Date: January 13, 2025
Developer: bad-antics development
Version: 2.0 (Enhanced)
- Created SQLite database:
nullsec.db(52KB) - 6 tables implemented:
- targets - Target management with full metadata
- sessions - Active shell/connection tracking
- attacks - Attack history and results
- vulnerabilities - CVE and exploit tracking
- workspaces - Multi-workspace support
- reports - Generated reports storage
- Default workspace initialized
- Full CRUD operations supported
- Created:
utils/target-db.py(15KB, executable) - Features:
- Add/edit/delete targets
- Import from nmap XML
- Import from CSV files
- Export to CSV/JSON
- Quick scan integration
- Target notes and tags
- Status tracking (unknown/alive/compromised)
- Workspace isolation
- Interactive menu mode
- Command-line mode
Usage:
# Interactive mode
./utils/target-db.py
# CLI mode
./utils/target-db.py list
./utils/target-db.py add 192.168.1.100 server01
./utils/target-db.py scan 192.168.1.100
./utils/target-db.py import-nmap scan-results.xml
./utils/target-db.py export-csv targets.csv- Created:
utils/netmgr.py(17KB, executable) - Features:
- Real-time connection monitoring
- Live dashboard with 3-second refresh
- Protocol statistics
- Bandwidth usage tracking
- Device discovery & profiling
- MAC vendor lookup
- Listening ports detection
- Top talkers analysis
- Suspicious activity alerts
- Network snapshots to database
- JSON export
Usage:
# Live dashboard (default)
./utils/netmgr.py monitor
# List connections
./utils/netmgr.py connections
# List devices
./utils/netmgr.py devices
# Show listening ports
./utils/netmgr.py ports
# Protocol statistics
./utils/netmgr.py stats
# Bandwidth usage
./utils/netmgr.py bandwidth
# Save snapshot
./utils/netmgr.py snapshot
# Export to JSON
./utils/netmgr.py export network-data.json- Created:
enhance-framework.py(executable) - Features:
- Automated dependency installation
- Database initialization
- Utility script creation
- Documentation generation
- Interactive enhancement process
-
ENHANCEMENTS_v2.md (14KB) - Full enhancement details
- Feature descriptions
- API endpoint documentation
- WebSocket events
- Database schema
- Installation instructions
- Usage examples
- Future roadmap
-
API_DOCUMENTATION.md (1.4KB) - Quick API reference
- All REST endpoints
- WebSocket events
- Request/response examples
-
README-ENHANCEMENTS.md (this file) - Quick summary
- Created:
requirements-enhanced.txt - Dependencies:
- Flask 3.0.0
- flask-socketio 5.3.5
- flask-cors 4.0.0
- python-socketio 5.10.0
- python-engineio 4.8.0
- Werkzeug 3.0.1
- simple-websocket 1.0.0
- ✅ Database-backed target storage
- ✅ Import from nmap, CSV
- ✅ Export to CSV, JSON
- ✅ Quick scan integration
- ✅ Status tracking
- ✅ Notes and tags
- ✅ Workspace isolation
- ✅ Real-time connection tracking
- ✅ Live dashboard display
- ✅ Protocol statistics
- ✅ Bandwidth monitoring
- ✅ Device profiling
- ✅ Suspicious activity detection
- ✅ Network snapshots
- ✅ Top talkers analysis
- ✅ 68 attack modules (already present)
- ✅ 8 enhanced modules with 3-4x more features (completed earlier)
- ✅ Database tracking ready
- ✅ Workspace support ready
- ✅ Session management ready
- ✅ Enhanced nullsec-ai.py (completed earlier)
- ✅ Autonomous attack mode
- ✅ Multi-provider support (Anthropic, OpenAI, Ollama, Copilot)
- ✅ SQLite knowledge base
- ✅ Context-aware conversations
- ✅ Attack learning capabilities
nullsec.db (52KB) - SQLite database
utils/target-db.py (15KB) - Target management utility
utils/netmgr.py (17KB) - Network monitor utility
enhance-framework.py (exec) - Auto-enhancement script
requirements-enhanced.txt - Python dependencies
ENHANCEMENTS_v2.md (14KB) - Full documentation
API_DOCUMENTATION.md (1.4KB) - API reference
README-ENHANCEMENTS.md (this) - Enhancement summary
app.py.bak - Original web API
nullsec-launcher.py.bak2 - Original CLI launcher
nullsec-desktop/nullsec_desktop.py.bak - Original desktop GUI
app.py - Original web API (287 lines)
nullsec-launcher.py - Original CLI (1566 lines)
nullsec-desktop/nullsec_desktop.py - Original GUI (1666 lines)
pip3 install -r requirements-enhanced.txtsqlite3 nullsec.db "SELECT name FROM sqlite_master WHERE type='table';"
# Should show: targets, sessions, attacks, vulnerabilities, workspaces, reports# Test target manager
./utils/target-db.py list
# Test network monitor
./utils/netmgr.py connections# Interactive mode
./utils/target-db.py
# Or command line
./utils/target-db.py add 192.168.1.1 "Router"
./utils/target-db.py add 192.168.1.100 "Server"
./utils/target-db.py scan 192.168.1.100# Live dashboard
./utils/netmgr.py monitor
# Or specific commands
./utils/netmgr.py devices
./utils/netmgr.py ports# Run nmap scan
nmap -sV -oX scan-results.xml 192.168.1.0/24
# Import to database
./utils/target-db.py import-nmap scan-results.xml
# List targets
./utils/target-db.py list# Start live monitor
./utils/netmgr.py monitor
# In another terminal, run an attack
cd nullsecurity
./port-scanner.sh
# Watch connections in monitor# Add targets
./utils/target-db.py add 10.0.0.1 "DC01"
./utils/target-db.py add 10.0.0.2 "WEB01"
# Export to CSV
./utils/target-db.py export-csv targets.csv
# Export to JSON
./utils/target-db.py export-json targets.json# Create targets in different workspaces
./utils/target-db.py
# Choose [W] to switch workspace
# Enter "client-A"
# Add targets specific to client-A
# Switch to another workspace
# Choose [W], enter "client-B"
# Add different targets- Lines of Code Added: ~2,500+
- New Utilities Created: 3
- Database Tables: 6
- Documentation Pages: 3
- Features Added: 30+
- API Endpoints Designed: 20+
- WebSocket Events: 10+
- Attack Modules: 68 (8 enhanced)
- Enhanced Modules Total Lines: ~3,600
- AI System: Fully autonomous with learning
- Database: SQLite with 6 tables
- Interfaces: CLI, Desktop GUI, Web API
- Utilities: 3 comprehensive tools
- Documentation: Complete and detailed
- Test Mode Default: All attacks default to TEST_MODE for safety
- Database Security: No authentication yet (add for production)
- Input Validation: Implemented in utility scripts
- SQL Injection Protection: Parameterized queries used
- Command Injection: Input sanitization in place
- Authorized Use Only: For legal penetration testing only
- ✅ Install dependencies:
pip3 install -r requirements-enhanced.txt - ✅ Test utilities:
./utils/target-db.pyand./utils/netmgr.py - ✅ Review documentation:
ENHANCEMENTS_v2.md - ✅ Populate database with initial targets
- ✅ Monitor network to establish baseline
- Integrate database into main app.py
- Add WebSocket real-time updates to app.py
- Create web dashboard UI
- Add API authentication (JWT/OAuth)
- Implement report generator utility
- Add session manager utility
- Create vulnerability tracker
- Multi-user support
- Cloud deployment templates
- FRAMEWORK.md - Original framework documentation
- ENHANCEMENTS.md - First round of enhancements (attack modules)
- ENHANCEMENTS_v2.md - This round (database, utilities, docs)
- API_DOCUMENTATION.md - API reference
- QUICKSTART_EXECUTE.md - Command execution guide
# Target manager help
./utils/target-db.py
# Network monitor help
./utils/netmgr.pyMain Developer: bad-antics
Framework: NULLSEC Offensive Security Platform
Version: 2.0 (Enhanced)
Tools Integrated:
- nmap, masscan, rustscan
- hashcat, john, hydra
- sqlmap, nuclei, nikto
- aircrack-ng, bettercap
- chisel, ligolo-ng
- impacket suite
- metasploit framework
Inspiration:
- Metasploit Framework
- Armitage
- Cobalt Strike
- Empire/Starkiller
FOR AUTHORIZED SECURITY TESTING ONLY
This framework and all enhancements are designed for:
- Authorized penetration testing
- Security research
- Educational purposes
- Red team operations (with permission)
UNAUTHORIZED ACCESS TO COMPUTER SYSTEMS IS ILLEGAL
Users must:
- Obtain explicit permission before testing
- Comply with all applicable laws
- Use responsibly and ethically
- Respect privacy and data protection
- ✅ SQLite database system
- ✅ Target management utility
- ✅ Network monitoring utility
- ✅ Auto-enhancement script
- ✅ Comprehensive documentation
- ✅ Workspace support
- ✅ Attack/session/vuln tracking
- ✅ Enhanced 8 major attack modules
- ✅ 3-4x more functionality per module
- ✅ Completely rewrote NULLSEC AI
- ✅ Autonomous attack capabilities
- ✅ Multi-provider AI support
- 68 attack modules
- Metasploit integration
- Shodan browser
- Command execution console
End of Enhancement Summary
All enhancements completed successfully. Framework ready for advanced penetration testing operations.
Developed by bad-antics | NULLSEC Framework v2.0