Get NeuroSploit running in under 5 minutes.
| Requirement | Minimum | Recommended |
|---|---|---|
| Python | 3.10+ | 3.12 |
| Node.js | 18+ | 20 LTS |
| Docker | 24+ | Latest (for Kali sandbox) |
| RAM | 4 GB | 8 GB+ |
| Disk | 2 GB | 5 GB (with Kali image) |
| LLM API Key | 1 provider | Claude recommended |
git clone https://github.com/your-org/NeuroSploitv2.git
cd NeuroSploitv2
# Create your environment file
cp .env.example .envEdit .env and add at least one API key:
# Pick one (or more):
ANTHROPIC_API_KEY=sk-ant-... # Claude (recommended)
OPENAI_API_KEY=sk-... # GPT-4
GEMINI_API_KEY=AI... # Gemini Pro
OPENROUTER_API_KEY=sk-or-... # OpenRouter (any model)No API key? Use a local LLM (Ollama or LM Studio) -- see Local LLM Setup below.
pip install -r backend/requirements.txtcd frontend
npm install
cd ..The Kali sandbox enables isolated tool execution (Nuclei, Nmap, SQLMap, etc.) in Docker containers.
# Requires Docker Desktop running
./scripts/build-kali.sh --testThis builds a Kali Linux image with 28 pre-installed security tools. Takes ~5 min on first build.
No Docker? NeuroSploit works without it -- the agent uses HTTP-only testing. Docker adds tool-based scanning (Nuclei, Nmap, etc.).
Terminal 1 -- Backend:
uvicorn backend.main:app --host 0.0.0.0 --port 8000 --reloadTerminal 2 -- Frontend:
cd frontend
npm run devOpen: http://localhost:5173
# Build frontend
cd frontend && npm run build && cd ..
# Start backend (serves frontend too)
uvicorn backend.main:app --host 0.0.0.0 --port 8000Open: http://localhost:8000
./start.shcurl http://localhost:8000/api/healthExpected response:
{
"status": "healthy",
"app": "NeuroSploit",
"version": "3.0.0",
"llm": {
"status": "configured",
"provider": "claude",
"message": "AI agent ready"
}
}Open http://localhost:8000/api/docs for interactive API documentation.
- Open the web interface
- Click Auto Pentest in the sidebar
- Enter a target URL (e.g.,
http://testphp.vulnweb.com) - Click Start Auto Pentest
- Watch the 3-stream parallel scan in real-time
curl -X POST http://localhost:8000/api/v1/agent/run \
-H "Content-Type: application/json" \
-d '{
"target": "http://testphp.vulnweb.com",
"mode": "auto_pentest"
}'- Click Vuln Lab in the sidebar
- Pick a vulnerability type (e.g.,
xss_reflected) - Enter target URL
- Click Run Test
| Page | What it does |
|---|---|
Dashboard (/) |
Stats, severity charts, recent activity |
Auto Pentest (/auto) |
One-click full autonomous pentest |
Vuln Lab (/vuln-lab) |
Test specific vuln types (100 available) |
Terminal Agent (/terminal) |
AI chat + command execution |
Sandboxes (/sandboxes) |
Monitor Kali containers in real-time |
Scheduler (/scheduler) |
Schedule recurring scans |
Reports (/reports) |
View/download generated reports |
Settings (/settings) |
Configure LLM providers, features |
# Install Ollama
curl -fsSL https://ollama.ai/install.sh | sh
# Pull a model
ollama pull llama3.1
# Add to .env
echo "OLLAMA_BASE_URL=http://localhost:11434" >> .env- Download from lmstudio.ai
- Load any model (e.g., Mistral, Llama)
- Start the server on port 1234
- Add to
.env:LMSTUDIO_BASE_URL=http://localhost:1234
# Build image
./scripts/build-kali.sh
# Rebuild from scratch
./scripts/build-kali.sh --fresh
# Build + verify tools work
./scripts/build-kali.sh --test
# Check running containers (via API)
curl http://localhost:8000/api/v1/sandbox/
# Monitor via web UI
# Open http://localhost:8000/sandboxesnuclei, naabu, httpx, subfinder, katana, dnsx, uncover, ffuf, gobuster, dalfox, waybackurls, nmap, nikto, sqlmap, masscan, whatweb, curl, wget, git, python3, pip3, go, jq, dig, whois, openssl, netcat, bash
Installed inside the container automatically when first needed:
wpscan, dirb, hydra, john, hashcat, testssl, sslscan, enum4linux, dnsrecon, amass, medusa, crackmapexec, gau, gitleaks, anew, httprobe, dirsearch, wfuzz, arjun, wafw00f, sslyze, commix, trufflehog, retire, fierce, nbtscan, responder
Check your .env has at least one valid API key:
curl http://localhost:8000/api/health | python3 -m json.toolBuild the Docker image:
./scripts/build-kali.shStart Docker Desktop, then retry.
lsof -i :8000
kill <PID>Dev mode: ensure frontend is running (npm run dev in /frontend).
Production: ensure frontend/dist/ exists (cd frontend && npm run build).
- Read the full README.md for architecture details
- Explore the 100 vulnerability types in Vuln Lab
- Set up scheduled scans for continuous monitoring
- Try the Terminal Agent for interactive AI-guided testing
- Check the Sandbox Dashboard to monitor container health
NeuroSploit v3 - AI-Powered Autonomous Penetration Testing Platform