GitHunt
MI

๐Ÿš€ Advanced modular ai-powered penetration testing framework with unified tool integration | Combines reconnaissance, exploitation, and post-exploitation in one powerful interface | Enterprise-grade security testing made simple

โœˆ๏ธ ICARUS-X

AI-Powered Penetration Testing Framework

 ___ ____    _    ____  _   _ ____        __  __
|_ _/ ___|  / \  |  _ \| | | / ___|      \ \/ /
 | | |     / _ \ | |_) | | | \___ \  _____\  / 
 | | |___ / ___ \|  _ <| |_| |___) ||_____/  \ 
|___|____/_/   \_\_| \_\___/|____/      /_/\_\

Unified CLI โ€ข Async Architecture โ€ข AI-Powered Analysis

Python
License
Cerebras
Platform


Getting Started ยท Features ยท Screenshots ยท Documentation


ICARUS-X Demo

๐ŸŽฏ What is ICARUS-X?

ICARUS-X is a modern penetration testing framework that combines 13+ security tools into one unified CLI. Built with Python's async/await for blazing-fast performance and integrated with Cerebras AI (world's fastest inference at 3000+ tokens/sec) for intelligent command suggestions.

Why Choose ICARUS-X?

Feature Description
โšก Blazing Fast 500+ concurrent port scans, async DNS queries
๐Ÿค– AI-Powered Get attack suggestions, CVE explanations, bypass techniques
๐Ÿ”ง All-in-One Recon, vuln scanning, payloads, reporting in one tool
๐Ÿ“Š Professional HTML/Markdown/JSON reports for clients
๐ŸŽจ Modern UI Rich terminal with live progress, tables, colors

โœจ Features

๐Ÿ” Reconnaissance

  • Async port scanning (500+ concurrent)
  • Subdomain enumeration
  • HTTP service probing
  • Technology fingerprinting
  • WHOIS lookups

๐Ÿ”ฌ Vulnerability Assessment

  • Nuclei CVE scanning
  • Severity-based filtering
  • Tag-based templates
  • JSON export for automation

๐Ÿ’‰ Payload Generation

  • Reverse shells (Bash, Python, PHP, NC)
  • XSS payloads (alert, cookie steal)
  • SQLi (union, boolean, time-based)
  • Command injection
  • Path traversal

๐Ÿค– AI Assistant

  • Command suggestions for any goal
  • CVE explanations & exploitation
  • Bypass technique recommendations
  • 5 model options (Llama, GPT-OSS, Qwen)

All 13 Modules

scout      โ†’ High-speed reconnaissance & port scanning
spider     โ†’ Web crawler with JS parsing
dirbrute   โ†’ Directory/file brute-forcing (ffuf/gobuster)
vuln       โ†’ Nuclei vulnerability scanning
tech       โ†’ Technology stack detection
payloads   โ†’ Attack payload generator
netmap     โ†’ Network discovery & mapping
ai         โ†’ AI-powered assistant
pentest    โ†’ Full automated workflow
report     โ†’ Professional report generation
tools      โ†’ External tool status checker
wordlists  โ†’ Wordlist browser & manager
runs       โ†’ Workflow run management

๐Ÿ“ธ Screenshots

๐Ÿ”ง Tool Status Check
Tool Check
python icarus.py tools
๐Ÿ” Scout Reconnaissance
Scout Scan
python icarus.py scout --target example.com --tech
๐Ÿ“ Directory Brute-forcing
DirBrute
python icarus.py dirbrute --target https://example.com --ext php,html
๐Ÿค– AI Assistant
AI Assistant
python icarus.py ai --commands --goal "enumerate SMB shares"
๐Ÿ’‰ Payload Generator
Payloads
python icarus.py payloads --list shells

๐Ÿš€ Quick Start

Prerequisites

  • Python 3.11+
  • Linux (Kali/Ubuntu), macOS, or Windows WSL2
  • External tools: nmap, ffuf, nuclei (optional but recommended)

Installation

# Clone the repository
git clone https://github.com/mizazhaider-ceh/Icarus-X.git
cd Icarus-X

# Install dependencies
pip install -r requirements.txt

# (Optional) Install external tools - Kali/Debian
sudo apt install nmap ffuf gobuster nuclei nikto sqlmap hydra whatweb

# Verify installation
python icarus.py tools

AI Setup (Optional)

# Get free API key from https://cloud.cerebras.ai/
echo "CEREBRAS_API_KEY=your-key-here" > .env

# Test AI assistant
python icarus.py ai --query "how to enumerate Active Directory?"

๐Ÿ’ป Usage

Quick Reference

# Reconnaissance
python icarus.py scout -t example.com
python icarus.py scout -t example.com --ports 22,80,443 --tech

# Directory brute-forcing
python icarus.py dirbrute -t https://example.com
python icarus.py dirbrute -t https://example.com --ext php,html,js

# Vulnerability scanning
python icarus.py vuln -t https://example.com --severity critical,high

# Payloads
python icarus.py payloads --list shells
python icarus.py payloads --type bash --ip 10.10.14.5 --port 4444

# AI Assistant
python icarus.py ai --commands --goal "initial foothold on Linux"
python icarus.py ai --explain CVE-2024-1234

# Full pentest workflow
python icarus.py pentest -t example.com --workflow full

Mass Target Scanning

# Create targets file
echo -e "192.168.1.0/24\nexample.com\n10.0.0.1-50" > targets.txt

# Scan all targets
python icarus.py scout --targets targets.txt

AI Model Selection

# Available models (Cerebras - world's fastest inference)
python icarus.py ai --commands --goal "privesc" --model llama3.1-8b      # Fast
python icarus.py ai --commands --goal "privesc" --model llama-3.3-70b   # Balanced
python icarus.py ai --commands --goal "privesc" --model qwen-3-235b     # Most capable

๐Ÿ—‚๏ธ Project Structure

Icarus-X/
โ”œโ”€โ”€ icarus.py              # Main CLI entry point (Typer)
โ”œโ”€โ”€ icarus.toml            # Configuration
โ”œโ”€โ”€ requirements.txt       # Python dependencies
โ”‚
โ”œโ”€โ”€ core/                  # Core engine
โ”‚   โ”œโ”€โ”€ scanner.py         # Async reconnaissance
โ”‚   โ”œโ”€โ”€ workflow.py        # Pentest orchestration
โ”‚   โ”œโ”€โ”€ reporter.py        # Report generation
โ”‚   โ””โ”€โ”€ ai_engine.py       # Cerebras AI integration
โ”‚
โ”œโ”€โ”€ modules/               # Feature modules
โ”‚   โ”œโ”€โ”€ dirbrute.py        # Directory brute-forcing
โ”‚   โ”œโ”€โ”€ nuclei.py          # CVE scanning
โ”‚   โ”œโ”€โ”€ techdetect.py      # Tech fingerprinting
โ”‚   โ”œโ”€โ”€ spider.py          # Web crawling
โ”‚   โ”œโ”€โ”€ netmap.py          # Network discovery
โ”‚   โ”œโ”€โ”€ payloads.py        # Payload generation
โ”‚   โ””โ”€โ”€ targets.py         # Mass target import
โ”‚
โ”œโ”€โ”€ models/                # Pydantic data models
โ”‚   โ”œโ”€โ”€ target.py
โ”‚   โ”œโ”€โ”€ finding.py
โ”‚   โ””โ”€โ”€ workflow.py
โ”‚
โ””โ”€โ”€ utils/                 # Utilities
    โ”œโ”€โ”€ tools.py           # External tool checker
    โ”œโ”€โ”€ wordlists.py       # Wordlist manager
    โ”œโ”€โ”€ config.py          # Configuration loader
    โ””โ”€โ”€ logger.py          # Rich logging

โš™๏ธ Configuration

Edit icarus.toml to customize:

[scanner]
port_timeout = 2.0
max_concurrent_ports = 500
default_ports = "21,22,80,443,445,3306,3389,8080"

[ai]
provider = "cerebras"
model = "llama3.1-8b"    # Options: llama3.1-8b, llama-3.3-70b, qwen-3-235b

[report]
output_dir = "reports"

๐Ÿ› ๏ธ Required External Tools

Tool Purpose Install
nmap Port scanning apt install nmap
ffuf Web fuzzing apt install ffuf
nuclei CVE scanning apt install nuclei
gobuster Dir brute apt install gobuster
nikto Web scanner apt install nikto
sqlmap SQL injection apt install sqlmap

Check status: python icarus.py tools


โš ๏ธ ICARUS-X is designed for authorized security testing only.

  • Always obtain written permission before testing
  • Understand your legal jurisdiction
  • Use responsibly and ethically

Unauthorized access to computer systems is illegal.


๐Ÿ“„ License

MIT License - See LICENSE for details.


ICARUS-X ยท Built with Python, AsyncIO, Typer, Rich & Cerebras AI

"Fly high, but not too close to the sun" โ˜€๏ธ

โฌ† Back to Top

Visitors

mizazhaider-ceh/Icarus-X | GitHunt