Skip to content

An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Claude) with comprehensive security testing modules for automated bug hunting, intelligent payload generation, and professional reporting.

License

Notifications You must be signed in to change notification settings

zakirkun/deep-eye

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

9 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Deep Eye πŸ”

An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Claude) with comprehensive security testing modules for automated bug hunting, intelligent payload generation, and professional reporting.

License Status

πŸš€ Features

Core Capabilities

  • Multi-AI Provider Support: Dynamic switching between OpenAI, Grok, OLLAMA, and Claude
  • Intelligent Payload Generation: AI-powered, CVE-aware, context-sensitive payloads
  • Comprehensive Scanning: 45+ attack methods with framework-specific tests
  • Advanced Reconnaissance: Passive OSINT, DNS enumeration, subdomain discovery
  • Professional Reporting: PDF/HTML/JSON reports with OSINT intelligence and executive summaries
  • Collaborative Scanning: Team-based distributed scanning with session management
  • Custom Plugin System: Extend Deep Eye with your own vulnerability scanners
  • Multi-Channel Notifications: Real-time alerts via Email, Slack, and Discord

Vulnerability Detection

Core Vulnerabilities

  • SQL Injection (Error-based, Blind, Time-based)
  • Cross-Site Scripting (XSS)
  • Command Injection
  • SSRF (Server-Side Request Forgery)
  • XXE (XML External Entity)
  • Path Traversal
  • CSRF (Cross-Site Request Forgery)
  • Open Redirect
  • CORS Misconfiguration
  • Security Headers Analysis

v1.3.0 Additional Vulnerabilities

  • Local File Inclusion (LFI)
  • Remote File Inclusion (RFI)
  • Server-Side Template Injection (SSTI)
  • CRLF Injection
  • Host Header Injection
  • LDAP Injection
  • XML Injection
  • Insecure Deserialization
  • Authentication Bypass
  • Information Disclosure
  • Sensitive Data Exposure
  • JWT Vulnerabilities
  • Broken Authentication

v1.1.0 Advanced Modules

  • API Security Testing (OWASP API Top 10 2023)
  • GraphQL Security (Introspection, Depth limits, Batch attacks)
  • Business Logic Flaws (Price manipulation, Workflow bypass, Race conditions)
  • Authentication Testing (Session management, JWT, OAuth, MFA bypass)
  • File Upload Vulnerabilities (Unrestricted upload, Path traversal, Type bypass)
  • Collaborative Scanning (Team-based distributed scanning)

v1.2.0 Advanced Modules

  • WebSocket Testing (Origin validation, Auth, Injection, DoS protection)
  • ML-Based Anomaly Detection (Behavioral analysis, Pattern recognition)
  • Interactive HTML Reports (Charts, Filtering, Real-time search)
  • Enhanced OSINT (Google dorking, Breach databases, CT logs, GitHub/Pastebin)
  • Advanced Payload Obfuscation (11+ techniques for WAF bypass)

v1.3.0 New Features

  • Custom Plugin System (Extend with your own scanners)
  • Multi-Channel Notifications (Email, Slack, Discord alerts)
  • Enhanced OSINT Reporting (Reconnaissance data in all reports)

And 17+ more attack vectors

πŸ“‹ Prerequisites

  • Python 3.8 or higher
  • pip package manager
  • API keys for AI providers (at least one):
    • OpenAI API Key
    • Anthropic (Claude) API Key
    • Grok API Key
    • OLLAMA (local installation)

πŸ”§ Installation

Quick Install (Recommended)

Windows:

.\scripts\install.ps1

Linux/Mac:

chmod +x scripts/install.sh
./scripts/install.sh

Manual Installation

  1. Clone the repository:
git clone https://github.com/zakirkun/deep-eye.git
cd deep-eye
  1. Install dependencies:
pip install -r requirements.txt
  1. Configure AI providers:
cp config/config.example.yaml config/config.yaml
# Edit config.yaml with your API keys

🎯 Usage

Quick Start

# Scan with target from CLI
python deep_eye.py -u https://example.com

# Scan with configuration file
python deep_eye.py -c myconfig.yaml

# Verbose mode
python deep_eye.py -u https://example.com -v

Configuration-Driven Scanning

All scan options are configured in config/config.yaml:

scanner:
  target_url: "https://example.com"  # Default target
  ai_provider: "openai"               # AI provider
  default_depth: 2                    # Crawl depth
  default_threads: 5                  # Thread count
  enable_recon: true                  # Enable reconnaissance
  full_scan: false                    # Full/quick scan mode
  proxy: ""                           # Proxy settings
  custom_headers: {}                  # Custom headers

reporting:
  enabled: true                       # Auto-generate reports
  output_directory: "reports"         # Report directory
  default_format: "html"              # Report format

Then run:

python deep_eye.py

Command Line Options (Minimal)

-u, --url              Target URL (overrides config)
-c, --config           Configuration file path (default: config/config.yaml)
-v, --verbose          Enable verbose output
--version              Show version and exit
--no-banner            Disable banner display

Note: All scanning options (depth, threads, AI provider, scan mode, proxy, etc.) are now configured in config.yaml for better management and repeatability.

πŸ“ Project Structure

deep-eye/
β”œβ”€β”€ core/                      # Core scanning engine
β”œβ”€β”€ ai_providers/              # AI provider integrations
β”œβ”€β”€ modules/                   # Security testing modules
β”œβ”€β”€ utils/                     # Utility functions
β”œβ”€β”€ config/                    # Configuration files
β”œβ”€β”€ templates/                 # Report templates
β”œβ”€β”€ examples/                  # Usage examples
β”œβ”€β”€ scripts/                   # Installation scripts
β”œβ”€β”€ docs/                      # Documentation
β”œβ”€β”€ deep_eye.py               # Main entry point
β”œβ”€β”€ setup.py                  # Package setup
└── requirements.txt          # Dependencies

For detailed structure, see docs/ARCHITECTURE.md

οΏ½ Troubleshooting

PDF Report Generation

Issue: PDF generation errors on Windows (WeasyPrint library issues)

Solution: The tool now uses ReportLab (Windows-friendly) for PDF generation by default. If you encounter any issues:

  1. Ensure ReportLab is installed:
pip install reportlab>=4.0.0
  1. If PDF generation fails, the tool will automatically fall back to HTML format.

  2. For advanced HTML-to-PDF conversion (optional), you can install additional tools, but it's not required.

Common Issues

AI Provider Connection Errors

  • Verify your API keys in config/config.yaml
  • Check your internet connection
  • Ensure API key has sufficient credits

Scanning Errors

  • Verify target URL is accessible
  • Check if target has rate limiting or WAF
  • Try reducing thread count with -t option

οΏ½πŸ›‘οΈ Legal Disclaimer

IMPORTANT: Deep Eye is designed for authorized security testing only.

  • Only use on systems you own or have explicit permission to test
  • Unauthorized access to computer systems is illegal
  • Users are responsible for complying with all applicable laws
  • The developers assume no liability for misuse

🀝 Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

πŸ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.

οΏ½ Documentation

οΏ½πŸ™ Acknowledgments

  • OpenAI for GPT models
  • Anthropic for Claude
  • OWASP for security testing methodologies
  • The security research community

πŸ“§ Contact

For questions or support, please open an issue on GitHub.


⚠️ Use Responsibly | πŸ”’ Test Ethically | πŸ’‘ Learn Continuously

About

An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Claude) with comprehensive security testing modules for automated bug hunting, intelligent payload generation, and professional reporting.

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published