Skip to content

Rachit-21/fortex26

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

18 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ›ก๏ธ Neural X - AI-Powered Security Scanner

Neural X Python React License

An intelligent automated web security scanner that combines OWASP ZAP reconnaissance with AI-driven attack planning and real-time vulnerability detection.

Features โ€ข Architecture โ€ข Installation โ€ข Usage โ€ข API


๐Ÿ“Œ Overview

Neural X is a next-generation security automation platform designed to perform ethical, intelligent, and efficient web application security testing. Unlike traditional scanners that run noisy full scans, Neural X uses AI to intelligently plan and execute targeted security tests.

๐ŸŽฏ Key Highlights

  • ๐Ÿค– AI-Powered Attack Planning - Uses intelligent planning to determine which attacks to run
  • ๐Ÿ” Smart Reconnaissance - OWASP ZAP integration for comprehensive attack surface discovery
  • โšก Real-time Scanning - Live terminal output with progress tracking
  • ๐ŸŽจ Modern UI - Sleek, terminal-inspired React frontend with real-time updates
  • ๐Ÿ“Š Detailed Reports - Comprehensive vulnerability reports with severity scoring
  • ๐Ÿ”ง Modular Architecture - Extensible attack modules for different vulnerability types

๐Ÿ“ธ Screenshots

Neural X Interface

Neural X Interface

๐ŸŽฅ Demo Video

Watch Neural X in action:

Neural X Demo

โœจ Features

Core Capabilities

โœ… OWASP ZAP Integration

  • Spider crawling for page discovery
  • Passive scanning for initial vulnerability detection
  • AJAX crawling support for Single Page Applications (SPAs)

โœ… AI Attack Planning

  • Intelligent analysis of attack surfaces
  • Contextual attack selection
  • Reduced false positives

โœ… Vulnerability Detection

  • IDOR (Insecure Direct Object Reference)
  • XSS (Cross-Site Scripting)
  • DOM-XSS (DOM-based XSS)
  • Authentication Bypass

โœ… Advanced Reporting

  • Real-time log streaming
  • Severity scoring engine
  • JSON structured reports
  • Detailed vulnerability evidence

โœ… Modern Frontend

  • Terminal-style interface
  • Real-time scan progress
  • Live vulnerability reporting
  • HTTP polling for status updates

๐Ÿ—๏ธ Architecture

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                   Frontend (React)                      โ”‚
โ”‚   โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”     โ”‚
โ”‚   โ”‚  Scanner    โ”‚  โ”‚  Terminal   โ”‚  โ”‚   Report    โ”‚     โ”‚
โ”‚   โ”‚  Interface  โ”‚  โ”‚    Logs     โ”‚  โ”‚   Viewer    โ”‚     โ”‚
โ”‚   โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜     โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                            โ”‚
                            โ”‚ HTTP Polling
                            โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                   Backend (FastAPI)                     โ”‚
โ”‚                                                         โ”‚
โ”‚   โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”‚
โ”‚   โ”‚         API Server (Port 8000)                 โ”‚    โ”‚
โ”‚   โ”‚   โ€ข POST /attack - Start scan                  โ”‚    โ”‚
โ”‚   โ”‚   โ€ข GET /status/{runId} - Get scan status      โ”‚    โ”‚
โ”‚   โ”‚   โ€ข GET /health - Health check                 โ”‚    โ”‚
โ”‚   โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ”‚
โ”‚                            โ”‚                            โ”‚
โ”‚   โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”‚
โ”‚   โ”‚           Core Orchestrator                    โ”‚    โ”‚
โ”‚   โ”‚   โ€ข Manages scan lifecycle                     โ”‚    โ”‚
โ”‚   โ”‚   โ€ข Coordinates attack modules                 โ”‚    โ”‚
โ”‚   โ”‚   โ€ข Generates reports                          โ”‚    โ”‚
โ”‚   โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ”‚
โ”‚                            โ”‚                            โ”‚
โ”‚          โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”          โ”‚
โ”‚          โ”‚                 โ”‚                 โ”‚          โ”‚
โ”‚          โ–ผ                 โ–ผ                 โ–ผ          โ”‚
โ”‚   โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”     โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”      โ”‚
โ”‚   โ”‚    ZAP    โ”‚     โ”‚    AI     โ”‚    โ”‚  Attack   โ”‚      โ”‚
โ”‚   โ”‚  Client   โ”‚     โ”‚  Planner  โ”‚    โ”‚  Modules  โ”‚      โ”‚
โ”‚   โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜     โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜    โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜      โ”‚
โ”‚                                                         โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                            โ”‚
                            โ–ผ
                  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
                  โ”‚   OWASP ZAP       โ”‚
                  โ”‚   (Port 8080)     โ”‚
                  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                            โ”‚
                            โ–ผ
                  โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
                  โ”‚  Target Website   โ”‚
                  โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Technology Stack

Layer Technology
Frontend React 19.2, Vite, TailwindCSS
Backend Python 3.10+, FastAPI, Uvicorn
Scanner OWASP ZAP
AI OpenAI API (GPT-based planning)
Icons Lucide React
Styling TailwindCSS 4.1

๐Ÿ“‚ Project Structure

fortex26/
โ”‚
โ”œโ”€โ”€ backend/
โ”‚   โ”œโ”€โ”€ ai/
โ”‚   โ”‚   โ”œโ”€โ”€ planner.py            # AI attack planning logic
โ”‚   โ”‚   โ””โ”€โ”€ severity.py           # Vulnerability severity scoring
โ”‚   โ”‚
โ”‚   โ”œโ”€โ”€ attacks/
โ”‚   โ”‚   โ”œโ”€โ”€ idor.py               # IDOR vulnerability testing
โ”‚   โ”‚   โ”œโ”€โ”€ xss.py                # XSS vulnerability testing
โ”‚   โ”‚   โ”œโ”€โ”€ dom_xss.py            # DOM-XSS testing
โ”‚   โ”‚   โ””โ”€โ”€ auth.py               # Authentication bypass testing
โ”‚   โ”‚
โ”‚   โ”œโ”€โ”€ core/
โ”‚   โ”‚   โ””โ”€โ”€ orchestrator.py       # Main scan orchestration
โ”‚   โ”‚
โ”‚   โ”œโ”€โ”€ reporting/
โ”‚   โ”‚   โ””โ”€โ”€ report_generator.py   # Report generation
โ”‚   โ”‚
โ”‚   โ”œโ”€โ”€ zap/
โ”‚   โ”‚   โ”œโ”€โ”€ zap_client.py         # ZAP API client
โ”‚   โ”‚   โ””โ”€โ”€ adapter.py            # ZAP data adapters
โ”‚   โ”‚  
โ”‚   โ”œโ”€โ”€ api_server.py             # FastAPI server
โ”‚   โ”œโ”€โ”€ main.py                   # CLI entry point
โ”‚   โ”œโ”€โ”€ requirements.txt          # Python dependencies
โ”‚   โ””โ”€โ”€ .env                      # Environment configuration
โ”‚
โ”œโ”€โ”€ frontend/
โ”‚   โ”œโ”€โ”€ src/
โ”‚   โ”‚   โ”œโ”€โ”€ components/
โ”‚   โ”‚   โ”‚   โ””โ”€โ”€ ReportViewer.jsx  # Vulnerability report UI
โ”‚   โ”‚   โ”œโ”€โ”€ App.jsx               # Main application
โ”‚   โ”‚   โ”œโ”€โ”€ main.jsx              # React entry point
โ”‚   โ”‚   โ””โ”€โ”€ index.css             # Global styles
โ”‚   โ”‚
โ”‚   โ”œโ”€โ”€ index.html               # HTML template
โ”‚   โ”œโ”€โ”€ package.json             # Node dependencies
โ”‚   โ””โ”€โ”€ vite.config.js           # Vite configuration
โ”‚
โ””โ”€โ”€ readme.md                    # This file

๐Ÿš€ Installation

Prerequisites

  • Python 3.10+
  • Node.js 18+ and npm
  • OWASP ZAP (installed and accessible)
  • OpenAI API Key (for AI planning features)

Step 1: Clone the Repository

git clone https://github.com/yourusername/fortex26.git
cd fortex26

Step 2: Backend Setup

cd backend

# Create virtual environment
python -m venv .venv

# Activate virtual environment
# Windows:
.venv\Scripts\activate
# Linux/Mac:
source .venv/bin/activate

# Install dependencies
pip install -r requirements.txt

Step 3: Configure Environment Variables

Create a .env file in the backend/ directory:

# ZAP Configuration
ZAP_PROXY=http://localhost:8080
ZAP_API_KEY=changeme

# Target Configuration
TARGET_URL=http://localhost:3000

# OpenAI Configuration
OPENAI_API_KEY=your_openai_api_key_here

Step 4: Start OWASP ZAP

Windows (PowerShell):

cd backend
.\start_zap_daemon.ps1

Linux/Mac:

zap.sh -daemon -host 0.0.0.0 -port 8080 -config api.key=changeme \
  -config api.addrs.addr.name=.* -config api.addrs.addr.regex=true

Step 5: Frontend Setup

cd frontend

# Install dependencies
npm install

๐ŸŽฎ Usage

Starting the Application

Terminal 1 - Start Backend:

cd backend
.venv\Scripts\activate  # Windows
# source .venv/bin/activate  # Linux/Mac
python api_server.py

Terminal 2 - Start Frontend:

cd frontend
npm run dev

Terminal 3 - Ensure ZAP is Running:

# Check ZAP status
curl http://localhost:8080

Access the Application

Open your browser and navigate to:

http://localhost:5173

Running a Scan

  1. Enter Target URL - Input the website URL you want to scan
  2. Click "Scan" - Start the security assessment
  3. Monitor Progress - Watch real-time logs in the terminal view
  4. Review Results - View detailed vulnerability reports

CLI Usage (Optional)

You can also run scans directly from the command line:

cd backend
python main.py

๐Ÿ”Œ API Reference

Base URL

http://localhost:8000

Endpoints

POST /attack

Start a new security scan.

Request Body:

{
  "url": "https://example.com"
}

Response:

{
  "runId": "uuid-string"
}

GET /status/{runId}

Get the current status of a scan.

Response:

{
  "status": "SCANNING",
  "logs": [
    {
      "timestamp": "2026-01-29T10:00:00",
      "message": "Starting scan...",
      "type": "info"
    }
  ],
  "report": {
    "target": "https://example.com",
    "findings": [],
    "summary": {}
  }
}

GET /health

Health check endpoint.

Response:

{
  "status": "healthy",
  "active_scans": 0
}

๐Ÿ”’ Security & Ethics

โš ๏ธ Legal Notice

This tool is for authorized security testing only.

You must have explicit permission to scan any target. Unauthorized scanning is illegal and unethical.

Recommended Use Cases

โœ… Your own applications
โœ… Applications you have written permission to test
โœ… Local lab environments (e.g., OWASP Juice Shop)
โœ… Bug bounty programs with proper authorization

โŒ DO NOT scan websites without permission
โŒ DO NOT use for malicious purposes


๐Ÿงช Testing with OWASP Juice Shop

For safe testing, use OWASP Juice Shop:

# Run with Docker
docker run -d -p 3000:3000 bkimminich/juice-shop

# Set TARGET_URL in .env
TARGET_URL=http://localhost:3000

# Start scanning

๐Ÿ› ๏ธ Development

Adding New Attack Modules

  1. Create a new file in backend/attacks/
  2. Implement the attack logic
  3. Register in core/orchestrator.py
  4. Update AI planner in ai/planner.py

Example:

# backend/attacks/sql_injection.py
class SQLInjectionTester:
    def __init__(self, headers=None):
        self.headers = headers or {}
    
    def run(self, endpoints):
        findings = []
        # Your attack logic here
        return findings

Frontend Customization

The frontend uses TailwindCSS for styling. Modify frontend/src/App.jsx to customize the UI.


๐Ÿ› Troubleshooting

ZAP Connection Issues

# Check if ZAP is running
curl http://localhost:8080

# Verify API key in .env matches ZAP configuration

Frontend Not Connecting

# Ensure backend is running on port 8000
# Check CORS settings in api_server.py

Scan Not Starting

# Verify all environment variables are set
# Check ZAP logs for errors
# Ensure target URL is accessible

๐Ÿšง Future Roadmap

  • Machine learning-based attack prioritization
  • Authenticated scanning support
  • SQL injection detection
  • CSRF vulnerability testing
  • PDF report generation
  • Multi-target scanning
  • CI/CD integration
  • Docker containerization
  • Cloud deployment support

๐Ÿค Contributing

Contributions are welcome! Please follow these steps:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

๐Ÿ‘ฅ Team

Team Neural X

Built with โค๏ธ for ethical security testing


About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors