An advanced, AI-powered tool for automated vulnerability scanning and bug bounty hunting.
AI-Bug-Bounty combines cutting-edge machine learning techniques with traditional security tools to provide comprehensive security assessments. This project aims to automate the process of identifying vulnerabilities in web applications, making it an invaluable asset for both security professionals and bug bounty hunters.
- AI-Driven Analysis: Utilizes the Groq API for intelligent vulnerability detection and analysis.
- Plugin Architecture: Easily extendable with custom security scanning plugins.
- Multi-Agent System: Parallel scanning capabilities for improved performance.
- Automated Reporting: Generates detailed PDF reports of scan results with vulnerability charts.
- Integration with Popular Tools: Incorporates well-known security tools and techniques.
- Web Interface: User-friendly web UI for easy interaction and result visualization.
- Vulnerability Database: Integration with NVD for up-to-date vulnerability information.
- Machine Learning Model: Fine-tunable model for improved vulnerability detection.
- Notification System: Supports Telegram and Discord notifications for scan results.
- Monitoring Mode: Continuous scanning of target URLs at specified intervals.
- Python 3.9+
- Docker (optional)
- Groq API key
- Telegram Bot Token and Chat ID (optional)
- Discord Webhook URL (optional)
-
Clone the repository:
git clone https://github.com/Likhithsai2580/AI-Bug-Bounty.git cd AI-Bug-Bounty
-
Install dependencies:
pip install -r requirements.txt
-
Set up your configuration: Create a
config.py
file in the root directory with the following content:GROK_API_KEY = "YOUR_GROQ_API_KEY" TELEGRAM_BOT_TOKEN = "YOUR_TELEGRAM_BOT_TOKEN" TELEGRAM_CHAT_ID = "YOUR_TELEGRAM_CHAT_ID" DISCORD_WEBHOOK_URL = "YOUR_DISCORD_WEBHOOK_URL"
Replace the placeholder values with your actual API keys and IDs.
-
Run the scanner:
python main.py [TARGET_URLS] [--mode {regular,monitor}]
Example:
python main.py https://example.com https://test.com --mode monitor
-
For web interface (if implemented):
python web_interface.py
Then open your web browser and navigate to
http://localhost:5000
-
View the results in the console output and check the generated PDF report in the
reports
directory.
Edit plugin_config.yaml
to customize plugin behavior:
sql_injection:
enabled: true
options:
timeout: 30
max_depth: 3
-
Create a new Python file in the
plugins
directory (e.g.,my_plugin.py
) -
Implement the plugin interface:
class Plugin: def __init__(self, options): self.options = options async def run(self, target_url): # Implement your scanning logic here return results def get_info(self): return { "name": "My Custom Plugin", "description": "Description of what the plugin does", "version": "1.0.0" }
-
Add the plugin configuration to
plugin_config.yaml
:my_plugin: enabled: true options: custom_option: value
To create documentation for your plugin, follow these steps:
- Create a new Markdown file in the
docs/plugins
directory (e.g.,my_plugin.md
) - Document the plugin's functionality, configuration options, and usage examples.
- Link the documentation file in the main
README.md
or a dedicateddocs/README.md
file.
main.py
: Entry point of the applicationagent_system.py
: Implements the multi-agent scanning systemplugin_manager.py
: Manages loading and running of pluginsllm/llama.py
: Wrapper for the Groq API integrationreport_generator.py
: Generates PDF reports of scan resultsplugins/
: Directory containing all scanning pluginsDockerfile
: Defines the Docker image for the project
Contributions are welcome! Please feel free to submit a Pull Request.
This project is licensed under the MIT License - see the LICENSE file for details.
This tool is for educational and authorized testing purposes only. Always obtain permission before scanning any website you don't own or have explicit authorization to test.
If you find this project useful, consider supporting its development:
- GitHub: Likhithsai2580
- Patreon: anony45
For any queries or suggestions, please open an issue on the GitHub repository.