Skip to content

Dr-yato/Polyscope

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

13 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” PolyScope

The Ultimate All-in-One Security Research & Exploitation Framework

ProjectDiscovery meets CodeQL meets OffSec-labs, packed into one static binary (< 35 MB)

PolyScope is a revolutionary cybersecurity tool that combines automated research, reconnaissance, exploitation, and reporting into a single powerful binary. Perfect for security researchers, red teamers, and penetration testers who need comprehensive security assessments with minimal setup.


🌟 What is PolyScope?

PolyScope is an advanced security framework that automatically:

  • πŸ”¬ Researches technology stacks and CVEs by mining OSS projects and vulnerability databases
  • 🎯 Scans targets with comprehensive reconnaissance pipelines
  • πŸ’₯ Generates custom exploits using local AI and rule-based heuristics
  • πŸ“Š Correlates findings with research data to identify root causes
  • πŸ“ Creates beautiful reports with actionable mitigation strategies

Think of it as having an entire security team in a single binary that works completely offline after initial setup.


πŸš€ Key Features

πŸ”¬ Automated Research Engine

  • Mines GitHub repositories for vulnerability patterns
  • Builds knowledge graphs linking technologies to CVEs
  • Analyzes patch history and security patterns
  • Creates searchable vulnerability databases

🎯 Comprehensive Reconnaissance

  • Subdomain enumeration with multiple techniques
  • Port scanning and service detection
  • Technology stack fingerprinting
  • Automated vulnerability discovery using Nuclei

πŸ’₯ AI-Powered Exploit Generation

  • Local LLM integration (CodeLlama 7B) for payload generation
  • Template-based exploit creation
  • Custom PoC generation in Python and Bash
  • Evasion technique suggestions

πŸ“Š Intelligent Correlation

  • Maps live findings to research knowledge graph
  • Identifies potential root causes and attack chains
  • Suggests prioritized remediation strategies
  • Tracks vulnerability lifecycle and patches

πŸ“ Professional Reporting

  • Beautiful Markdown and HTML reports
  • Executive summaries with risk scoring
  • Technical details with evidence
  • Actionable mitigation recommendations
  • Blue team replay kits

πŸ› οΈ How PolyScope Helps You

For Red Teams & Penetration Testers:

  • Faster reconnaissance with automated tool orchestration
  • Custom exploit development without manual coding
  • Comprehensive attack surface mapping
  • Professional client deliverables

For Security Researchers:

  • Vulnerability research automation with pattern discovery
  • Knowledge graph construction for technology analysis
  • PoC generation for responsible disclosure
  • Research documentation with detailed reports

For Bug Hunters:

  • Target analysis with technology fingerprinting
  • Exploit template generation for common vulnerabilities
  • Automated scanning with custom nuclei integration
  • Finding correlation across multiple targets

For Security Teams:

  • Asset discovery and attack surface monitoring
  • Vulnerability assessment with prioritization
  • Threat intelligence through research correlation
  • Compliance reporting with detailed documentation

⚑ Quick Start

πŸ› οΈ Option 1: Build from Source

# Clone repository
git clone https://github.com/Dr-yato/Polyscope.git
cd Polyscope

# Run installer
./install.sh

# Or build manually
go mod tidy
go build -o polyscope ./cmd/polyscope

🐳 Option 2: Docker

# Pull and run
docker pull ghcr.io/dr-yato/polyscope:latest
docker run -it --rm ghcr.io/dr-yato/polyscope:latest

# Or build locally
git clone https://github.com/Dr-yato/Polyscope.git
cd Polyscope
docker build -t polyscope .
docker run -it --rm polyscope

2. Initialize Environment

./polyscope init

3. Start Scanning

# Research a technology
./polyscope research --tech laravel

# Scan a target
./polyscope scan --target example.com

# Generate exploits
./polyscope exploit --use graph.db

# Full automated pipeline
./polyscope autopwn --target lab.yaml

πŸ“– Detailed Usage

πŸ”¬ Research Mode

Research technology stacks and build knowledge graphs:

# Research specific technologies
./polyscope research --tech "nginx"
./polyscope research --tech "wordpress" 
./polyscope research --tech "laravel"

# Research with verbose output
./polyscope research --tech "django" --verbose

Output: Creates graph.db with vulnerability relationships and results/graphs/ with JSON research data.

🎯 Reconnaissance Mode

Comprehensive target scanning and enumeration:

# Basic scan
./polyscope scan --target example.com

# Scan with custom threads and HTML report
./polyscope scan --target example.com --threads 100 --html

# JSON output for automation
./polyscope scan --target 192.168.1.0/24 --json --verbose

Output:

  • results/scans/ - Raw scan data
  • results/reports/ - Markdown and HTML reports

πŸ’₯ Exploit Generation

Generate custom exploits from research data:

# Generate exploits from research graph
./polyscope exploit --use graph.db

# Generate with custom LLM prompt
./polyscope exploit --use graph.db --llm-prompt "Focus on web application vulnerabilities"

# Generate for specific CVE
./polyscope exploit --use graph.db --cve CVE-2023-1234

Output:

  • results/exploits/ - Exploit templates (JSON)
  • results/poc/ - Ready-to-use PoC scripts (Python/Bash)

πŸš€ AutoPwn Mode

Fully automated security assessment:

# Complete pipeline against a target
./polyscope autopwn --target lab.yaml

# Unsafe mode (disable security restrictions)
./polyscope autopwn --target internal.company.com --unsafe

Output: Complete assessment with research, scanning, exploitation, and reporting.

πŸ–₯️ Interactive Mode

Launch the beautiful terminal UI:

./polyscope tui

πŸ”§ Advanced Configuration

Global Flags

  • --verbose, -v - Detailed output
  • --threads, -t - Concurrent operations (default: 50)
  • --timeout - Operation timeout in seconds (default: 30)
  • --json - JSON output format
  • --html - Generate HTML reports
  • --no-color - Disable colored output
  • --unsafe - Disable security restrictions

LLM Integration

PolyScope includes a local CodeLlama 7B model for offline exploit generation:

# Custom LLM prompts
./polyscope exploit --use graph.db --llm-prompt "Generate SQL injection payloads for MySQL"

# The LLM enhances exploit templates with:
# - Evasion techniques
# - Alternative payloads  
# - Bypass methods
# - Custom attack vectors

Plugin System

Extend PolyScope with custom modules:

# List available plugins
./polyscope list-modules

# Plugins are auto-loaded from plugins/*.so
# Build custom plugins implementing the Module interface

πŸ“ Output Structure

polyscope/
β”œβ”€β”€ results/
β”‚   β”œβ”€β”€ graphs/           # Research knowledge graphs
β”‚   β”œβ”€β”€ scans/            # Raw scan results (JSON)
β”‚   β”œβ”€β”€ reports/          # Markdown/HTML reports
β”‚   β”œβ”€β”€ exploits/         # Generated exploit templates
β”‚   └── poc/              # Proof-of-concept scripts
β”œβ”€β”€ assets/
β”‚   β”œβ”€β”€ models/           # Local LLM models
β”‚   β”œβ”€β”€ templates/        # Report templates
β”‚   └── nuclei/           # Custom nuclei templates
└── graph.db             # Knowledge graph database

πŸ›‘οΈ Security Features

Sandboxed Execution

  • Runs in isolated network namespaces
  • Drops privileges automatically
  • Firewall rules prevent data exfiltration
  • Use --unsafe only in controlled environments

Offline Operation

  • 100% offline after initial setup
  • No external API dependencies during scans
  • Local LLM for exploit generation
  • Cached vulnerability databases

Data Protection

  • No telemetry or data collection
  • All processing happens locally
  • Encrypted knowledge graph storage
  • Secure temporary file handling

πŸ”§ Installation Requirements

System Requirements

  • OS: Linux (amd64/arm64), macOS (Intel/Apple Silicon)
  • Memory: 8GB RAM minimum (16GB recommended)
  • Storage: 10GB free space
  • Network: Internet for initial setup only

Dependencies

PolyScope automatically installs:

  • Go security tools (nuclei, httpx, subfinder, etc.)
  • System utilities (nmap, curl, jq)
  • Local LLM model (CodeLlama 7B quantized)

πŸ“Š Example Report Output

PolyScope generates professional security reports:

Markdown Report

# PolyScope Security Assessment Report

**Target**: example.com  
**Risk Level**: HIGH  
**Findings**: 15 vulnerabilities found

## Executive Summary
Security assessment revealed critical SQL injection and XSS vulnerabilities...

## Vulnerabilities Found
### SQL Injection (Critical)
- **Impact**: Complete database compromise possible
- **Recommendation**: Implement parameterized queries

HTML Report

Beautiful web-based reports with:

  • πŸ“Š Interactive charts and metrics
  • 🎨 Color-coded severity levels
  • πŸ“± Mobile-responsive design
  • πŸ”— Clickable references and links

🀝 Plugin Development

Create custom modules implementing the Module interface:

type Module interface {
    Name() string
    Init(*Config) error
    Run(context.Context, interface{}) (interface{}, error)
}

🎯 Use Cases

Red Team Engagements

# 1. Research target technology stack
./polyscope research --tech "nginx"

# 2. Comprehensive reconnaissance  
./polyscope scan --target company.com --html

# 3. Generate custom exploits
./polyscope exploit --use graph.db

# 4. Execute full assessment
./polyscope autopwn --target company.com

Bug Bounty Hunting

# Automated recon pipeline
./polyscope scan --target *.bugcrowd.com --threads 200

# Technology-specific research
./polyscope research --tech "wordpress"
./polyscope research --tech "react"

# Generate targeted exploits
./polyscope exploit --use graph.db --target api.example.com

Vulnerability Research

# Research emerging technologies
./polyscope research --tech "nextjs"

# Analyze vulnerability patterns
./polyscope research --tech "laravel" --verbose

# Generate research reports
./polyscope scan --target testlab.local --json

⚠️ Legal Disclaimer

PolyScope is designed for authorized security testing only. Users are responsible for:

  • βœ… Obtaining proper authorization before testing
  • βœ… Complying with applicable laws and regulations
  • βœ… Using the tool ethically and responsibly
  • ❌ Never testing systems without explicit permission

The authors are not responsible for misuse of this tool.


πŸ† Why Choose PolyScope?

Feature PolyScope Traditional Tools
Setup Time 5 minutes Hours/Days
Tool Integration βœ… Built-in ❌ Manual scripting
Offline Operation βœ… 100% offline ❌ Requires internet
AI Enhancement βœ… Local LLM ❌ Manual exploit dev
Professional Reports βœ… Auto-generated ❌ Manual creation
Knowledge Correlation βœ… Intelligent linking ❌ Manual analysis
Binary Size < 35 MB Multiple GB

🌐 Community & Support


πŸ“ License

PolyScope is released under the MIT License. See LICENSE for details.


πŸ‘¨β€πŸ’» Creator

Created by dr-yato
🌐 Site: hunter3.ninja
πŸ“§ Contact: root@hunter3.ninja
πŸ™ GitHub: @Dr-yato


Happy Hacking! πŸ”

"Because security should be simple, powerful, and accessible to everyone."

About

The Ultimate All-in-One Security Research & Exploitation Framework

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors