System for Heuristic Analysis, Discovery, and Offensive Work
⚠️ Disclaimer: This tool is intended for authorized security testing and educational purposes only. The creators assume no liability for misuse.
Hunter's SHADOW is an AI-powered autonomous agent designed to act as a force multiplier for bug bounty hunters and penetration testers. Instead of manually running disjointed tools, SHADOW acts as an intelligent orchestrator that:
- Observes: Scans targets using industry-standard tools (
nmap,nuclei, etc.). - Orients: Uses Google's Gemini 2.5 Flash model to analyze output and identify interesting vectors.
- Decides: Formulates a custom strategy based on the specific target surface (e.g., "This looks like an API, I should switch to fuzzing endpoints").
- Acts: Executes the next logical tool with precise parameters.
- Automated Recon: Full port scans, service detection, and directory enumeration.
- Web Vulnerability Scanning: Integration with
nucleifor template-based checking. - Strategic Reasoning: Two-stage AI logic (Strategy Generation -> Tactical Execution).
- Reporting: Automatic generation of timeline-based Markdown reports.
- Dockerized: Zero-dependency installation via Docker.
- Deep Exploitation: Integration with
sqlmapandmetasploit(RPC) for safe exploitation verification. - Persistence: Database storage to pause/resume long-running campaigns.
- Interactive Mode: A chat interface to collaborate with the AI during a scan.
- Model Context Protocol (MCP): Implementation of standard protocols to connect with other AI agents and knowledge bases.
- Multi-Agent Swarm: Separating duties into specialized agents (e.g., a "Recon Agent" feeding a "Vulnerability Analyst").
See SHADOW.md for detailed installation and usage instructions.