Skip to content

mizazhaider-ceh/Icarus-X

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

11 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

✈️ ICARUS-X

AI-Powered Penetration Testing Framework

 ___ ____    _    ____  _   _ ____        __  __
|_ _/ ___|  / \  |  _ \| | | / ___|      \ \/ /
 | | |     / _ \ | |_) | | | \___ \  _____\  / 
 | | |___ / ___ \|  _ <| |_| |___) ||_____/  \ 
|___|____/_/   \_\_| \_\___/|____/      /_/\_\

Unified CLI β€’ Async Architecture β€’ AI-Powered Analysis

Python License Cerebras Platform


Getting Started Β· Features Β· Screenshots Β· Documentation


ICARUS-X Demo

🎯 What is ICARUS-X?

ICARUS-X is a modern penetration testing framework that combines 13+ security tools into one unified CLI. Built with Python's async/await for blazing-fast performance and integrated with Cerebras AI (world's fastest inference at 3000+ tokens/sec) for intelligent command suggestions.

Why Choose ICARUS-X?

Feature Description
⚑ Blazing Fast 500+ concurrent port scans, async DNS queries
πŸ€– AI-Powered Get attack suggestions, CVE explanations, bypass techniques
πŸ”§ All-in-One Recon, vuln scanning, payloads, reporting in one tool
πŸ“Š Professional HTML/Markdown/JSON reports for clients
🎨 Modern UI Rich terminal with live progress, tables, colors

✨ Features

πŸ” Reconnaissance

  • Async port scanning (500+ concurrent)
  • Subdomain enumeration
  • HTTP service probing
  • Technology fingerprinting
  • WHOIS lookups

πŸ”¬ Vulnerability Assessment

  • Nuclei CVE scanning
  • Severity-based filtering
  • Tag-based templates
  • JSON export for automation

πŸ’‰ Payload Generation

  • Reverse shells (Bash, Python, PHP, NC)
  • XSS payloads (alert, cookie steal)
  • SQLi (union, boolean, time-based)
  • Command injection
  • Path traversal

πŸ€– AI Assistant

  • Command suggestions for any goal
  • CVE explanations & exploitation
  • Bypass technique recommendations
  • 5 model options (Llama, GPT-OSS, Qwen)

All 13 Modules

scout      β†’ High-speed reconnaissance & port scanning
spider     β†’ Web crawler with JS parsing
dirbrute   β†’ Directory/file brute-forcing (ffuf/gobuster)
vuln       β†’ Nuclei vulnerability scanning
tech       β†’ Technology stack detection
payloads   β†’ Attack payload generator
netmap     β†’ Network discovery & mapping
ai         β†’ AI-powered assistant
pentest    β†’ Full automated workflow
report     β†’ Professional report generation
tools      β†’ External tool status checker
wordlists  β†’ Wordlist browser & manager
runs       β†’ Workflow run management

πŸ“Έ Screenshots

πŸ”§ Tool Status Check
Tool Check
python icarus.py tools
πŸ” Scout Reconnaissance
Scout Scan
python icarus.py scout --target example.com --tech
πŸ“ Directory Brute-forcing
DirBrute
python icarus.py dirbrute --target https://example.com --ext php,html
πŸ€– AI Assistant
AI Assistant
python icarus.py ai --commands --goal "enumerate SMB shares"
πŸ’‰ Payload Generator
Payloads
python icarus.py payloads --list shells

πŸš€ Quick Start

Prerequisites

  • Python 3.11+
  • Linux (Kali/Ubuntu), macOS, or Windows WSL2
  • External tools: nmap, ffuf, nuclei (optional but recommended)

Installation

# Clone the repository
git clone https://github.com/mizazhaider-ceh/Icarus-X.git
cd Icarus-X

# Install dependencies
pip install -r requirements.txt

# (Optional) Install external tools - Kali/Debian
sudo apt install nmap ffuf gobuster nuclei nikto sqlmap hydra whatweb

# Verify installation
python icarus.py tools

AI Setup (Optional)

# Get free API key from https://cloud.cerebras.ai/
echo "CEREBRAS_API_KEY=your-key-here" > .env

# Test AI assistant
python icarus.py ai --query "how to enumerate Active Directory?"

πŸ’» Usage

Quick Reference

# Reconnaissance
python icarus.py scout -t example.com
python icarus.py scout -t example.com --ports 22,80,443 --tech

# Directory brute-forcing
python icarus.py dirbrute -t https://example.com
python icarus.py dirbrute -t https://example.com --ext php,html,js

# Vulnerability scanning
python icarus.py vuln -t https://example.com --severity critical,high

# Payloads
python icarus.py payloads --list shells
python icarus.py payloads --type bash --ip 10.10.14.5 --port 4444

# AI Assistant
python icarus.py ai --commands --goal "initial foothold on Linux"
python icarus.py ai --explain CVE-2024-1234

# Full pentest workflow
python icarus.py pentest -t example.com --workflow full

Mass Target Scanning

# Create targets file
echo -e "192.168.1.0/24\nexample.com\n10.0.0.1-50" > targets.txt

# Scan all targets
python icarus.py scout --targets targets.txt

AI Model Selection

# Available models (Cerebras - world's fastest inference)
python icarus.py ai --commands --goal "privesc" --model llama3.1-8b      # Fast
python icarus.py ai --commands --goal "privesc" --model llama-3.3-70b   # Balanced
python icarus.py ai --commands --goal "privesc" --model qwen-3-235b     # Most capable

πŸ—‚οΈ Project Structure

Icarus-X/
β”œβ”€β”€ icarus.py              # Main CLI entry point (Typer)
β”œβ”€β”€ icarus.toml            # Configuration
β”œβ”€β”€ requirements.txt       # Python dependencies
β”‚
β”œβ”€β”€ core/                  # Core engine
β”‚   β”œβ”€β”€ scanner.py         # Async reconnaissance
β”‚   β”œβ”€β”€ workflow.py        # Pentest orchestration
β”‚   β”œβ”€β”€ reporter.py        # Report generation
β”‚   └── ai_engine.py       # Cerebras AI integration
β”‚
β”œβ”€β”€ modules/               # Feature modules
β”‚   β”œβ”€β”€ dirbrute.py        # Directory brute-forcing
β”‚   β”œβ”€β”€ nuclei.py          # CVE scanning
β”‚   β”œβ”€β”€ techdetect.py      # Tech fingerprinting
β”‚   β”œβ”€β”€ spider.py          # Web crawling
β”‚   β”œβ”€β”€ netmap.py          # Network discovery
β”‚   β”œβ”€β”€ payloads.py        # Payload generation
β”‚   └── targets.py         # Mass target import
β”‚
β”œβ”€β”€ models/                # Pydantic data models
β”‚   β”œβ”€β”€ target.py
β”‚   β”œβ”€β”€ finding.py
β”‚   └── workflow.py
β”‚
└── utils/                 # Utilities
    β”œβ”€β”€ tools.py           # External tool checker
    β”œβ”€β”€ wordlists.py       # Wordlist manager
    β”œβ”€β”€ config.py          # Configuration loader
    └── logger.py          # Rich logging

βš™οΈ Configuration

Edit icarus.toml to customize:

[scanner]
port_timeout = 2.0
max_concurrent_ports = 500
default_ports = "21,22,80,443,445,3306,3389,8080"

[ai]
provider = "cerebras"
model = "llama3.1-8b"    # Options: llama3.1-8b, llama-3.3-70b, qwen-3-235b

[report]
output_dir = "reports"

πŸ› οΈ Required External Tools

Tool Purpose Install
nmap Port scanning apt install nmap
ffuf Web fuzzing apt install ffuf
nuclei CVE scanning apt install nuclei
gobuster Dir brute apt install gobuster
nikto Web scanner apt install nikto
sqlmap SQL injection apt install sqlmap

Check status: python icarus.py tools


πŸ”’ Legal Disclaimer

⚠️ ICARUS-X is designed for authorized security testing only.

  • Always obtain written permission before testing
  • Understand your legal jurisdiction
  • Use responsibly and ethically

Unauthorized access to computer systems is illegal.


πŸ“„ License

MIT License - See LICENSE for details.


ICARUS-X Β· Built with Python, AsyncIO, Typer, Rich & Cerebras AI

"Fly high, but not too close to the sun" β˜€οΈ

⬆ Back to Top

Visitors

About

πŸš€ Advanced modular ai-powered penetration testing framework with unified tool integration | Combines reconnaissance, exploitation, and post-exploitation in one powerful interface | Enterprise-grade security testing made simple

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages