Skip to content

SnapExploit Elite is a powerful security analysis platform designed for security professionals. It combines static code analysis, web vulnerability scanning, and AI-powered penetration testing to help identify and remediate security vulnerabilities in web applications and codebases.

Notifications You must be signed in to change notification settings

joshyboo25/SnapExploitElite

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

19 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

icon

SnapExploit Elite - Enterprise Security Analysis Platform

SnapExploit Elite is a powerful security analysis platform that combines static code analysis, web vulnerability scanning, and AI-powered penetration testing to help security professionals identify and remediate security vulnerabilities in web applications and codebases.

πŸš€ Features

πŸ” Security Scanner

  • Static Code Analysis: Scan JavaScript and Python files for common security vulnerabilities
  • Web Application Scanning: Analyze web applications for vulnerabilities by crawling and testing
  • Admin Interface Discovery: Identify and test admin login pages with default credentials
  • Comprehensive Rule Set: Detect hardcoded credentials, SQL injection, XSS, eval usage, and more

πŸ€– AI-Powered Penetration Testing

  • LLM Integration: Leverage large language models (Ollama) for advanced vulnerability analysis
  • Automated Exploitation: Test discovered vulnerabilities with AI-assisted techniques
  • Attack Scenario Generation: Get detailed attack chains and exploitation paths
  • Remediation Guidance: Receive prioritized, actionable recommendations

πŸ“Š Results & Reporting

  • Interactive Dashboard: Visualize scan results with severity-based metrics
  • Detailed Findings: View comprehensive vulnerability details with evidence
  • Professional Reports: Generate HTML reports for stakeholders
  • Export Options: Save results in JSON, CSV, and text formats

πŸ› οΈ Advanced Features

  • Admin Credential Testing: Test discovered admin interfaces with common credentials
  • Session Management Testing: Identify session fixation and insecure cookie practices
  • Customizable Scans: Configure scan parameters and rules
  • Recent Scans History: Track and revisit previous scan results

πŸ“¦ Installation

Prerequisites

  • Python 3.7+
  • Ollama (for LLM features)
  • pip package manager

Install from Source

  1. Clone the repository:
[git clone https://github.com/joshyboo25/SnapExploitElite.git]
cd SnapExploitElite
  1. Install dependencies:
pip install -r requirements.txt
  1. Install Ollama (for LLM features):
**macOS**: `brew install ollama`

**Linux**: curl -fsSL https://ollama.ai/install.sh | sh
  1. Pull an LLM model (e.g., llama2):
ollama pull llama2
  1. Start Ollama server:
ollama serve

Run the Application

python snap_ui_main.py

Build Executable (Optional)

python build.py

🎯 Usage

Getting Started

  1. Launch the application
  2. Select a scan type (File, Directory, or URL)
  3. Enter your target
  4. Configure scan options
  5. Click "Start Security Scan"

Key Workflows

Code Scanning

  1. Select "File" or "Directory" scan type
  2. Browse to your target file/directory
  3. Enable Python scanning if needed
  4. Start the scan
  5. Review findings in the Results tab

Web Application Scanning

  1. Select "URL" scan type
  2. Enter the target URL
  3. Enable admin interface scanning
  4. Start the scan
  5. Test discovered admin credentials in the Admin tab

AI-Powered Analysis

  1. Ensure Ollama is running and configured
  2. Run a scan to discover vulnerabilities
  3. Click "Run LLM Analysis" for AI-powered insights
  4. Review attack scenarios and remediation guidance

βš™οΈ Configuration

LLM Settings

Configure LLM integration in the Settings tab:

  • LLM API URL: Typically http://localhost:11434/api/generate
  • LLM Model: Model name (e.g., llama2)
  • Temperature: Controls randomness (0.1-1.0)
  • Max Tokens: Maximum response length

Scanner Settings

  • Max File Size: Limit for scanned files (MB)
  • Scan Timeout: Maximum scan duration (seconds)
  • Admin Paths: Custom paths to test for admin interfaces
  • Credentials: Default credentials to test against admin interfaces

πŸ“ Project Structure

SnapExploitElite/
β”œβ”€β”€ assets/                # Application assets (icons, etc.)
β”œβ”€β”€ config/                # Configuration files
β”‚   β”œβ”€β”€ constants.py       # Application constants and settings
β”‚   └── __init__.py
β”œβ”€β”€ core/                  # Core functionality
β”‚   β”œβ”€β”€ admin_engine.py    # Admin interface discovery engine
β”‚   β”œβ”€β”€ models.py          # Data models
β”‚   β”œβ”€β”€ scanner.py         # Security scanner
β”‚   └── __init__.py
β”œβ”€β”€ reports/               # Report generation
β”‚   β”œβ”€β”€ generator.py       # Report generator
β”‚   └── templates/         # HTML report templates
β”œβ”€β”€ ui/                    # User interface components
β”‚   β”œβ”€β”€ admin_tab.py       # Admin findings tab
β”‚   β”œβ”€β”€ main_window.py     # Main application window
β”‚   β”œβ”€β”€ penetration_tab.py # Penetration testing tab
β”‚   β”œβ”€β”€ results_tab.py     # Results display tab
β”‚   β”œβ”€β”€ scanner_tab.py     # Scanner controls tab
β”‚   β”œβ”€β”€ settings_tab.py    # Settings tab
β”‚   └── __init__.py
β”œβ”€β”€ build.py               # Build script for executable
β”œβ”€β”€ requirements.txt       # Python dependencies
β”œβ”€β”€ setup.py               # Package configuration
└── snap_ui_main.py        # Main application entry point

🀝 Contributing

Contributions are welcome! Please follow these steps:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/AmazingFeature)
  3. Commit your changes (git commit -m 'Add some AmazingFeature')
  4. Push to the branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

πŸ“œ License

This project is licensed under the MIT License - see the LICENSE) file for details.

πŸ“ž Support

For support, please open an issue on the GitHub repository or contact the development team at Collinsjosh767@gmail.com.

πŸ”’ Security Considerations

  • Ethical Use: This tool is designed for security professionals to identify vulnerabilities in systems they own or have permission to test. Unauthorized scanning of systems is illegal.
  • Data Privacy: Scan results may contain sensitive information. Store reports securely.
  • Network Impact: Web scanning can generate significant network traffic. Use responsibly.
  • False Positives: Always verify findings manually before taking action.

πŸš€ Roadmap

  • Add support for additional programming languages
  • Implement automated vulnerability exploitation
  • Add integration with vulnerability databases (CVE, CWE)
  • Implement scheduled scanning
  • Add team collaboration features
  • Implement cloud-based scanning
  • Add support for additional LLM providers

πŸ“š Documentation

For more detailed documentation, please refer to:

πŸ™Œ Acknowledgments

  • Ollama team for their excellent LLM serving platform
  • BeautifulSoup for HTML parsing capabilities
  • The open-source community for countless valuable resources

About

SnapExploit Elite is a powerful security analysis platform designed for security professionals. It combines static code analysis, web vulnerability scanning, and AI-powered penetration testing to help identify and remediate security vulnerabilities in web applications and codebases.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published