___ ____ _ ____ _ _ ____ __ __
|_ _/ ___| / \ | _ \| | | / ___| \ \/ /
| | | / _ \ | |_) | | | \___ \ _____\ /
| | |___ / ___ \| _ <| |_| |___) ||_____/ \
|___|____/_/ \_\_| \_\___/|____/ /_/\_\
Unified CLI β’ Async Architecture β’ AI-Powered Analysis
Getting Started Β· Features Β· Screenshots Β· Documentation
ICARUS-X is a modern penetration testing framework that combines 13+ security tools into one unified CLI. Built with Python's async/await for blazing-fast performance and integrated with Cerebras AI (world's fastest inference at 3000+ tokens/sec) for intelligent command suggestions.
| Feature | Description |
|---|---|
| β‘ Blazing Fast | 500+ concurrent port scans, async DNS queries |
| π€ AI-Powered | Get attack suggestions, CVE explanations, bypass techniques |
| π§ All-in-One | Recon, vuln scanning, payloads, reporting in one tool |
| π Professional | HTML/Markdown/JSON reports for clients |
| π¨ Modern UI | Rich terminal with live progress, tables, colors |
|
|
|
|
scout β High-speed reconnaissance & port scanning
spider β Web crawler with JS parsing
dirbrute β Directory/file brute-forcing (ffuf/gobuster)
vuln β Nuclei vulnerability scanning
tech β Technology stack detection
payloads β Attack payload generator
netmap β Network discovery & mapping
ai β AI-powered assistant
pentest β Full automated workflow
report β Professional report generation
tools β External tool status checker
wordlists β Wordlist browser & manager
runs β Workflow run management
- Python 3.11+
- Linux (Kali/Ubuntu), macOS, or Windows WSL2
- External tools: nmap, ffuf, nuclei (optional but recommended)
# Clone the repository
git clone https://github.com/mizazhaider-ceh/Icarus-X.git
cd Icarus-X
# Install dependencies
pip install -r requirements.txt
# (Optional) Install external tools - Kali/Debian
sudo apt install nmap ffuf gobuster nuclei nikto sqlmap hydra whatweb
# Verify installation
python icarus.py tools# Get free API key from https://cloud.cerebras.ai/
echo "CEREBRAS_API_KEY=your-key-here" > .env
# Test AI assistant
python icarus.py ai --query "how to enumerate Active Directory?"# Reconnaissance
python icarus.py scout -t example.com
python icarus.py scout -t example.com --ports 22,80,443 --tech
# Directory brute-forcing
python icarus.py dirbrute -t https://example.com
python icarus.py dirbrute -t https://example.com --ext php,html,js
# Vulnerability scanning
python icarus.py vuln -t https://example.com --severity critical,high
# Payloads
python icarus.py payloads --list shells
python icarus.py payloads --type bash --ip 10.10.14.5 --port 4444
# AI Assistant
python icarus.py ai --commands --goal "initial foothold on Linux"
python icarus.py ai --explain CVE-2024-1234
# Full pentest workflow
python icarus.py pentest -t example.com --workflow full# Create targets file
echo -e "192.168.1.0/24\nexample.com\n10.0.0.1-50" > targets.txt
# Scan all targets
python icarus.py scout --targets targets.txt# Available models (Cerebras - world's fastest inference)
python icarus.py ai --commands --goal "privesc" --model llama3.1-8b # Fast
python icarus.py ai --commands --goal "privesc" --model llama-3.3-70b # Balanced
python icarus.py ai --commands --goal "privesc" --model qwen-3-235b # Most capableIcarus-X/
βββ icarus.py # Main CLI entry point (Typer)
βββ icarus.toml # Configuration
βββ requirements.txt # Python dependencies
β
βββ core/ # Core engine
β βββ scanner.py # Async reconnaissance
β βββ workflow.py # Pentest orchestration
β βββ reporter.py # Report generation
β βββ ai_engine.py # Cerebras AI integration
β
βββ modules/ # Feature modules
β βββ dirbrute.py # Directory brute-forcing
β βββ nuclei.py # CVE scanning
β βββ techdetect.py # Tech fingerprinting
β βββ spider.py # Web crawling
β βββ netmap.py # Network discovery
β βββ payloads.py # Payload generation
β βββ targets.py # Mass target import
β
βββ models/ # Pydantic data models
β βββ target.py
β βββ finding.py
β βββ workflow.py
β
βββ utils/ # Utilities
βββ tools.py # External tool checker
βββ wordlists.py # Wordlist manager
βββ config.py # Configuration loader
βββ logger.py # Rich logging
Edit icarus.toml to customize:
[scanner]
port_timeout = 2.0
max_concurrent_ports = 500
default_ports = "21,22,80,443,445,3306,3389,8080"
[ai]
provider = "cerebras"
model = "llama3.1-8b" # Options: llama3.1-8b, llama-3.3-70b, qwen-3-235b
[report]
output_dir = "reports"| Tool | Purpose | Install |
|---|---|---|
| nmap | Port scanning | apt install nmap |
| ffuf | Web fuzzing | apt install ffuf |
| nuclei | CVE scanning | apt install nuclei |
| gobuster | Dir brute | apt install gobuster |
| nikto | Web scanner | apt install nikto |
| sqlmap | SQL injection | apt install sqlmap |
Check status: python icarus.py tools
β οΈ ICARUS-X is designed for authorized security testing only.
- Always obtain written permission before testing
- Understand your legal jurisdiction
- Use responsibly and ethically
Unauthorized access to computer systems is illegal.
MIT License - See LICENSE for details.
ICARUS-X Β· Built with Python, AsyncIO, Typer, Rich & Cerebras AI
"Fly high, but not too close to the sun" βοΈ




