eva-exploit 2.5__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,410 @@
1
+ Metadata-Version: 2.4
2
+ Name: eva-exploit
3
+ Version: 2.5
4
+ Summary: Exploit Vector Agent
5
+ Author: ARCANGEL0
6
+ License: MIT
7
+ Requires-Python: >=3.10
8
+ Description-Content-Type: text/markdown
9
+ Requires-Dist: colorama>=0.4.6
10
+ Requires-Dist: openai>=1.0.0
11
+ Requires-Dist: requests>=2.31.0
12
+
13
+ ![EVA Banner](eva.jpeg)
14
+
15
+ <div align="center">
16
+
17
+ # โซป ๐ฃ.๐—ฉ.๐ 
18
+ ## โฎก Exploit Vector Agent
19
+ <br>
20
+
21
+ **Autonomous offensive security AI for guiding pentest processes**
22
+
23
+ [![Stars](https://img.shields.io/github/stars/ARCANGEL0/EVA?style=for-the-badge&color=353535)](https://github.com/ARCANGEL0/EVA)
24
+ [![Watchers](https://img.shields.io/github/watchers/ARCANGEL0/EVA?style=for-the-badge&color=353535)](https://github.com/ARCANGEL0/EVA)
25
+ [![Forks](https://img.shields.io/github/forks/ARCANGEL0/EVA?style=for-the-badge&color=353535)](https://github.com/ARCANGEL0/EVA/fork)
26
+ [![Repo Views](https://komarev.com/ghpvc/?username=eva&color=353535&style=for-the-badge&label=REPO%20VIEWS)](https://github.com/ARCANGEL0/EVA)
27
+
28
+ [![License](https://img.shields.io/badge/License-MIT-223355.svg?style=for-the-badge)](LICENSE)
29
+ [![Security](https://img.shields.io/badge/For-Offensive%20Security-8B0000.svg?style=for-the-badge)](#)
30
+ [![AI](https://img.shields.io/badge/AI-Powered-cyan.svg?style=for-the-badge)](#)
31
+
32
+ ![GitHub issues](https://img.shields.io/github/issues/ARCANGEL0/EVA?style=for-the-badge&color=3f3972)
33
+ ![GitHub pull requests](https://img.shields.io/github/issues-pr/ARCANGEL0/EVA?style=for-the-badge&color=3f3972)
34
+ ![GitHub contributors](https://img.shields.io/github/contributors/ARCANGEL0/EVA?style=for-the-badge&color=3f3972)
35
+ ![GitHub last commit](https://img.shields.io/github/last-commit/ARCANGEL0/EVA?style=for-the-badge&color=3f3972)
36
+
37
+ </div>
38
+
39
+ ---
40
+
41
+ ## ๐บ Overview
42
+
43
+ **EVA** is an AI penetration testing agent that guides users through complete pentest engagements with AI-powered attack strategy, autonomous command generation, and real-time vulnerability analysis based on outputs. The goal is not to replace the pentest professional but to guide and assist and provide faster results.
44
+
45
+ ### Main funcionalities
46
+
47
+ - **๐Ÿœ‚ Intelligent Reasoning**: Advanced AI-driven analysis and attack path identification depending on query.
48
+ - **โตข Automated Enumeration**: Systematic target reconnaissance and information gathering based on provided target.
49
+ - **๊Žˆ Vulnerability Assessment**: AI-powered vulnerability identification and exploitation strategies, suggesting next steps for vulnerability or OSINT.
50
+ - **โ‘‡ Multiple AI Backends**: Support for Ollama, OpenAI GPT, Anthropic, Gemini, G4F.dev and custom API endpoints
51
+ - **ใ„– Session Management**: Persistent sessions and chats
52
+ - **โ‘… Interactive Interface**: Real-time command execution and analysis of output in multi-stage.
53
+
54
+ ---
55
+
56
+
57
+ ## โตข EVA Logic & Pentest Process Flow
58
+
59
+ ```mermaid
60
+ graph TD
61
+
62
+ A[๐Ÿœ‚ EVA Launch] --> B{๐Ÿขง Session Selection}
63
+ B -->|Existing Session| C[๐Ÿขง Load Session Data]
64
+ B -->|New Session| D[฿ญ Initialize Session]
65
+ C --> E[ใ„– Select AI Backend]
66
+ D --> E
67
+
68
+ E --> F[๐Ÿฆ™ Ollama Local]
69
+ E --> G[โฌก OpenAI GPT]
70
+ E --> J1[โœถ Anthropic Claude]
71
+ E --> J2[โœฆ Google Gemini]
72
+ E --> H[โŸ… Custom API]
73
+ E --> I[๐Ÿœ… G4F.dev Provider]
74
+
75
+ F --> J[Pentest Shell]
76
+ G --> J
77
+ J1 --> J
78
+ J2 --> J
79
+ H --> J
80
+ I --> J
81
+
82
+ J --> K[โŒ– Target Definition]
83
+ K --> L[๐Ÿง  AI Pentest Strategy]
84
+
85
+ L --> M[๐Ÿฏ Reconnaissance Phase]
86
+ M --> N[โžค_ Execute Commands]
87
+ N --> O[๊ސ Analyze Results]
88
+ O --> P{แˆ Vulnerabilities Found?}
89
+
90
+ P -->|Yes| Q[๐Ÿ–ง Exploitation Planning]
91
+ P -->|No| R[โญฏ More Enumeration]
92
+ R --> L
93
+
94
+ Q --> S[โšก Exploitation Phase]
95
+ Q --> T[Export graphs and mapped networks
96
+ - IN DEVELOPMENT -]
97
+
98
+ S --> U[โžค_ Execute Exploit]
99
+ U --> V{๐Ÿžœ Access Gained?}
100
+
101
+ V -->|Yes| W[๐ฑƒ Privilege Escalation]
102
+ V -->|Failed| X[โญฏ Alternative Methods]
103
+ X --> Q
104
+
105
+ W --> Y[๐ฆ Post-Exploitation]
106
+ Y --> Z{๐Ÿžœ Objectives Met?}
107
+
108
+ Z -->|Generate Report| AA[๐Ÿ“‹ Generate Report
109
+ - IN DEVELOPMENT -]
110
+ Z -->|Exit and Save| AB[๐Ÿ’พ Save & Exit]
111
+ Z -->|No| AC[๐Ÿ” Continue Pentest]
112
+ AC --> L
113
+
114
+ AA --> AB
115
+
116
+ subgraph "๐ŸŽ EVA "
117
+ AD[โฏ Attack Strategy AI]
118
+ AE[๐šต Session Memory]
119
+ AF[แฎ Vulnerability Analysis]
120
+ AG[CVE DATABASE SEARCH
121
+ - IN DEVELOPMENT -]
122
+ AH[๐ฐฌ Output Processing]
123
+ end
124
+
125
+ L --> AD
126
+ AD --> AE
127
+ O --> AF
128
+ AF --> AG
129
+ AG --> AH
130
+ AH --> L
131
+ ```
132
+
133
+ ---
134
+
135
+ <details>
136
+ <summary><h2>โžค Quick Start</h2></summary>
137
+
138
+ ### ๐ŸŽ Installation
139
+
140
+ ```bash
141
+ # Ollama for local endpoint (optional)
142
+ curl -fsSL https://ollama.ai/install.sh | shr
143
+
144
+ # pip installation
145
+ pip install eva-exploit
146
+ eva
147
+
148
+ # EVA installation
149
+ git clone https://github.com/ARCANGEL0/EVA.git
150
+ cd EVA
151
+ chmod +x eva.py
152
+ ./eva.py
153
+
154
+ # Adding it to PATH to be acessible anywhere
155
+ sudo mv eva.py /usr/local/bin/eva
156
+ ```
157
+
158
+ ### โฌข Configuring EVA.
159
+
160
+ When starting EVA, it will automatically handle:
161
+ - โœ… OpenAI API key setup (if using GPT backend)
162
+ - โœ… Ollama model download (WhiteRabbit-Neo, feel free to change to any other desired model)
163
+ - โœ… Session directory creation
164
+ - โœ… Dependencies installation
165
+
166
+ <strong> If you wish to modify endpoints, ollama models or other: you can find these options in `config.py` </strong>
167
+
168
+ > EVA is now modular, with a root launcher and separate folders for logic/components.
169
+
170
+ ### ๐Ÿ“ Directory Structure of EVA
171
+
172
+ ```
173
+ ~/.config/eva/
174
+ โ”œโ”€โ”€ sessions/ # Session storage
175
+ โ”‚ โ”œโ”€โ”€ session1.json
176
+ โ”‚ โ”œโ”€โ”€ session2.json
177
+ โ”‚ โ””โ”€โ”€ ...
178
+ โ””โ”€โ”€ .env # API keys (auto-generated)
179
+ ```
180
+
181
+ ### ๊€ฌ Where to change EVA options
182
+
183
+ ```python
184
+ # Key Configuration Options
185
+ API_ENDPOINT = "" # This is the custom API URL.
186
+ G4F_MODEL = "gpt-5-1-instant"
187
+ OLLAMA_MODEL = "jimscard/whiterabbit-neo:latest" # change ollama model as you wish, most recommended one is whiterabbit
188
+ ANTHROPIC_MODEL = "claude-3-5-sonnet-latest"
189
+ GEMINI_MODEL = "gemini-2.0-flash"
190
+ CONFIG_DIR = Path.home() / ".config" / "eva" # config folder for EVA
191
+ SESSIONS_DIR = CONFIG_DIR / "sessions" # where to store EVA sessions
192
+ REPORTS_DIR = CONFIG_DIR / "reports" # generated reports
193
+ MAPS_DIR = CONFIG_DIR / "attack_maps" # generated visual attack maps
194
+ ```
195
+
196
+ </details>
197
+
198
+ <details>
199
+ <summary><h2>๐Ÿ–ด Usage Guide</h2></summary>
200
+
201
+ ### Initialization
202
+
203
+ ```bash
204
+ python3 eva.py
205
+ # or if installed via pip:
206
+ eva
207
+ ```
208
+
209
+ 1. **Select Session**: Choose existing session or create new one
210
+ 2. **Choose AI Backend**:
211
+ - **Ollama** (Recommended): Local AI with WhiteRabbit-Neo model
212
+ - **GPT-5**: OpenAI's latest model (requires API key)
213
+ - **G4F**: Uses g4f.dev endpoints with model GPT 5-1, feel free to change model used.
214
+ - **Anthropic**: Claude API backend (requires API key)
215
+ - **Gemini**: Google Gemini API backend (requires API key)
216
+ - **Custom API**: Your own API endpoint if desired
217
+ 3. In the input field of chat, type in your request or what you need assistance with for EVA to help you!
218
+
219
+ > USER > i need help with a CTF machine, ip is 10.10.16.81
220
+
221
+ ### After making a request, commands will be provided and the pentest workflow will start, use commands below as reference.
222
+
223
+ | Command | Description |
224
+ |---------|-------------|
225
+ | `/exit` / `/quit` | Exit EVA and save session |
226
+ | `/model` | Change AI backend |
227
+ | `/rename` | Rename the current session |
228
+ | `/menu` | Return to session menu |
229
+ | `R` | Run suggested command |
230
+ | `S` | Skip command |
231
+ | `A` | Ask for next step |
232
+ | `Q` | Quit session |
233
+
234
+ ### ใ„– Example of chat session
235
+
236
+ > demonstration video.
237
+
238
+ ![Demo Usage](https://raw.githubusercontent.com/ARCANGEL0/EVA/refs/heads/main/demo.gif)
239
+
240
+
241
+ ```
242
+ USER > I'm on a Windows target at IP 10.10.11.95, what should I enumerate first?
243
+
244
+ [ANALYSIS]
245
+ Based on the Windows environment, I need to perform comprehensive
246
+ enumeration focusing on:
247
+
248
+ 1. System Information (OS version, patches, architecture)
249
+ 2. Network Services (ports, services, listening processes)
250
+ 3. User Context (current user, groups, privileges)
251
+ 4. Security Controls (AV, firewall, UAC settings)
252
+ 5. Potential Attack Vectors (SMB, RDP, IIS, etc.)
253
+
254
+ Let me start with basic system reconnaissance to understand the target better...
255
+
256
+ > execute: nmap -sC -sV -O 10.10.10.10
257
+ | [R]un | [S]kip | [A]sk | [G]enerate HTML Report | [V]iew attack map | [Q]uit |
258
+
259
+ > R
260
+ ```
261
+
262
+ </details>
263
+
264
+
265
+ <details>
266
+ <summary><h2>ฮž AI Backends</h2></summary>
267
+
268
+ ### ๐Ÿฆ™ Ollama (Recommended)
269
+ - **Model**: `jimscard/whiterabbit-neo:latest` (best one for OffSec)
270
+ - โœ… Complete offline operation
271
+ - โœ… No API costs
272
+ - โœ… Privacy-focused
273
+ - โŒ Higher CPU/GPU usage, recommended for machines above 16GB VRAM/RAM
274
+ - โŒ Heavier model, ~9.8gb model
275
+
276
+ ### โฌก OpenAI GPT
277
+ - **Models**: GPT-5, GPT-4.1 (fallback)
278
+ - **About**:
279
+ - โœ… Faster reasoning
280
+ - โœ… Extensive knowledge base
281
+ - โœ… Continuous updates
282
+ - โŒ Paid, requires apikey
283
+
284
+ ### แ›ƒ G4F.dev
285
+ - **Models**: GPT-5-1
286
+ - **About**:
287
+ - โœ… Updated information in real-time (usually)
288
+ - โœ… Quick responses
289
+ - โŒ Might be unstable or down sometimes, low stability.
290
+
291
+ ### โŸ… Custom API
292
+ - **Endpoint**: Configurable in `API_ENDPOINT` to use your own as you wish.
293
+ - **About**:
294
+ - โœ… Custom model integration
295
+ - โœ… Modifiable as you wish
296
+
297
+ #### More backends compability will be provided soon!
298
+
299
+ ### โœถ Anthropic
300
+ - **Model**: Configurable via `ANTHROPIC_MODEL`
301
+ - **About**:
302
+ - โœ… Strong reasoning quality
303
+ - โœ… Stable commercial API
304
+ - โŒ Requires `ANTHROPIC_API_KEY`
305
+
306
+ ### โœฆ Gemini
307
+ - **Model**: Configurable via `GEMINI_MODEL`
308
+ - **About**:
309
+ - โœ… Fast response latency
310
+ - โœ… Native JSON output mode
311
+ - โŒ Requires `GEMINI_API_KEY`
312
+
313
+ </details>
314
+
315
+ <details>
316
+ <summary><h2>โ‘‡ Roadmap</h2></summary>
317
+
318
+ - [x] **โฌข OpenAI integration**: Integrated OpenAI into EVA
319
+ - [x] **โฌข G4F.DEV**: Added G4F endpoints to free GPT5 usage.
320
+ - [x] **โฌข Custom API**: Add custom endpoint besides ollama and OpenAI
321
+ - [x] **โฌก Automated Reporting**: Concise HTML report generation (+ optional PDF via wkhtmltopdf)
322
+ - [ ] **โฌก Cloud Integration**: AWS/GCP deployment ready
323
+ - [ ] **โฌก CVE Database Integration**: Real-time vulnerability data
324
+ - [ ] **โฌก Web Interface**: Browser-based EVA dashboard
325
+ - [ ] **โฌก Visual Attack Maps**: Interactive network diagrams such as connections or such, like Kerberos domains and AD devices.
326
+
327
+ </details>
328
+
329
+
330
+ <details>
331
+ <summary><h2>โจน Legal Notice</h2></summary>
332
+
333
+ ### ๐Ÿšจ IMPORTANT
334
+
335
+ ### This tool is for allowed environment only!
336
+
337
+ #### โœ… APPROVED USE CASES
338
+ > CTF (Capture The Flag) competitions <br>
339
+ > Authorized penetration testing <br>
340
+ > Security research and laboratory environments <br>
341
+ > Systems you own or have explicit permission to test <br>
342
+
343
+ #### ๐Ÿšซ PROHIBITED USE
344
+ > Unauthorized access to any system <br>
345
+ > Illegal or malicious activities <br>
346
+ > Production systems without explicit authorization <br>
347
+ > Networks you do not own or control
348
+
349
+ ### โš ๏ธ DISCLAIMER
350
+ ```
351
+ I take no responsibility for misuse, illegal activity, or unauthorized use.
352
+ Any and all consequences are the sole responsibility of the user.
353
+ ```
354
+
355
+ </details>
356
+
357
+
358
+ <details>
359
+ <summary><h2>โซป License</h2></summary>
360
+
361
+ ### MIT License
362
+
363
+ ```
364
+ MIT License
365
+
366
+ Copyright (c) 2025 EVA - Exploit Vector Agent
367
+
368
+ Permission is hereby granted, free of charge, to any person obtaining a copy
369
+ of this software and associated documentation files (the "Software"), to deal
370
+ in the Software without restriction, including without limitation the rights
371
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
372
+ copies of the Software, and to permit persons to whom the Software is
373
+ furnished to do so, subject to the following conditions:
374
+
375
+ The above copyright notice and this permission notice shall be included in all
376
+ copies or substantial portions of the Software.
377
+
378
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
379
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
380
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
381
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
382
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
383
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
384
+ SOFTWARE.
385
+ ```
386
+
387
+ </details>
388
+
389
+ <div align="center">
390
+
391
+ ## โค๏ธ Support
392
+
393
+ ### if you enjoy the project and want to support future development:
394
+
395
+ [![Star on GitHub](https://img.shields.io/github/stars/ARCANGEL0/EVA?style=social)](https://github.com/ARCANGEL0/EVA)
396
+ [![Follow on GitHub](https://img.shields.io/github/followers/ARCANGEL0?style=social)](https://github.com/ARCANGEL0)
397
+ <br>
398
+
399
+ <a href='https://ko-fi.com/J3J7WTYV7' target='_blank'><img height='36' style='border:0px;height:36px;' src='https://storage.ko-fi.com/cdn/kofi3.png?v=6' border='0' alt='Buy Me a Coffee at ko-fi.com' /></a>
400
+ <br>
401
+ <strong>Hack the world. Byte by Byte.</strong> โ›› <br>
402
+ ๐บ๐—ฟ๐—ฐ๐—ฎ๐—ป๐—ด๐—ฒ๐—น๐—ผ @ 2025
403
+
404
+ **[[๊‹ง]](#-๐ฃ๐—ฉ๐ )**
405
+
406
+ </div>
407
+
408
+ ---
409
+
410
+ *โš ๏ธ Remember: With great power comes great responsibility. Use this tool ethically and legally.*