CyberSec-CLI is an AI-powered cybersecurity assistant with both command-line and web interfaces. It combines AI assistance with security tools for network scanning, vulnerability assessment, and security analysis. Key features include adaptive network scanning, service detection, Redis caching, real-time streaming results, and a comprehensive API. Designed for security professionals and penetration testers.
CyberSec-CLI is a comprehensive cybersecurity toolkit that bridges the gap between traditional security tools and modern AI assistance. It provides security professionals, penetration testers, and IT administrators with an intelligent command-line interface and web application for conducting security assessments, vulnerability analysis, and network reconnaissance.
The project aims to streamline security workflows by combining:
AI-Powered Assistance: Natural language processing for security queries and automated report generation
Professional Security Tools: Network scanning, vulnerability assessment, and SSL/TLS analysis
Modern Architecture: Distributed task processing with Redis, real-time updates via WebSockets, and intelligent caching
Interactive shell with rich terminal UI featuring progress bars and multiple themes (Matrix, Cyberpunk, Minimal)
Natural language AI assistant for security concept explanations and tool suggestions
Comprehensive scanning capabilities including port scanning, OS detection, and vulnerability assessment
Command history, configuration management, and result export functionality
Modern responsive interface for desktop and mobile devices
Real-time scan monitoring with Server-Sent Events (SSE)
WebSocket-based command execution for interactive sessions
Historical scan results with advanced filtering and search
Dashboard with performance metrics and API key management
Backend: FastAPI-based REST API with WebSocket support
Task Queue: Celery with Redis for distributed job processing
Database: PostgreSQL for persistent storage with SQLite fallback
Caching: Redis-based intelligent caching system with automatic fallback to in-memory storage
Security: Rate limiting with sliding window algorithm, abuse detection, and API key authentication
Adaptive Concurrency Control: Automatically adjusts scanning speed based on network performance and packet loss
Enhanced Service Detection: Active probing for accurate service identification beyond simple banner grabbing
Smart Caching: Avoids redundant scans while maintaining data freshness
Multiple Scan Types: Fast scans, comprehensive port ranges, SSL/TLS verification, vulnerability detection, and OS fingerprinting
RESTful API: Comprehensive endpoints for programmatic access
WebSocket Interface: Real-time bidirectional communication
Export Formats: JSON, CSV, and PDF report generation
Extensible Design: Plugin architecture for adding custom tools and scanners
Standalone: Direct Python installation via pip
Docker: Pre-built container images for quick deployment
Docker Compose: Full stack deployment with Redis and PostgreSQL
Kubernetes: Production-ready configurations for scalable deployments
Cloud-Ready: Deployment guides for AWS, Azure, and GCP
Penetration Testing: Conduct reconnaissance and vulnerability assessment during security audits
Network Administration: Monitor and inventory network assets and exposed services
Security Training: Learn security concepts through AI-powered explanations and guided scanning
Compliance Checking: Verify SSL/TLS configurations and identify outdated services
Incident Response: Quickly assess network exposure during security incidents
Language: Python 3.10+
Web Framework: FastAPI, Uvicorn
Task Processing: Celery
Databases: PostgreSQL, Redis, SQLite
Scanning Engine: Nmap integration
AI Integration: OpenAI API
Frontend: HTML, JavaScript with SSE and WebSocket
Containerization: Docker, Docker Compose
Code formatting with Black
Pre-commit hooks for code quality
Comprehensive test suite with pytest
CI/CD pipelines via GitHub Actions
Security best practices including rate limiting and input validation
Cybersecurity professionals and penetration testers
Network administrators and IT security teams
Security researchers and students
DevSecOps engineers
Anyone interested in network security and vulnerability assessment
The project is open-source under the MIT License, encouraging community contributions and extensibility while maintaining professional-grade security and performance standards.