An elite, modular offensive security automation framework with full TUI integration, OpenAI-enhanced command chaining, real-time recon, exploitation, and pivoting. Built for serious red team operations with support for split-VPN routing, ZAP/Burp Suite integration, Metasploit RPC automation, and interactive dashboards.
๐ Key Features
- Layered Reconnaissance with tools like
nmap,dig,amass,subfinder,httpx,nikto,wafw00f, etc. - AI-Augmented Command Chaining using OpenAI (GPT-4o), streaming decisions in real time.
- Auto-Triggered Exploit Chains: nuclei, ffuf, sqlmap, metasploit modules, smtp-user-enum, dnsenum.
- Credential Loot Tracking & Reuse for brute-forcing (
hydra, etc). - Metasploit RPC Automation via
pymetasploit3(auto-credentialed). - Burp/ZAP Integration with toggles via dashboard or AI.
- TUI Dashboard (curses):
- Live stream of current recon/exploit status
- System metrics (CPU, RAM, VPN IP)
- Service statuses
- AI thought window
- Split-screen log viewer with
ERROR/WARNfilters - Hotkeys to start/stop tools or view live logs
- VPN Split Routing: Run tools as
redteamuser โ traffic isolated viawg0ortun0 - Mission-Ready Modular Design: Easily add more tools or scan logic
๐ Project Structure
ai_driver/
โโโ ai_driver.py # Main orchestrator
โโโ dashboard.py # TUI live dashboard
โโโ setup_redteam_env.sh # Environment + routing bootstrap
โโโ requirements.txt
โโโ .env # JSON config file (not dotenv)
โโโ modules/
โ โโโ recon.py # Multi-tool recon logic
โ โโโ exploitation.py # FFUF, nuclei, brute-force logic
โ โโโ zap_burp.py # ZAP/Burp scanner integration
โ โโโ metasploit.py # RPC control logic
โ โโโ loot_tracker.py # Tracks discovered usernames, creds, etc.
โ โโโ ai_assistant.py # OpenAI GPT assistant + command parser
โ โโโ utils.py # Support utilities
โโโ results/ # Output per target (loot, json, markdown)
โโโ logs/driver.log # Global log (used by dashboard)
๐ง AI Features
| Feature | Description |
|---|---|
| ๐ง Thought Streaming | Dashboard shows real-time AI decisions as they are generated |
| โก Auto-Triggered Exploits | AI can auto-run chains like nuclei, hydra, metasploit modules |
| ๐ค AI Post-Exploitation Loop | Follows up after initial exploit chain to suggest lateral moves |
| ๐งผ Safe Command Parser | Extracts only shell-safe commands from OpenAI replies |
| ๐พ Logs & Outputs Persisted | Stored in results/<target>/ai_suggestions*.json + logs |
๐ก Dashboard (TUI)
| Hotkey | Function |
|---|---|
3 | Toggle Live Logs |
4 | Start Metasploit RPC, ZAP, Burp |
5 | Stop all services |
f | Filter logs for [ERROR] / [WARN] |
q | Quit the dashboard |
Includes:
- VPN IP detection via
tun0/wg0 - CPU/RAM % usage
- Current target
- Phase progress (recon โ AI โ zap โ metasploit โ exploit)
- AI “thought” log viewer
- Log filter, scroll, highlight
๐งช Setup
1. Clone and configure
mkdir /opt/ai_driver
cd /opt
git clone https://github.com/culpur/cstrike.git
cd ai_driver
cp .env.example .env
2. Create virtualenv
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
โ๏ธ Split VPN Setup: redteam User
To isolate all scanning traffic through a VPN tunnel:
Step 1: Bootstrap with setup_redteam_env.sh
sudo bash setup_redteam_env.sh
Creates:
redteamuser w//bin/zsh- Project files in
/opt/ai_driver - ZSH aliases (
ai_driver,setup_anon) iptables+ip ruleVPN routing (viawg0)- Default route in table
wgvpn
Step 2: Test isolation
su - redteam
curl --interface wg0 https://ifconfig.me
ai_driver
All commands as redteam will now use the VPN route.
๐งต .env Example
{
"target_scope": ["culpur.net"],
"openai_api_key": "sk-xxxxxxxxxxxx",
"allow_exploitation": true,
"scan_modes": ["http", "dns", "port", "vulnscan"],
"allowed_tools": [
"nmap", "ffuf", "httpx", "sqlmap",
"dig", "subfinder", "amass",
"nikto", "wafw00f", "smtp-user-enum", "dnsenum"
],
"max_threads": 10,
"max_runtime": 300,
"msf_username": "msf",
"msf_password": "mypassword",
"msf_host": "127.0.0.1",
"msf_port": 55552,
"zap_host": "127.0.0.1",
"zap_port": 8090
}
๐ฏ Example Usage
# Launch full pipeline with live dashboard
python3 ai_driver.py
- Will open curses dashboard
- Shows status of recon/exploitation per target
- Auto-invokes AI twice: post-recon + post-exploitation
- Auto-triggers all exploit logic if
allow_exploitation = true
๐ฎ Coming Soon
These features are already scaffolded or partially integrated:
- โ Proxy chaining logic for agent routing
- โ Pivot interface in TUI
- โ Credential heatmaps in dashboard
- ๐ Remote agent registration
- ๐ AI-driven lateral movement planner
- ๐ Export full report: Markdown + JSON
๐ Legal
This tool is intended only for authorized red team use. Use against unauthorized targets is illegal and unethical.
๐ License
MIT License ยฉ 2025 Culpur Defense Inc.
๐ Credits & Contact
Crafted by Culpur Defense Inc.
- GitHub: https://github.com/culpur
- Website: https://culpur.net