Skip to content

Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, with GUI & CLI. Open source by AUX-441 Team.

License

Notifications You must be signed in to change notification settings

cyberSecurityAd1/SecuSploitX

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

30 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

SecuSploitX - Advanced Offensive Security & Penetration Testing Suite

SecuSploitX Banner

All-in-One Cybersecurity & AI Offensive Toolkit
By the AUX-441 Team | Red Team, Blue Team, AI Security, and More
Modular Β· Cross-Platform Β· Community-Driven Β· Inspired by Industry Leaders


SecuSploitX GUI Screenshot Graphical User Interface (GUI)

SecuSploitX Terminal Screenshot Terminal / CLI Mode


🚩 About SecuSploitX

SecuSploitX is a next-generation, open-source, modular, and extensible penetration testing and cyber defense suite.
Inspired by the world’s top tools (Metasploit, Nmap, Burp Suite), SecuSploitX takes security automation to the next level with:

  • Web & Network Security Modules
  • Phishing & Social Engineering Simulators
  • AI-based Automation, Chatbots, and Content Generators
  • GUI & CLI Modes for Every User
  • Cross-platform Support: Windows, Linux, macOS, Android (via Termux)
  • Dockerized Deployments for Hassle-Free Usage
  • Extensive Documentation & Community Support

Legal Disclaimer:
This tool is for educational, research, and authorized professional use only.
Unauthorized use is illegal and strictly forbidden.


πŸ§‘β€πŸ’» About Us & Contributors

SecuSploitX is built by a talented, multidisciplinary team:

Core Team & Roles

  • Joel
    Lead UI Designer & Visual Planner
    Designs and implements all graphical elements, user flows, and ensures SecuSploitX's GUI is both intuitive and visually compelling ، Cybersecurity analyst, Blue Team , Security Operations Analyst .

  • Tara
    Lead Developer & Technical Assistant
    Backend logic, module integration, and technical troubleshooting. Bridges AI, network code, and usability for smooth operation.

  • Fatheme
    AI & Core Developer, Project Lead
    Creator of SecuSploitX's AI modules and architect of offensive/defensive logic for penetration testing and automation. Manages releases and documentation.

  • aux / AUX-441
    Main Programmer, Security Researcher, Project Lead
    Advanced cybersecurity modules, exploits, real-world attack/defense code, new feature development, and public project presentation.

Special Thanks & Open Source Contributors

We appreciate all testers, issue reporters, and those who help build a safer world.
Want to join? See Contributing Guidelines


πŸ† Key Features


🌐 Web Security

  • πŸ›‘οΈ SQL Injection Scanner
    Automated SQLi detection with advanced payload fuzzing and error fingerprinting.

  • πŸ—‚οΈ Subdirectory Finder
    Uncovers hidden directories/admin paths using powerful wordlists.

  • πŸ”Ž Deep Site Scanner
    Comprehensive crawling & vulnerability analysis for web assets.

  • πŸͺœ Brute Force Simulator
    Intelligent, adaptive username/password brute force with real-time feedback.

  • πŸ” Admin/Login Finder
    Locates concealed admin/login panels with next-gen heuristics.

  • 🧾 Header Analyzer
    Detects HTTP header misconfigurations & missing security headers.

  • πŸ”‘ SSL/TLS Checker
    Validates certificates, expiry, chain, and supported ciphers.

  • 🧱 Firewall Detector
    Identifies WAFs, firewalls, and advanced defensive mechanisms.

  • 🎭 Phishing AI
    AI-powered phishing email/page/content generator & training simulator.


πŸŒπŸ”— Network & Infrastructure

  • πŸš€ Port Scanner
    Lightning-fast, multi-threaded scan (top 100/1000/custom ports).

  • 🌐 DNS Enumeration
    Discover all DNS records: A, AAAA, MX, NS, TXT, CNAME, SOA, PTR, SRV.

  • 🏷️ Subdomain Finder
    Massive concurrent subdomain enumeration with customizable wordlists.


πŸͺŸ Windows Offensive (GUI)

  • πŸ•΅οΈβ€β™‚οΈ InfoStealer Builder (GUI only)
    Customizable info-stealer generator for research and defense simulation.

  • πŸ–₯️ RDP Sec (RAT) (GUI only)
    RAT simulator for blue team defense and training labs.

  • πŸ’£ RansomApp (GUI only)
    In-depth ransomware simulation lab for testing and research.

  • πŸŒ€ SystemTroll (GUI only)
    System crash/test simulator for resilience and defense scenarios.


πŸ€– AI & Automation

  • πŸ€– SecuSploitX Chatbot
    ML/AI-powered assistant for security Q&A and module guidance.

  • 🧠 PhishCreator AI
    Generates realistic phishing scenarios/content with machine learning.


🎣 Phishing Modules

  • πŸ•ΉοΈ Steam Phishing Generator
    Create advanced, customizable phishing pages targeting Steam authentication flows for awareness and simulation.

  • πŸ“Έ Instagram Phishing Generator
    Simulate Instagram login attacks for training, with realistic UI and anti-detection features.

  • πŸ“· Camera Capture Phishing
    Deploy phishing pages that request or simulate camera access to demonstrate real-world attack scenarios (safety/consent features included).

  • πŸ“ Location Capture Phishing
    Simulate phishing pages or payloads designed to request geolocation data from targets, for demonstrating the risks of location leaks.

⚠️ For educational, research, and authorized testing only. All modules include warnings and ethical disclaimers.


πŸ“Š General

  • πŸ“ Logging & Reporting
    Detailed, exportable logs, reports, and output files for every module.

πŸ’‘ Fully modular:
Add or customize modules and scripts with ease.
See Wiki/Modules for a full list!


πŸ“¦ Installation & Quick Start

SecuSploitX supports all major operating systems and runs on Python 3.13+.
Choose your preferred deployment method:


🐧 Linux & macOS

1. Clone the repository

git clone https://github.com/AUX-441/SecuSploitX.git
cd SecuSploitX

2. Install Python dependencies

python3 -m venv venv
source venv/bin/activate    # For Linux / macOS
pip install --upgrade pip
pip install -r requirements.txt

3. Run SecuSploitX (Terminal/CLI)

python main.py

4. Run SecuSploitX (GUI)

python GUI/Application.py

Tip: For macOS, you may need python3 instead of python.


πŸ“± Android (Termux)

SecuSploitX works fully in Termux!

1. Install Termux & Python

pkg update && pkg upgrade
pkg install python git

2. Clone SecuSploitX

git clone https://github.com/AUX-441/SecuSploitX.git
cd SecuSploitX

3. Install dependencies

pip install --upgrade pip
pip install -r requirements.txt

4. Run SecuSploitX (Terminal Mode)

python main.py

GUI mode is not supported in Termux due to X11 limitations.


πŸͺŸ Windows

1. Install Python 3.13+

2. Clone the repository

git clone https://github.com/AUX-441/SecuSploitX.git
cd SecuSploitX

3. Install dependencies

python -m pip install --upgrade pip
python -m pip install -r requirements.txt

4. Run SecuSploitX (Terminal or GUI)

python main.py
# or
python GUI\Application.py

🐳 Docker (Universal, Zero-Conflict)

Why Use Docker?

  • Zero system dependency hassle
  • Reproducible environment for teams and CI/CD pipelines
  • Full isolation and easy removal

1. Install Docker for your OS

2. Build the Docker Image

cd SecuSploitX
docker build -t secusploitx .

3. Run SecuSploitX (Terminal/CLI)

docker run -it --rm secusploitx

4. Run SecuSploitX (GUI mode, X11 on Linux)

docker run -it --rm -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix secusploitx python GUI/Application.py

For Docker GUI usage on Windows/Mac: See Wiki for X11/GUI details

Dockerfile Example:

FROM python:3.13.3-slim

ENV PYTHONUNBUFFERED=1 \
    PYTHONDONTWRITEBYTECODE=1

RUN apt-get update && apt-get install -y \
    build-essential \
    libgl1 \
    libglib2.0-0 \
    portaudio19-dev \
    && rm -rf /var/lib/apt/lists/*

WORKDIR /app

COPY requirements.txt .
COPY . .

RUN pip install --upgrade pip \
    && pip install -r requirements.txt

EXPOSE 5000

CMD ["python", "main.py"]

πŸ› οΈ Usage

SecuSploitX is designed to be intuitive for both beginners and pros.

Terminal Mode

  • Interactive Menu: All modules accessible, step-by-step configuration prompts
  • Output: Results printed and saved in /output folder

GUI Mode

  • Modern, User-Friendly Interface
  • Visual Reports: Easy interpretation, export as HTML/PDF
  • Advanced Modules: (InfoStealer, RAT, RansomApp, SystemTroll) GUI only

Sample Workflows

SQL Injection Test (Terminal)

python main.py
# Select: Web Security Test (SQLi)
# Enter target URL (e.g. https://target.com/login)

Port Scan (CLI)

python main.py
# Select: Port Scanner
# Enter target host (e.g. example.com)
# Choose scan type (top 1000, all, or custom)

Deep Scan & Export (GUI)

  1. Run: python GUI/Application.py
  2. Click "Deep Site Scanner"
  3. Enter target, configure, and export report

See Wiki/Modules for detailed usage of every module.


πŸ“š Documentation & Help


πŸ” Security Policy & Reporting

  • Please report vulnerabilities and sensitive security issues privately.
  • Security issues, bug reports, and all confidential communications should be sent directly to:
    πŸ“§ [email protected]
  • See SECURITY.md for full disclosure and reporting information.
  • Absolutely no illegal use is permitted.

🀝 Contributing

  • Fork the repository and create your feature/fix branch.
  • Follow CONTRIBUTING.md for code style and PR requirements.
  • Submit detailed PRs with documentation.
  • Join the community for support, feedback, and collaboration!

🌟 Credits & Acknowledgments

SecuSploitX is the result of passion, expertise, and open-source spirit.
Special thanks to:

  • Joel – UI/UX Design, Branding
  • Tara – Core Coding, Integration, Documentation
  • AUX – AI, Security, Project Management
  • Fatheme – Programming, Research
  • mynameismama6zaa – Community Support
  • Jcyber-protect – Development, QA
  • FAtheme – Module Testing
  • AUX-441 – Project Lead

And all contributors at GitHub Contributors


🏷️ Tags & SEO Topics

penetration-testing offensive-security ethical-hacking cybersecurity ai-security web-security network-security redteam blueteam python security-automation metasploit-alternative docker termux cross-platform security-toolkit


βš–οΈ License

Β© AUX-441 Team
Licensed under CC BY-NC-ND 4.0
No commercial use, copy, or redistribution without written consent.


πŸ“¬ Contact & Community


About

Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, with GUI & CLI. Open source by AUX-441 Team.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • HTML 58.7%
  • Python 41.1%
  • Other 0.2%