tools] [-r AGENT_ROLE] [-i]\n                      [-e] [--input INPUT] [--llm-profile LLM_PROFILE]\n\nNeuroSploitv2 - AI-Powered Penetration Testing Framework\n\nArguments:\n  --recon TARGET        Run FULL RECON on target\n  --context-file, -cf   Load recon context from JSON file\n  --target, -t          Specify target URL/domain\n  --scan TARGET         Run FULL pentest scan with tools\n  --quick-scan TARGET   Run QUICK pentest scan\n  --install-tools       Install required security tools\n  --check-tools         Check status of installed tools\n  -r, --agent-role      Agent role to execute (optional)\n  -i, --interactive     Start interactive mode\n  -e, --experience      Start wizard mode (guided setup)\n  --input               Input prompt for the AI agent\n  --llm-profile         LLM profile to use\n  --list-agents         List available agent roles\n  --list-profiles       List LLM profiles\n  -v, --verbose         Enable verbose output\n```\n\n---\n\n## Agent Roles\n\nPredefined agents in `config.json` with prompts in `prompts/`:\n\n| Agent | Description |\n|-------|-------------|\n| `bug_bounty_hunter` | Web app vulnerabilities, high-impact findings |\n| `red_team_agent` | Simulated attack campaigns |\n| `blue_team_agent` | Threat detection and response |\n| `exploit_expert` | Exploitation strategies and payloads |\n| `pentest_generalist` | Broad penetration testing |\n| `owasp_expert` | OWASP Top 10 assessment |\n| `malware_analyst` | Malware examination and IOCs |\n\n### Custom Agents\n\n1. Create prompt file: `prompts/my_agent.md`\n2. Add to config:\n\n```json\n\"agent_roles\": {\n  \"my_agent\": {\n    \"enabled\": true,\n    \"description\": \"My custom agent\",\n    \"llm_profile\": \"claude_opus_default\"\n  }\n}\n```\n\n---\n\n## Built-in Tools\n\n### Reconnaissance\n\n| Tool | File | Features |\n|------|------|----------|\n| OSINT Collector | `tools/recon/osint_collector.py` | IP resolution, tech detection, email patterns |\n| Subdomain Finder | `tools/recon/subdomain_finder.py` | CT logs, DNS brute-force |\n| DNS Enumerator | `tools/recon/dns_enumerator.py` | A, AAAA, MX, NS, TXT, CNAME |\n| Full Recon Runner | `tools/recon/recon_tools.py` | Orchestrates all recon tools |\n\n### Post-Exploitation\n\n| Tool | File | Features |\n|------|------|----------|\n| SMB Lateral | `tools/lateral_movement/smb_lateral.py` | Share enum, pass-the-hash |\n| SSH Lateral | `tools/lateral_movement/ssh_lateral.py` | SSH tunnels, key enum |\n| Cron Persistence | `tools/persistence/cron_persistence.py` | Linux persistence |\n| Registry Persistence | `tools/persistence/registry_persistence.py` | Windows persistence |\n\n---\n\n## Output Files\n\n| File | Location | Description |\n|------|----------|-------------|\n| Context JSON | `results/context_*.json` | Consolidated recon data |\n| Context TXT | `results/context_*.txt` | Human-readable context |\n| Campaign JSON | `results/campaign_*.json` | Full execution results |\n| HTML Report | `reports/report_*.html` | Professional report with charts |\n\n### HTML Report Features\n\n- Executive summary\n- Severity statistics with charts\n- Risk score calculation\n- Vulnerability details with PoCs\n- Remediation recommendations\n- Modern dark theme UI\n\n---\n\n## Examples\n\n### Basic Recon\n\n```bash\n# Domain recon\npython3 neurosploit.py --recon example.com\n\n# URL recon\npython3 neurosploit.py --recon https://example.com\n```\n\n### AI Analysis\n\n```bash\n# Specific vulnerability analysis\npython3 neurosploit.py --input \"Find SQL injection and XSS vulnerabilities. Provide PoC with CVSS scores.\" \\\n  -cf results/context_20240115.json \\\n  --llm-profile claude_opus_default\n\n# Comprehensive assessment\npython3 neurosploit.py --input \"Perform comprehensive security assessment. Analyze attack surface, test for OWASP Top 10, prioritize critical findings.\" \\\n  -cf results/context_X.json\n```\n\n### Pentest Scan\n\n```bash\n# Full scan with context\npython3 neurosploit.py --scan https://example.com -cf results/context_X.json\n\n# Quick scan\npython3 neurosploit.py --quick-scan https://example.com -r bug_bounty_hunter\n```\n\n### Wizard Mode\n\n```bash\npython3 neurosploit.py -e\n# Follow interactive prompts...\n```\n\n---\n\n## Architecture\n\n```\nNeuroSploitv2/\n├── neurosploit.py              # Main entry point\n├── config/\n│   ├── config.json             # Configuration\n│   └── config-example.json     # Example config\n├── agents/\n│   └── base_agent.py           # Adaptive AI agent\n├── core/\n│   ├── llm_manager.py          # LLM provider abstraction\n│   ├── context_builder.py      # Recon consolidation\n│   ├── pentest_executor.py     # Tool execution\n│   ├── report_generator.py     # Report generation\n│   └── tool_installer.py       # Tool installation\n├── tools/\n│   ├── recon/\n│   │   ├── recon_tools.py      # Advanced recon\n│   │   ├── osint_collector.py  # OSINT gathering\n│   │   ├── subdomain_finder.py # Subdomain enum\n│   │   └── dns_enumerator.py   # DNS enumeration\n│   ├── lateral_movement/\n│   │   ├── smb_lateral.py      # SMB techniques\n│   │   └── ssh_lateral.py      # SSH techniques\n│   └── persistence/\n│       ├── cron_persistence.py # Linux persistence\n│       └── registry_persistence.py # Windows persistence\n├── prompts/\n│   ├── library.json            # Prompt library\n│   └── *.md                    # Agent prompts\n├── results/                    # Output directory\n├── reports/                    # Generated reports\n└── logs/                       # Log files\n```\n\n---\n\n## Security Features\n\n- **Secure Tool Execution**: `shlex` parsing, no shell injection\n- **Input Validation**: Tool paths and arguments validated\n- **Timeout Protection**: 60-second default timeout\n- **Permission System**: Agent-based tool access control\n- **Error Handling**: Comprehensive logging\n\n---\n\n## Troubleshooting\n\n### LLM Connection Issues\n\n```bash\n# Check API key\necho $ANTHROPIC_API_KEY\n\n# Test with local Ollama\npython3 neurosploit.py -i\nNeuroSploit\u003e discover_ollama\n```\n\n### Missing Tools\n\n```bash\n# Check status\npython3 neurosploit.py --check-tools\n\n# Install\npython3 neurosploit.py --install-tools\n```\n\n### Permission Issues\n\n```bash\nmkdir -p results reports logs\nchmod 755 results reports logs\n```\n\n---\n\n## Security Notice\n\n**This tool is for authorized security testing only.**\n\n- Only test systems you own or have written permission to test\n- Follow responsible disclosure practices\n- Comply with all applicable laws and regulations\n- Unauthorized access to computer systems is illegal\n\n---\n\n## License\n\nMIT License - See [LICENSE](LICENSE) for details.\n\n---\n\n## Contributing\n\n1. Fork the repository\n2. Create a feature branch\n3. Submit a pull request\n\n---\n\n## Acknowledgements\n\n### LLM Providers\n- Anthropic Claude\n- OpenAI GPT\n- Google Gemini\n- Ollama\n- LM Studio\n\n### Security Tools\n- Nmap, Nuclei, SQLMap\n- Subfinder, Amass, httpx\n- Katana, Gospider, gau\n\n---\n\n**NeuroSploit v2** - *Intelligent Adaptive Security Testing*\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurityup%2Fneurosploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcybersecurityup%2Fneurosploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcybersecurityup%2Fneurosploit/lists"}