https://github.com/xalgord/xalgorix
Xalgorix - The Most Powerful Open-Source AI Pentesting Agent
https://github.com/xalgord/xalgorix
ai ai-tools bug-bounty bugbounty cybersecurity security technology
Last synced: 3 days ago
JSON representation
Xalgorix - The Most Powerful Open-Source AI Pentesting Agent
- Host: GitHub
- URL: https://github.com/xalgord/xalgorix
- Owner: xalgord
- License: mit
- Created: 2026-03-13T08:56:13.000Z (2 months ago)
- Default Branch: main
- Last Pushed: 2026-04-07T15:55:41.000Z (about 1 month ago)
- Last Synced: 2026-04-07T16:32:43.566Z (about 1 month ago)
- Topics: ai, ai-tools, bug-bounty, bugbounty, cybersecurity, security, technology
- Language: Go
- Homepage: https://www.xalgorix.com
- Size: 460 MB
- Stars: 33
- Watchers: 1
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README

[](https://go.dev)
[](LICENSE)
[](https://buymeacoffee.com/xalgord)
The most powerful open-source AI autonomous pentesting agent.
---
## πΈ Screenshots
### Web UI Dashboard

### Live Feed & Vulnerabilities

### Vulnerability Details

### Chat Interface

---
## π Xalgorix β The Most Powerful Open-Source AI Pentesting Agent
**Xalgorix is the most comprehensive open-source autonomous penetration testing platform.** It combines the power of AI with 70+ security tools to deliver enterprise-grade pentesting β completely free.
### Why Xalgorix is #1
| Claim | Reality |
|-------|---------|
| **Most Complete** | β
Only open-source tool with Web UI + Live Feed + Chat + PDF + Discord |
| **Most Thorough** | β
3 scan modes + zero-day discovery: Single β DAST β Wildcard + behavioral fuzzing |
| **Most Automated** | β
Auto-installs tools, auto-generates PDF, auto-sends Discord alerts |
| **Most Flexible** | β
Works with any LLM (OpenAI, Anthropic, DeepSeek, **MiniMax β**, Google, Groq, Ollama) |
| **Most Production-Ready** | β
Rate limiting, circuit breaker, queue system, severity filtering |
| **Most Customizable** | β
Named scans, per-phase methodology selection, branded PDF reports with logo upload |
> **TL;DR:** Give it a target URL, and Xalgorix will find vulnerabilities, generate a professional PDF report, and send Discord alerts β all automatically.
### What Makes Xalgorix Different?
- **π Autonomous** β Give it a target, watch it work. No human intervention needed.
- **π§ AI-Powered** β Leverages LLMs for intelligent decision-making.
- **π 100% Free** β No SaaS, no per-scan fees, no limits.
- **π Self-Hosted** β Your data never leaves your machine.
- **β‘ Lightning Fast** β Uses maximum threads, comprehensive flags.
- **π― Precision** β Only reports exploitable vulnerabilities, not false positives.
- **π¬ Zero-Day Hunter** β Behavioral fuzzing, parser differentials, and timing side-channels to find novel vulns.
- **π‘οΈ Safe** β Blocks destructive commands, rate limiting protects your IP.
---
## β¨ Key Features
| Feature | Description |
|---------|-------------|
| π€ **Autonomous Agent** | LLM-driven pentesting with 22-phase methodology |
| π― **Single Scan** | Scan a single URL/target with full vulnerability testing |
| π **DAST Scan** | Scan specific URLs with deep vulnerability testing |
| π **Wildcard Scan** | Enum all subdomains β scan each individually |
| π **Named Scans** | Give each scan a custom name for easy identification |
| πΎ **Save & Launch Later** | Prepare scans without starting β launch when ready |
| π¬ **Phase Selection** | Choose specific methodology phases per scan (e.g., recon only) |
| π― **Severity Filter** | Filter by Critical/High/Medium/Low/Info |
| π« **Out of Scope** | Define targets to exclude from testing |
| π **Safety First** | Blocks destructive commands, encoding bypass detection |
| π‘οΈ **Self-Scan Prevention** | Automatically blocks local/private IPs (127.0.0.1, 10.x, 192.168.x, etc.) |
| π **Circuit Breaker** | Auto-blocks failing tools after 5 attempts |
| π **Web UI** | Dark mode dashboard with live feed & token tracking |
| π¬ **Chat During Scan** | Send messages to agent while scan is running |
| π± **Mobile Ready** | Works on phones & tablets |
| πΎ **Scan Persistence** | Resume interrupted scans after restart |
| π **PDF Reports** | Professional branded pentest reports with custom logo |
| π·οΈ **Report Branding** | Upload company logo and set company name for white-label reports |
| π **Discord Alerts** | Severity-filtered notifications on scan start/vuln/completion |
| π§ **Auto-Install** | 70+ toolβpackage mappings |
| π§ **Multi-LLM** | OpenAI, Anthropic, DeepSeek, MiniMax, Groq, Ollama, Google |
| π **Authentication** | Optional login protection for dashboard |
| π **CVE Search** | Query NIST NVD database for CVE details |
| π **Exploit Search** | Search Exploit-DB for public exploits |
| π **Web Search** | Gemini, Brave, Google, Bing, DuckDuckGo integration |
| β
**Tool Pre-Check** | Auto-installs missing tools before running |
| π§ **AgentMail** | Built-in email for sign-up verification & OTP |
| π‘οΈ **Python venv** | Auto-creates ~/venv for Python tools |
| π¬ **Zero-Day Discovery** | Behavioral fuzzing, parser differentials, timing oracles, type confusion |
---
## π Why Xalgorix?
### Comprehensive Comparison with Open-Source Alternatives
| Feature | Xalgorix | Shannon | Strix | PentestGPT | HexStrike | PentAGI | Nebula |
|---------|:--------:|:------:|:-----:|:----------:|:---------:|:-------:|:------:|
| **Self-Hosted** | β
| β οΈ SaaS | β
| β
| β
| β
| β
|
| **Blackbox Testing** | β
| β | β
| β
| β
| β
| β
|
| **Whitebox Testing** | β
| β
| β | β | β | β
| β |
| **Web UI Dashboard** | β
| β | β | β | β | β | β |
| **Live Real-Time Feed** | β
| β | β | β οΈ Term | β | β | β |
| **Chat During Scan** | β
| β | β | β | β | β | β |
| **PDF Reports Auto** | β
| β
| β
| β οΈ Manual | β | β | β |
| **Discord Alerts** | β
| β | β | β | β | β | β |
| **Browser Automation** | β
| β
| β
| β
| β
| β
| β
|
| **Auto-Install Tools** | β
70+ | β | β οΈ Docker | β οΈ Docker | β οΈ MCP | β οΈ Docker | β οΈ CLI |
| **Rate Limiting** | β
| β | β | β | β | β | β |
| **Multi-Target Queue** | β
| β | β | β | β | β | β |
| **Severity Filtering** | β
| β | β | β | β | β | β |
| **Circuit Breaker** | β
| β | β | β | β | β | β |
| **DAST Mode** | β
| β | β | β | β | β | β |
| **Wildcard Scan** | β
| β | β | β οΈ Manual | β | β οΈ Manual | β |
| **CVE Search Built-in** | β
| β | β | β | β | β | β |
| **Exploit Search** | β
| β | β | β | β | β | β |
| **Web Search** | β
| β | β | β | β | β | β |
| **Requires Source Code** | β | β
| β | β | β | β | β |
| **Zero-Day Discovery** | β
| β | β | β | β | β | β |
| **Bug Bounty Focus** | β
| β οΈ SaaS | β
| β
| β οΈ MCP | β οΈ Docker | β
|
### Feature Details
- **Shannon** β Requires source code (white-box only), part of paid Keygraph platform
- **Strix** β Docker-based, good for bug bounty, no web UI
- **PentestGPT** β Published at USENIX Security 2024, terminal-only interface
- **HexStrike** β MCP server integration, 150+ tools via MCP protocol
- **PentAGI** β Multi-agent Docker system, complex setup required
- **Nebula** β CLI assistant, good for quick scans but limited methodology
### Why Xalgorix is the Best Choice?
1. **π― Most Complete Web UI**
- Only tool with full dashboard, live feed, chat, token tracking
- See everything in real-time, interact with agent during scan
2. **π Multiple Scan Modes**
- Single: Quick target scan
- DAST: Deep URL vulnerability testing
- Wildcard: Subdomain enum β scan each individually
- Most comprehensive coverage
3. **π Built-in Notifications**
- Discord alerts on start/vuln/complete
- PDF reports auto-generated
4. **π‘οΈ Production Ready**
- Rate limiting (protect your IP)
- Circuit breaker (auto-block failing tools)
- Queue system (scan multiple targets)
- Severity filtering (focus on what matters)
5. **π Built-in Research Tools**
- CVE search (NIST NVD)
- Exploit search (Exploit-DB)
- Web search (Gemini/Brave/Google)
6. **π° 100% Free & Open Source**
- No SaaS subscription
- No per-scan fees
- Your data stays local
### Competitive Advantages Summary
| What You Get | Xalgorix | Others |
|--------------|----------|--------|
| **Web Dashboard** | β
| β Most |
| **Live Feed + Chat** | β
| β |
| **Auto PDF + Discord** | β
| β |
| **3 Scan Modes** | β
| β |
| **Tool Auto-Install** | β
70+ | β οΈ Manual |
| **Production Safety** | β
| β |
| **Free Forever** | β
| β
|
---
## π οΈ Quick Start
### 1οΈβ£ Install
> β οΈ **Requires Go 1.24+** β Check with `go version`. Install/upgrade: [go.dev/dl](https://go.dev/dl/)
>
> ```bash
> # Quick install Go 1.24 on Linux:
> sudo rm -rf /usr/local/go
> wget -q https://go.dev/dl/go1.24.2.linux-amd64.tar.gz
> sudo tar -C /usr/local -xzf go1.24.2.linux-amd64.tar.gz && rm go1.24.2.linux-amd64.tar.gz
> export PATH=/usr/local/go/bin:$HOME/go/bin:$PATH
> ```
```bash
# Recommended β build from source
git clone https://github.com/xalgord/xalgorix.git
cd xalgorix
make install
# Or install via Go
GOPROXY=direct go install -v github.com/xalgord/xalgorix/v4/cmd/xalgorix@latest
```
> **π‘ Update:** Run `xalgorix --update` to get the latest version. Xalgorix also auto-updates on every start by downloading binaries from GitHub releases.
### 2οΈβ£ Configure
```bash
# Create ~/.xalgorix.env
nano ~/.xalgorix.env
```
```bash
# β Recommended β MiniMax (best performance-to-cost ratio for pentesting)
XALGORIX_LLM=minimax/MiniMax-M2.7
XALGORIX_API_KEY=your_minimax_api_key
# OR use OpenAI:
# XALGORIX_LLM=openai/gpt-5.4
# XALGORIX_API_KEY=sk-...
# OR use Anthropic:
# XALGORIX_LLM=anthropic/claude-sonnet-4-20250514
# XALGORIX_API_KEY=sk-ant-...
# Optional
XALGORIX_DISCORD_WEBHOOK=https://discord.com/api/webhooks/...
```
> π **Exclusive 10% OFF MiniMax:** [Get your discount here](https://platform.minimax.io/subscribe/coding-plan?code=4ujDUlOIz3&source=link)
> β οΈ **Note:** Xalgorix will refuse to start if `~/.xalgorix.env` is missing or missing required variables (`XALGORIX_LLM` and `XALGORIX_API_KEY`).
### 3οΈβ£ Run
```bash
# Web UI (recommended)
xalgorix --web
# Or CLI
xalgorix --target https://example.com
```
---
## π Command Reference
### CLI Flags
| Flag | Alias | Description |
|------|-------|-------------|
| `--web` | `-w` | Launch the Web UI dashboard |
| `--port` | `-p` | Web UI port (default: 1337) |
| `--target` | `-t` | Target URL, IP, or local path (repeatable) |
| `--instruction` | `-i` | Custom instructions for the agent |
| `--model` | `-m` | LLM model (overrides XALGORIX_LLM) |
| `--update` | `-up` | Update to latest version |
| `--version` | `-v` | Show version |
| `--start` | β | Install and start as systemd service |
| `--stop` | β | Stop the service |
| `--restart` | β | Restart the service |
| `--uninstall` | β | Remove from system |
| `--help` | `-h` | Show help |
### Environment Variables
#### Required
| Variable | Description | Example |
|----------|-------------|---------|
| `XALGORIX_LLM` | Model name (with optional provider prefix) | `openai/gpt-5.4`, `anthropic/claude-opus-4-1-20250805`, `deepseek/deepseek-v4-pro`, `google/gemini-3.1-pro-preview`, `minimax/MiniMax-M2.7`, `custom/my-model` |
| `XALGORIX_API_KEY` | API key | `sk-...` |
#### Optional - API Base (for custom providers)
| Variable | Description | Example |
|----------|-------------|---------|
| `XALGORIX_API_BASE` | API base URL (auto-detected from provider prefix if not set) | `https://api.openai.com/`, `https://api.anthropic.com`, `https://api.minimax.io/`, `https://your-custom-llm.com/v1` |
#### Optional - Web Search
| Variable | Description | Example |
|----------|-------------|---------|
| `GEMINI_API_KEY` | Google Gemini API key for web search | `AIza...` |
> **π‘ Web Search:** If `GEMINI_API_KEY` is set, xalgorix will use Gemini for web search. Otherwise falls back to Brave/Google/Bing/DuckDuckGo scraping.
> **π‘ Custom Providers:** To use any custom LLM provider, just set `XALGORIX_LLM=custom/modelname` and `XALGORIX_API_BASE=https://your-api-endpoint.com/v1`
>
> **π‘ Custom Model IDs:** The dashboard model fields provide suggestions but accept typed model IDs, so newly released models can be used without waiting for the dropdown list to be updated.
>
> **π‘ Gemini API:** For Google Gemini keys, use the `google/` or `gemini/` prefix when possible. If you set an unprefixed/custom Gemini model with `XALGORIX_API_BASE=https://generativelanguage.googleapis.com/v1`, Xalgorix will still use Gemini's `generateContent` request format and `x-goog-api-key` authentication. Current text-model suggestions include `gemini-3.1-pro-preview`, `gemini-3.1-pro-preview-customtools`, `gemini-3-flash-preview`, and `gemini-3.1-flash-lite-preview`.
#### Supported Provider Prefixes (auto-detected)
| Prefix | API Base |
|--------|----------|
| `openai/` | `https://api.openai.com/v1` |
| `anthropic/` | `https://api.anthropic.com` |
| `deepseek/` | `https://api.deepseek.com/v1` |
| `groq/` | `https://api.groq.com/openai/v1` |
| `google/` | `https://generativelanguage.googleapis.com/v1` |
| `gemini/` | `https://generativelanguage.googleapis.com/v1` |
| `ollama/` | `http://localhost:11434/v1` |
| `minimax/` | `https://api.minimax.io/v1` |
#### Optional - Model Settings
| Variable | Default | Description |
|----------|---------|-------------|
| `XALGORIX_REASONING_EFFORT` | `high` | Reasoning effort: `low`, `medium`, `high` |
| `XALGORIX_LLM_MAX_RETRIES` | `5` | Max retries on API failure |
| `XALGORIX_MEMORY_COMPRESSOR_TIMEOUT` | `60` | Context compression timeout (seconds) |
| `XALGORIX_MAX_ITERATIONS` | `0` | Max iterations (0 = unlimited) |
#### Optional - Integrations
| Variable | Description | Example |
|----------|-------------|---------|
| `XALGORIX_DISCORD_WEBHOOK` | Discord webhook for alerts | `https://discord.com/api/webhooks/...` |
| `XALGORIX_DISCORD_MIN_SEVERITY` | Min severity for Discord alerts (skip noise) | `low`, `medium`, `high`, `critical` |
| `XALGORIX_USERNAME` | Dashboard username (enables auth) | `admin` |
| `XALGORIX_PASSWORD` | Dashboard password | `secret123` |
#### Optional - Rate Limiting
| Variable | Default | Description |
|----------|---------|-------------|
| `XALGORIX_RATE_LIMIT_REQUESTS` | `60` | Requests per window |
| `XALGORIX_RATE_LIMIT_WINDOW` | `60` | Window in seconds |
#### Optional - Browser
| Variable | Default | Description |
|----------|---------|-------------|
| `XALGORIX_DISABLE_BROWSER` | `false` | Set to `true` to disable browser automation |
### Supported Models
Xalgorix supports multiple LLM providers. These are examples, not a hard allowlist:
- β **MiniMax (Recommended)** β `minimax/MiniMax-M2.7`, `minimax/MiniMax-M2.7-highspeed`, `minimax/MiniMax-M2.5` β Best performance-to-cost for autonomous pentesting
- **OpenAI** β `openai/gpt-5.4`, `openai/gpt-5.4-mini`, `openai/gpt-5.2`, `openai/gpt-4.1`, `openai/o3`
- **Anthropic** β `anthropic/claude-opus-4-1-20250805`, `anthropic/claude-sonnet-4-20250514`, `anthropic/claude-3-7-sonnet-latest`
- **DeepSeek** β `deepseek/deepseek-v4-pro`, `deepseek/deepseek-v4-flash` (`deepseek/deepseek-chat` and `deepseek/deepseek-reasoner` remain legacy compatibility aliases until DeepSeek retires them)
- **Google** β `google/gemini-3.1-pro-preview`, `google/gemini-3.1-pro-preview-customtools`, `google/gemini-3-flash-preview`, `google/gemini-3.1-flash-lite-preview`, `google/gemini-2.5-pro`, `google/gemini-2.5-flash`
- **Groq** β `groq/openai/gpt-oss-120b`, `groq/openai/gpt-oss-20b`, `groq/qwen/qwen3-32b`, `groq/meta-llama/llama-4-scout-17b-16e-instruct`
- **Ollama** β `ollama/llama3.3`, `ollama/qwen3`, `ollama/qwen3-coder` (local)
> π **Exclusive 10% OFF MiniMax:** [Get your discount here](https://platform.minimax.io/subscribe/coding-plan?code=4ujDUlOIz3&source=link)
---
## π Usage Guide
### Web UI Features
| Feature | Usage |
|---------|-------|
| π― **Single Scan** | Enter URL, click Start |
| π **DAST Scan** | Select "DAST" mode for URL vulnerability testing |
| π **Wildcard Scan** | Select "Wildcard" mode for subdomain enum β each subdomain gets full scan |
| π **Multi-Target** | Upload a `.txt` file with one target per line |
| π **Named Scans** | Give each scan a descriptive name for tracking |
| πΎ **Save Without Start** | Click "Save" to prepare a scan, launch it later from the scan details page |
| π¬ **Phase Selection** | Tick only the methodology phases you want (e.g., Recon + Injection only) |
| π― **Severity Filter** | Check only Critical/High to skip Low/Info |
| π« **Out of Scope** | Exclude targets from testing |
| π¬ **Custom Instructions** | Tell Xalgorix what to focus on |
| π·οΈ **Report Branding** | Upload a company logo and enter company name for white-label PDF reports |
| βοΈ **LLM Provider** | Switch providers in settings |
| π **Discord** | Add webhook for alerts (with configurable severity threshold) |
### Example Instructions
```text
# Focus on specific vulns
"Focus on SQL Injection and IDOR. Skip XSS."
# Traditional authenticated testing
"Login with: admin@email.com / Password123"
# API key authentication
"API: am_us_pod_474368638921786eec2228b27f..., username: agentmail"
# Email-based service testing
"AgentMail credentials: api_key=xxx, email=user@agentmail.to"
# Bug bounty rules
"This is a HackerOne program. Out of scope: DoS, social engineering."
# Internal network
"Scan 10.0.0.0/24. Focus on SMB and database services."
# π¬ Zero-day hunting
"Focus on zero-day hunting. Use behavioral fuzzing and parser differentials."
# Targeted anomaly research
"Hunt for novel vulns on the API. Use mutation fuzzing and timing analysis."
```
---
## ποΈ Architecture
```
xalgorix/
βββ cmd/xalgorix/ # CLI entry point
βββ internal/
β βββ agent/ # π€ Core agent loop
β βββ config/ # βοΈ Configuration
β βββ llm/ # π§ LLM client & parser
β βββ tools/ # π§ 11 built-in tools
β β βββ terminal/ # π» Command execution
β β βββ browser/ # π Headless Chrome
β β βββ python/ # π Python scripts
β β βββ reporting/ # π Vulnerability reports
β β βββ ...
β βββ web/
β β βββ server.go # π HTTP + WebSocket
β β βββ static/ # π¨ Web UI (HTML/CSS/JS)
β βββ tui/ # π Terminal UI
βββ internal/tools/skills/ # π Vulnerability knowledge (zero-day hunting, response anomaly detection, ...)
```
---
## π‘οΈ Safety Features
### Self-Scan Prevention
Xalgorix automatically blocks scans targeting local or internal IP addresses. This prevents the agent from accidentally scanning its own server and reporting false vulnerabilities.
**Blocked address ranges:**
- `127.0.0.0/8` (loopback)
- `10.0.0.0/8` (private)
- `172.16.0.0/12` (private)
- `192.168.0.0/16` (private)
- `169.254.0.0/16` (link-local)
- `::1`, `fe80::` (IPv6 loopback/link-local)
- `localhost`, `0.0.0.0`
### Blocked Commands
```
β Filesystem: rm -rf /, rm -rf ~, mkfs, dd
β SQL: DROP TABLE, DELETE FROM, UPDATE
β System: shutdown, reboot, halt, poweroff
β Code: shutil.rmtree, os.remove
```
### Encoding Bypass Detection
Xalgorix detects obfuscated commands:
| Technique | Example |
|----------|--------|
| Base64 | `echo cm0gL3JmIC8= \| base64 -d` |
| Hex | `\x72\x6d\x20\x2d\x72\x66` |
| URL | `%72%6d%20%2d%72%66` |
### Circuit Breaker
After **5 consecutive failures**, a tool is temporarily blocked for **60 seconds** to prevent wasting time.
---
## π API Endpoints
### Scans
| Method | Endpoint | Description |
|--------|----------|-------------|
| `POST` | `/api/scan` | Start or save scan (supports `name`, `phases`, `company_name`, `logo_path`) |
| `POST` | `/api/stop` | Stop scan |
| `GET` | `/api/status` | Get status |
| `GET` | `/api/scans` | List scans |
| `GET` | `/api/scans/:id` | Get scan details |
| `GET` | `/api/report/:id` | Download PDF |
### Uploads
| Method | Endpoint | Description |
|--------|----------|-------------|
| `POST` | `/api/upload-logo` | Upload company logo for report branding (png/jpg/svg/gif/webp, 5MB max) |
| `POST` | `/api/upload-targets` | Upload target list file (.txt) |
### Queue
| Method | Endpoint | Description |
|--------|----------|-------------|
| `GET` | `/api/queue/status` | Check interrupted queue |
| `POST` | `/api/queue/resume` | Resume scan |
| `POST` | `/api/queue/clear` | Clear queue |
### Settings
| Method | Endpoint | Description |
|--------|----------|-------------|
| `GET` | `/api/settings/rate-limit` | Get rate limit |
| `POST` | `/api/settings/rate-limit` | Update rate limit |
---
## π§° Toolkit Architecture (Auto-Installed)
Xalgorix intelligently auto-resolves, installs, and manages **70+ security tools** on-the-fly. If an agent tries to use a tool that isn't installed, Xalgorix pauses the execution, instantly installs it (via `apt`, `go install`, `cargo`, pip, etc.), and resumes transparently.
### π Asset Discovery & Networking
* **Subdomain & DNS:** `subfinder`, `findomain`, `assetfinder`, `dnsx`, `amass`, `nslookup`, `dig`, `host`, `whois`
* **Network & Ports:** `nmap`, `masscan`, `naabu`, `netcat` (`nc`), `socat`, `tcpdump`, `traceroute`
### π Web Crawling & URL Discovery
* **Spiders & Crawlers:** `katana`, `gospider`, `hakrawler`
* **Archive Extractors:** `gau` (GetAllUrls), `waybackurls`
* **Parameters:** `paramspider`, `arjun`
### π₯ Vulnerability Scanners & Fuzzers
* **Scanners:** `nuclei`, `sqlmap`, `dalfox` (XSS)
* **Fuzzers:** `ffuf`, `gobuster`, `wfuzz`, `feroxbuster`, `dirb`
* **Web Toolkit:** `httpx`, `curl`, `wget`, `httpie`
### π¦ Utilities & System
* **Text & Data:** `jq`, `xmllint`, `html2text`, `awk`, `sed`, `grep`
* **Security & Crypto:** `openssl`, `base64`, `xxd`, `strings`
* **Environment:** `python3`, `pip3`, `python3-venv`, `git`, `unzip`
---
## π 22-Phase Methodology
> **π‘ Tip:** You can select which phases to run per scan via the dashboard's phase checkboxes.
1. π **Deep Reconnaissance & Attack Surface Mapping** β Subdomains, ports, tech stack fingerprinting
2. π¦ **Manual Vulnerability Discovery** β Nuclei, nmap scripts, manual probing
3. π **Directory & File Discovery** β Fuzzing, backups, admin panels, hidden paths
4. π **CORS & Cookie Analysis** β Cross-origin policy, cookie flags, SameSite
5. π **Authentication & Session Testing** β Login bypass, brute-force, session fixation, OAuth flaws
6. π **Injection Testing** β XSS, SQLi, Command injection, XXE, SSTI
7. π **SSRF Testing** β Parameter fuzzing, cloud metadata, internal service access
8. πͺ **IDOR & Broken Access Control** β Privilege escalation, object reference manipulation
9. π **API & GraphQL Testing** β REST/GraphQL introspection, rate limiting, auth bypass
10. π€ **File Upload Testing** β Extension bypass, webshells, content-type abuse
11. βοΈ **Deserialization & RCE** β Unsafe deserialization, Log4Shell, command chaining
12. β±οΈ **Race Conditions & Business Logic** β TOCTOU, double-spend, workflow bypass
13. π **Subdomain Takeover** β Dangling CNAMEs, unclaimed services
14. π **Open Redirect Testing** β Parameter-based redirects, header injection
15. π§ **Email Security Testing** β SPF, DKIM, DMARC misconfigurations
16. βοΈ **Cloud & Infrastructure** β S3 buckets, Azure blobs, GCP, K8s misconfigs
17. π **WebSocket Testing** β Origin validation, injection, protocol abuse
18. π **CMS-Specific Testing** β WordPress, Joomla, Drupal plugin/theme vulns
19. π **Broken Link Hijacking & Content Spoofing** β Expired domains, unclaimed resources
20. β
**Exploit Verification** β Confirm and verify all findings with PoC
21. π¬ **Zero-Day & Novel Vulnerability Discovery** β Behavioral fuzzing, parser differentials, type confusion, timing oracles
22. π **Final Report** β JSON + branded PDF with executive summary
---
## π PDF Report Contents
The auto-generated report includes:
- β
Cover page with target, date & company branding
- π·οΈ Custom logo and company name (uploaded via dashboard)
- π Executive summary with vuln counts
- π Vulnerability details (CVSS, PoC, remediation)
- π Tested endpoints
- π Methodology phases applied
- β±οΈ Timestamps for blue team log correlation
- β οΈ Legal disclaimer
---
## π Data Storage
```
~/xalgorix-data/
βββ logos/ # Uploaded company logos for report branding
β βββ 1736000000_logo.png
βββ target.com/
β βββ 2026-01-15/
β βββ example.com_abc123/
β βββ scan.json
β βββ target.io_def456/
β βββ scan.json
βββ queue_state.json
```
- π
30-day auto-cleanup
- πΎ Survives page refresh
- π Queue resume after restart
---
## π€ Contributing
Pull requests welcome! See [CONTRIBUTING.md](CONTRIBUTING.md) for guidelines.
---
## π License
MIT License β see [LICENSE](LICENSE).
---
## π Links
| Resource | URL |
|----------|-----|
| π Documentation | [docs.xalgorix.com](https://docs.xalgorix.com) |
| π Issues | [github.com/xalgord/xalgorix/issues](https://github.com/xalgord/xalgorix/issues) |
| β Donate | [buymeacoffee.com/xalgord](https://buymeacoffee.com/xalgord) |
---
**Built with β‘ by [@xalgord](https://github.com/xalgord)**
*Use responsibly.*