mizazhaider-ceh/Icarus-X
๐ Advanced modular ai-powered penetration testing framework with unified tool integration | Combines reconnaissance, exploitation, and post-exploitation in one powerful interface | Enterprise-grade security testing made simple
โ๏ธ ICARUS-X
AI-Powered Penetration Testing Framework
___ ____ _ ____ _ _ ____ __ __
|_ _/ ___| / \ | _ \| | | / ___| \ \/ /
| | | / _ \ | |_) | | | \___ \ _____\ /
| | |___ / ___ \| _ <| |_| |___) ||_____/ \
|___|____/_/ \_\_| \_\___/|____/ /_/\_\
Unified CLI โข Async Architecture โข AI-Powered Analysis
Getting Started ยท Features ยท Screenshots ยท Documentation
๐ฏ What is ICARUS-X?
ICARUS-X is a modern penetration testing framework that combines 13+ security tools into one unified CLI. Built with Python's async/await for blazing-fast performance and integrated with Cerebras AI (world's fastest inference at 3000+ tokens/sec) for intelligent command suggestions.
Why Choose ICARUS-X?
| Feature | Description |
|---|---|
| โก Blazing Fast | 500+ concurrent port scans, async DNS queries |
| ๐ค AI-Powered | Get attack suggestions, CVE explanations, bypass techniques |
| ๐ง All-in-One | Recon, vuln scanning, payloads, reporting in one tool |
| ๐ Professional | HTML/Markdown/JSON reports for clients |
| ๐จ Modern UI | Rich terminal with live progress, tables, colors |
โจ Features
๐ Reconnaissance
|
๐ฌ Vulnerability Assessment
|
๐ Payload Generation
|
๐ค AI Assistant
|
All 13 Modules
scout โ High-speed reconnaissance & port scanning
spider โ Web crawler with JS parsing
dirbrute โ Directory/file brute-forcing (ffuf/gobuster)
vuln โ Nuclei vulnerability scanning
tech โ Technology stack detection
payloads โ Attack payload generator
netmap โ Network discovery & mapping
ai โ AI-powered assistant
pentest โ Full automated workflow
report โ Professional report generation
tools โ External tool status checker
wordlists โ Wordlist browser & manager
runs โ Workflow run management
๐ธ Screenshots
๐ Quick Start
Prerequisites
- Python 3.11+
- Linux (Kali/Ubuntu), macOS, or Windows WSL2
- External tools: nmap, ffuf, nuclei (optional but recommended)
Installation
# Clone the repository
git clone https://github.com/mizazhaider-ceh/Icarus-X.git
cd Icarus-X
# Install dependencies
pip install -r requirements.txt
# (Optional) Install external tools - Kali/Debian
sudo apt install nmap ffuf gobuster nuclei nikto sqlmap hydra whatweb
# Verify installation
python icarus.py toolsAI Setup (Optional)
# Get free API key from https://cloud.cerebras.ai/
echo "CEREBRAS_API_KEY=your-key-here" > .env
# Test AI assistant
python icarus.py ai --query "how to enumerate Active Directory?"๐ป Usage
Quick Reference
# Reconnaissance
python icarus.py scout -t example.com
python icarus.py scout -t example.com --ports 22,80,443 --tech
# Directory brute-forcing
python icarus.py dirbrute -t https://example.com
python icarus.py dirbrute -t https://example.com --ext php,html,js
# Vulnerability scanning
python icarus.py vuln -t https://example.com --severity critical,high
# Payloads
python icarus.py payloads --list shells
python icarus.py payloads --type bash --ip 10.10.14.5 --port 4444
# AI Assistant
python icarus.py ai --commands --goal "initial foothold on Linux"
python icarus.py ai --explain CVE-2024-1234
# Full pentest workflow
python icarus.py pentest -t example.com --workflow fullMass Target Scanning
# Create targets file
echo -e "192.168.1.0/24\nexample.com\n10.0.0.1-50" > targets.txt
# Scan all targets
python icarus.py scout --targets targets.txtAI Model Selection
# Available models (Cerebras - world's fastest inference)
python icarus.py ai --commands --goal "privesc" --model llama3.1-8b # Fast
python icarus.py ai --commands --goal "privesc" --model llama-3.3-70b # Balanced
python icarus.py ai --commands --goal "privesc" --model qwen-3-235b # Most capable๐๏ธ Project Structure
Icarus-X/
โโโ icarus.py # Main CLI entry point (Typer)
โโโ icarus.toml # Configuration
โโโ requirements.txt # Python dependencies
โ
โโโ core/ # Core engine
โ โโโ scanner.py # Async reconnaissance
โ โโโ workflow.py # Pentest orchestration
โ โโโ reporter.py # Report generation
โ โโโ ai_engine.py # Cerebras AI integration
โ
โโโ modules/ # Feature modules
โ โโโ dirbrute.py # Directory brute-forcing
โ โโโ nuclei.py # CVE scanning
โ โโโ techdetect.py # Tech fingerprinting
โ โโโ spider.py # Web crawling
โ โโโ netmap.py # Network discovery
โ โโโ payloads.py # Payload generation
โ โโโ targets.py # Mass target import
โ
โโโ models/ # Pydantic data models
โ โโโ target.py
โ โโโ finding.py
โ โโโ workflow.py
โ
โโโ utils/ # Utilities
โโโ tools.py # External tool checker
โโโ wordlists.py # Wordlist manager
โโโ config.py # Configuration loader
โโโ logger.py # Rich logging
โ๏ธ Configuration
Edit icarus.toml to customize:
[scanner]
port_timeout = 2.0
max_concurrent_ports = 500
default_ports = "21,22,80,443,445,3306,3389,8080"
[ai]
provider = "cerebras"
model = "llama3.1-8b" # Options: llama3.1-8b, llama-3.3-70b, qwen-3-235b
[report]
output_dir = "reports"๐ ๏ธ Required External Tools
| Tool | Purpose | Install |
|---|---|---|
| nmap | Port scanning | apt install nmap |
| ffuf | Web fuzzing | apt install ffuf |
| nuclei | CVE scanning | apt install nuclei |
| gobuster | Dir brute | apt install gobuster |
| nikto | Web scanner | apt install nikto |
| sqlmap | SQL injection | apt install sqlmap |
Check status: python icarus.py tools
๐ Legal Disclaimer
โ ๏ธ ICARUS-X is designed for authorized security testing only.
- Always obtain written permission before testing
- Understand your legal jurisdiction
- Use responsibly and ethically
Unauthorized access to computer systems is illegal.
๐ License
MIT License - See LICENSE for details.
ICARUS-X ยท Built with Python, AsyncIO, Typer, Rich & Cerebras AI
"Fly high, but not too close to the sun" โ๏ธ




