An intelligent automated web security scanner that combines OWASP ZAP reconnaissance with AI-driven attack planning and real-time vulnerability detection.
Features โข Architecture โข Installation โข Usage โข API
Neural X is a next-generation security automation platform designed to perform ethical, intelligent, and efficient web application security testing. Unlike traditional scanners that run noisy full scans, Neural X uses AI to intelligently plan and execute targeted security tests.
- ๐ค AI-Powered Attack Planning - Uses intelligent planning to determine which attacks to run
- ๐ Smart Reconnaissance - OWASP ZAP integration for comprehensive attack surface discovery
- โก Real-time Scanning - Live terminal output with progress tracking
- ๐จ Modern UI - Sleek, terminal-inspired React frontend with real-time updates
- ๐ Detailed Reports - Comprehensive vulnerability reports with severity scoring
- ๐ง Modular Architecture - Extensible attack modules for different vulnerability types
Watch Neural X in action:
โ OWASP ZAP Integration
- Spider crawling for page discovery
- Passive scanning for initial vulnerability detection
- AJAX crawling support for Single Page Applications (SPAs)
โ AI Attack Planning
- Intelligent analysis of attack surfaces
- Contextual attack selection
- Reduced false positives
โ Vulnerability Detection
- IDOR (Insecure Direct Object Reference)
- XSS (Cross-Site Scripting)
- DOM-XSS (DOM-based XSS)
- Authentication Bypass
โ Advanced Reporting
- Real-time log streaming
- Severity scoring engine
- JSON structured reports
- Detailed vulnerability evidence
โ Modern Frontend
- Terminal-style interface
- Real-time scan progress
- Live vulnerability reporting
- HTTP polling for status updates
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Frontend (React) โ
โ โโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโ โ
โ โ Scanner โ โ Terminal โ โ Report โ โ
โ โ Interface โ โ Logs โ โ Viewer โ โ
โ โโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โ HTTP Polling
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Backend (FastAPI) โ
โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ API Server (Port 8000) โ โ
โ โ โข POST /attack - Start scan โ โ
โ โ โข GET /status/{runId} - Get scan status โ โ
โ โ โข GET /health - Health check โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ Core Orchestrator โ โ
โ โ โข Manages scan lifecycle โ โ
โ โ โข Coordinates attack modules โ โ
โ โ โข Generates reports โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ โ
โ โโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโ โ
โ โ โ โ โ
โ โผ โผ โผ โ
โ โโโโโโโโโโโโโ โโโโโโโโโโโโโ โโโโโโโโโโโโโ โ
โ โ ZAP โ โ AI โ โ Attack โ โ
โ โ Client โ โ Planner โ โ Modules โ โ
โ โโโโโโโโโโโโโ โโโโโโโโโโโโโ โโโโโโโโโโโโโ โ
โ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโ
โ OWASP ZAP โ
โ (Port 8080) โ
โโโโโโโโโโโโโโโโโโโโโ
โ
โผ
โโโโโโโโโโโโโโโโโโโโโ
โ Target Website โ
โโโโโโโโโโโโโโโโโโโโโ
| Layer | Technology |
|---|---|
| Frontend | React 19.2, Vite, TailwindCSS |
| Backend | Python 3.10+, FastAPI, Uvicorn |
| Scanner | OWASP ZAP |
| AI | OpenAI API (GPT-based planning) |
| Icons | Lucide React |
| Styling | TailwindCSS 4.1 |
fortex26/
โ
โโโ backend/
โ โโโ ai/
โ โ โโโ planner.py # AI attack planning logic
โ โ โโโ severity.py # Vulnerability severity scoring
โ โ
โ โโโ attacks/
โ โ โโโ idor.py # IDOR vulnerability testing
โ โ โโโ xss.py # XSS vulnerability testing
โ โ โโโ dom_xss.py # DOM-XSS testing
โ โ โโโ auth.py # Authentication bypass testing
โ โ
โ โโโ core/
โ โ โโโ orchestrator.py # Main scan orchestration
โ โ
โ โโโ reporting/
โ โ โโโ report_generator.py # Report generation
โ โ
โ โโโ zap/
โ โ โโโ zap_client.py # ZAP API client
โ โ โโโ adapter.py # ZAP data adapters
โ โ
โ โโโ api_server.py # FastAPI server
โ โโโ main.py # CLI entry point
โ โโโ requirements.txt # Python dependencies
โ โโโ .env # Environment configuration
โ
โโโ frontend/
โ โโโ src/
โ โ โโโ components/
โ โ โ โโโ ReportViewer.jsx # Vulnerability report UI
โ โ โโโ App.jsx # Main application
โ โ โโโ main.jsx # React entry point
โ โ โโโ index.css # Global styles
โ โ
โ โโโ index.html # HTML template
โ โโโ package.json # Node dependencies
โ โโโ vite.config.js # Vite configuration
โ
โโโ readme.md # This file
- Python 3.10+
- Node.js 18+ and npm
- OWASP ZAP (installed and accessible)
- OpenAI API Key (for AI planning features)
git clone https://github.com/yourusername/fortex26.git
cd fortex26cd backend
# Create virtual environment
python -m venv .venv
# Activate virtual environment
# Windows:
.venv\Scripts\activate
# Linux/Mac:
source .venv/bin/activate
# Install dependencies
pip install -r requirements.txtCreate a .env file in the backend/ directory:
# ZAP Configuration
ZAP_PROXY=http://localhost:8080
ZAP_API_KEY=changeme
# Target Configuration
TARGET_URL=http://localhost:3000
# OpenAI Configuration
OPENAI_API_KEY=your_openai_api_key_hereWindows (PowerShell):
cd backend
.\start_zap_daemon.ps1Linux/Mac:
zap.sh -daemon -host 0.0.0.0 -port 8080 -config api.key=changeme \
-config api.addrs.addr.name=.* -config api.addrs.addr.regex=truecd frontend
# Install dependencies
npm installTerminal 1 - Start Backend:
cd backend
.venv\Scripts\activate # Windows
# source .venv/bin/activate # Linux/Mac
python api_server.pyTerminal 2 - Start Frontend:
cd frontend
npm run devTerminal 3 - Ensure ZAP is Running:
# Check ZAP status
curl http://localhost:8080Open your browser and navigate to:
http://localhost:5173
- Enter Target URL - Input the website URL you want to scan
- Click "Scan" - Start the security assessment
- Monitor Progress - Watch real-time logs in the terminal view
- Review Results - View detailed vulnerability reports
You can also run scans directly from the command line:
cd backend
python main.pyhttp://localhost:8000
Start a new security scan.
Request Body:
{
"url": "https://example.com"
}Response:
{
"runId": "uuid-string"
}Get the current status of a scan.
Response:
{
"status": "SCANNING",
"logs": [
{
"timestamp": "2026-01-29T10:00:00",
"message": "Starting scan...",
"type": "info"
}
],
"report": {
"target": "https://example.com",
"findings": [],
"summary": {}
}
}Health check endpoint.
Response:
{
"status": "healthy",
"active_scans": 0
}This tool is for authorized security testing only.
You must have explicit permission to scan any target. Unauthorized scanning is illegal and unethical.
โ
Your own applications
โ
Applications you have written permission to test
โ
Local lab environments (e.g., OWASP Juice Shop)
โ
Bug bounty programs with proper authorization
โ DO NOT scan websites without permission
โ DO NOT use for malicious purposes
For safe testing, use OWASP Juice Shop:
# Run with Docker
docker run -d -p 3000:3000 bkimminich/juice-shop
# Set TARGET_URL in .env
TARGET_URL=http://localhost:3000
# Start scanning- Create a new file in
backend/attacks/ - Implement the attack logic
- Register in
core/orchestrator.py - Update AI planner in
ai/planner.py
Example:
# backend/attacks/sql_injection.py
class SQLInjectionTester:
def __init__(self, headers=None):
self.headers = headers or {}
def run(self, endpoints):
findings = []
# Your attack logic here
return findingsThe frontend uses TailwindCSS for styling. Modify frontend/src/App.jsx to customize the UI.
# Check if ZAP is running
curl http://localhost:8080
# Verify API key in .env matches ZAP configuration# Ensure backend is running on port 8000
# Check CORS settings in api_server.py# Verify all environment variables are set
# Check ZAP logs for errors
# Ensure target URL is accessible- Machine learning-based attack prioritization
- Authenticated scanning support
- SQL injection detection
- CSRF vulnerability testing
- PDF report generation
- Multi-target scanning
- CI/CD integration
- Docker containerization
- Cloud deployment support
Contributions are welcome! Please follow these steps:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
Team Neural X
Built with โค๏ธ for ethical security testing

