Metadata-Version: 2.4
Name: aiptx
Version: 2.0.5
Summary: AI-Powered Penetration Testing Framework - Autonomous security assessment with LLM intelligence
Author-email: Satyam Rastogi <satyam@aiptx.io>
Maintainer-email: Satyam Rastogi <satyam@aiptx.io>
License: MIT License
        
        Copyright (c) 2025 Satyam Rastogi
        
        Permission is hereby granted, free of charge, to any person obtaining a copy
        of this software and associated documentation files (the "Software"), to deal
        in the Software without restriction, including without limitation the rights
        to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
        copies of the Software, and to permit persons to whom the Software is
        furnished to do so, subject to the following conditions:
        
        The above copyright notice and this permission notice shall be included in all
        copies or substantial portions of the Software.
        
        THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
        IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
        FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
        AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
        LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
        OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
        SOFTWARE.
        
Project-URL: Homepage, https://aiptx.io
Project-URL: Documentation, https://aiptx.io/docs
Project-URL: Repository, https://github.com/satyamrastogi/aiptx
Project-URL: Issues, https://github.com/satyamrastogi/aiptx/issues
Project-URL: Changelog, https://github.com/satyamrastogi/aiptx/blob/main/CHANGELOG.md
Project-URL: Community, https://aiptx.io/community
Keywords: security,penetration-testing,pentest,vulnerability-scanner,vulnerability-assessment,security-scanner,security-tools,security-automation,ai,llm,artificial-intelligence,machine-learning,gpt,claude,cybersecurity,infosec,appsec,devsecops,vapt,dast,sast,bug-bounty,ethical-hacking,red-team,offensive-security,web-security,owasp,cve,exploit,nmap,nuclei,sqlmap,burp-suite,acunetix,nessus,zap,reconnaissance,recon,scanning,exploitation,automation,cli,api
Classifier: Development Status :: 4 - Beta
Classifier: Environment :: Console
Classifier: Environment :: Web Environment
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: Information Technology
Classifier: Intended Audience :: System Administrators
Classifier: Intended Audience :: Science/Research
Classifier: Topic :: Security
Classifier: Topic :: Security :: Cryptography
Classifier: Topic :: Software Development :: Testing
Classifier: Topic :: Software Development :: Testing :: Acceptance
Classifier: Topic :: Software Development :: Quality Assurance
Classifier: Topic :: Internet :: WWW/HTTP
Classifier: Topic :: Internet :: WWW/HTTP :: HTTP Servers
Classifier: Topic :: System :: Networking
Classifier: Topic :: System :: Systems Administration
Classifier: Topic :: System :: Monitoring
Classifier: Topic :: Utilities
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Classifier: Operating System :: POSIX :: Linux
Classifier: Operating System :: MacOS
Classifier: Operating System :: Microsoft :: Windows
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Programming Language :: Python :: 3.13
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Typing :: Typed
Classifier: Framework :: FastAPI
Classifier: Natural Language :: English
Requires-Python: >=3.9
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: litellm>=1.50.0
Requires-Dist: jinja2>=3.1.0
Requires-Dist: tiktoken>=0.5.0
Requires-Dist: requests>=2.31.0
Requires-Dist: httpx>=0.25.0
Requires-Dist: aiohttp>=3.9.0
Requires-Dist: fastapi>=0.104.0
Requires-Dist: uvicorn[standard]>=0.24.0
Requires-Dist: pydantic>=2.5.0
Requires-Dist: pydantic-settings>=2.0.0
Requires-Dist: slowapi>=0.1.9
Requires-Dist: sqlalchemy>=2.0.0
Requires-Dist: alembic>=1.13.0
Requires-Dist: textual>=0.44.0
Requires-Dist: rich>=13.7.0
Requires-Dist: click>=8.1.0
Requires-Dist: typer>=0.9.0
Requires-Dist: pyyaml>=6.0
Requires-Dist: python-dotenv>=1.0.0
Requires-Dist: aiofiles>=23.0.0
Requires-Dist: structlog>=23.0.0
Requires-Dist: psutil>=5.9.0
Provides-Extra: vps
Requires-Dist: asyncssh>=2.14.0; extra == "vps"
Provides-Extra: full
Requires-Dist: sentence-transformers>=2.2.0; extra == "full"
Requires-Dist: numpy>=1.24.0; extra == "full"
Requires-Dist: torch>=2.0.0; extra == "full"
Requires-Dist: playwright>=1.40.0; extra == "full"
Requires-Dist: mitmproxy>=10.0.0; extra == "full"
Requires-Dist: docker>=7.0.0; extra == "full"
Requires-Dist: pexpect>=4.8.0; extra == "full"
Requires-Dist: paramiko>=3.4.0; extra == "full"
Requires-Dist: asyncssh>=2.14.0; extra == "full"
Requires-Dist: langchain-core>=0.1.0; extra == "full"
Requires-Dist: scikit-learn>=1.3.0; extra == "full"
Requires-Dist: scipy>=1.11.0; extra == "full"
Requires-Dist: pandas>=2.0.0; extra == "full"
Provides-Extra: dev
Requires-Dist: pytest>=7.4.0; extra == "dev"
Requires-Dist: pytest-asyncio>=0.21.0; extra == "dev"
Requires-Dist: pytest-cov>=4.1.0; extra == "dev"
Requires-Dist: pytest-mock>=3.12.0; extra == "dev"
Requires-Dist: black>=23.0.0; extra == "dev"
Requires-Dist: ruff>=0.1.0; extra == "dev"
Requires-Dist: mypy>=1.7.0; extra == "dev"
Requires-Dist: bandit>=1.7.0; extra == "dev"
Requires-Dist: pre-commit>=3.5.0; extra == "dev"
Requires-Dist: safety>=2.3.0; extra == "dev"
Dynamic: license-file

<div align="center">

# AIPTX - AI-Powered Penetration Testing Framework

### 🌐 **[aiptx.io](https://aiptx.io)** — Official Website

[![Website](https://img.shields.io/badge/Website-aiptx.io-blue?style=for-the-badge&logo=safari)](https://aiptx.io)
[![PyPI version](https://img.shields.io/pypi/v/aiptx?style=for-the-badge&logo=pypi&logoColor=white)](https://pypi.org/project/aiptx/)
[![Downloads](https://img.shields.io/pepy/dt/aiptx?style=for-the-badge&logo=python&logoColor=white)](https://pepy.tech/project/aiptx)
[![Python 3.9+](https://img.shields.io/badge/python-3.9+-blue.svg?style=for-the-badge&logo=python&logoColor=white)](https://www.python.org/downloads/)
[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg?style=for-the-badge)](https://opensource.org/licenses/MIT)

**AI-Powered Security Assessment & Vulnerability Discovery Platform**

[Getting Started](https://aiptx.io/docs) • [Documentation](https://aiptx.io/docs) • [API Reference](https://aiptx.io/api) • [Community](https://aiptx.io/community)

</div>

---

**AIPTX** is an intelligent penetration testing framework that leverages Large Language Models (LLMs) to autonomously conduct security assessments. It orchestrates comprehensive vulnerability discovery through AI-guided decision making, smart prioritization, and automated reporting.

---

## Key Features

### AI Intelligence Layer
- **LLM-Guided Scanning** — AI decides which techniques to apply based on discovered information
- **Smart Vulnerability Triage** — Prioritizes findings by real-world exploitability, not just severity scores
- **Attack Chain Detection** — Identifies how multiple findings combine into critical attack paths
- **Semantic Tool Selection** — RAG-based matching of objectives to optimal assessment techniques

### Comprehensive Assessment Capabilities
- **Reconnaissance** — Subdomain discovery, DNS enumeration, technology fingerprinting, historical data analysis
- **Vulnerability Scanning** — Web application testing, configuration analysis, secret detection, container security
- **Exploitation Testing** — SQL injection, XSS, command injection, credential testing (opt-in)
- **Post-Exploitation** — Privilege escalation detection, credential extraction, process monitoring

### Enterprise Integration
- Native API support for leading commercial security platforms
- Unified interface for both open-source and enterprise scanning solutions
- Seamless integration into existing security workflows

### Professional Output
- **HTML Reports** — Executive-ready vulnerability documentation
- **JSON Export** — CI/CD pipeline integration
- **REST API** — Programmatic access for automation
- **Terminal UI** — Real-time progress monitoring

---

## Installation

```bash
# Recommended: Install with pipx
pipx install aiptx

# Or with pip
pip install aiptx

# Full installation (ML features, browser automation, proxy)
pip install aiptx[full]
```

**Requirements:** Python 3.9+

---

## Quick Start

```bash
# Basic security scan
aiptx scan example.com

# AI-guided intelligent scanning
aiptx scan example.com --ai

# Comprehensive assessment (all capabilities)
aiptx scan example.com --full

# Container security assessment
aiptx scan example.com --container

# Secret and credential detection
aiptx scan example.com --secrets

# Check configuration
aiptx status

# Start REST API server
aiptx api
```

---

## How It Works

AIPTX operates on a **Think → Select → Execute → Learn** loop:

```
┌─────────────────────────────────────────────────────────────────┐
│                         AIPTX Framework                         │
├─────────────────────────────────────────────────────────────────┤
│                     AI INTELLIGENCE LAYER                       │
│  ┌─────────────┐  ┌─────────────┐  ┌─────────────┐             │
│  │ LLM Engine  │  │   Scoring   │  │Attack Chain │             │
│  │ (100+ LLMs) │  │   Engine    │  │  Detection  │             │
│  └─────────────┘  └─────────────┘  └─────────────┘             │
├─────────────────────────────────────────────────────────────────┤
│                    ASSESSMENT PIPELINE                          │
│  RECON ──────► SCAN ──────► EXPLOIT ──────► POST-EXPLOIT       │
├─────────────────────────────────────────────────────────────────┤
│                         OUTPUT                                  │
│     HTML Reports  │  JSON Export  │  REST API  │  TUI          │
└─────────────────────────────────────────────────────────────────┘
```

1. **Think** — AI analyzes target and current findings
2. **Select** — Chooses appropriate assessment techniques via semantic search
3. **Execute** — Runs assessments in isolated environments
4. **Learn** — Extracts findings and determines next steps

---

## LLM Configuration

AIPTX supports **100+ LLM providers** for AI-guided scanning:

```bash
# Anthropic Claude
export ANTHROPIC_API_KEY="your-key"

# OpenAI
export OPENAI_API_KEY="your-key"

# Azure OpenAI
export AZURE_API_KEY="your-key"
export AZURE_API_BASE="your-endpoint"

# Local models (for offline/private use)
export OLLAMA_API_BASE="http://localhost:11434"
```

---

## Use Cases

| Scenario | Command |
|----------|---------|
| **Bug Bounty** | `aiptx scan target.com --ai --full` |
| **Penetration Testing** | `aiptx scan client.com --full` |
| **DevSecOps Pipeline** | `aiptx scan app.com --container --secrets --json` |
| **Red Team Operations** | `aiptx scan target.corp --ai --exploit --full` |

---

## Command Reference

| Command | Description |
|---------|-------------|
| `aiptx scan <target>` | Run security assessment |
| `aiptx scan <target> --ai` | Enable AI-guided scanning |
| `aiptx scan <target> --full` | Comprehensive assessment |
| `aiptx scan <target> --quick` | Fast essential checks only |
| `aiptx scan <target> --exploit` | Enable exploitation testing |
| `aiptx scan <target> --container` | Container security scanning |
| `aiptx scan <target> --secrets` | Credential/secret detection |
| `aiptx status` | Check configuration |
| `aiptx version` | Show version |
| `aiptx api` | Start REST API server |

---

## Why AIPTX?

| Capability | AIPTX | Traditional Approach |
|------------|-------|---------------------|
| AI-Guided Decisions | ✅ | ❌ Manual |
| Unified Interface | ✅ | ❌ Multiple tools |
| Attack Chain Analysis | ✅ | ❌ Manual correlation |
| Smart Prioritization | ✅ | ❌ CVSS only |
| Professional Reports | ✅ | ❌ Manual documentation |
| Single Command | ✅ | ❌ Complex scripts |

---

## Requirements

- **Python**: 3.9 or higher
- **OS**: Linux, macOS, Windows (WSL recommended)
- **Optional**: Docker for isolated execution

---

## License

MIT License — Free for commercial and personal use.

---

## Author

**Satyam Rastogi** — Security Researcher & Developer

---

## Links

- 🌐 **[aiptx.io](https://aiptx.io)** — Official Website & Documentation
- 📦 [PyPI Package](https://pypi.org/project/aiptx/)
- 💻 [GitHub Repository](https://github.com/satyamrastogi/aiptx)
- 📋 [Changelog](https://github.com/satyamrastogi/aiptx/blob/main/CHANGELOG.md)
- 📖 [Documentation](https://aiptx.io/docs)
- 💬 [Community & Support](https://aiptx.io/community)

---

<div align="center">

**[aiptx.io](https://aiptx.io)** — Intelligent Security Assessment, Simplified.

Made with ❤️ by [Satyam Rastogi](https://aiptx.io)

</div>
