souleyez 2.32.0__py3-none-any.whl → 2.40.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,319 +0,0 @@
1
- Metadata-Version: 2.4
2
- Name: souleyez
3
- Version: 2.32.0
4
- Summary: AI-Powered Penetration Testing Platform with 40+ integrated tools
5
- Author-email: CyberSoul Security <contact@cybersoulsecurity.com>
6
- Maintainer-email: CyberSoul Security <contact@cybersoulsecurity.com>
7
- License: MIT
8
- Project-URL: Homepage, https://github.com/cyber-soul-security/SoulEyez
9
- Project-URL: Documentation, https://github.com/cyber-soul-security/SoulEyez#readme
10
- Project-URL: Repository, https://github.com/cyber-soul-security/SoulEyez.git
11
- Project-URL: Issues, https://github.com/cyber-soul-security/SoulEyez/issues
12
- Keywords: pentesting,security,hacking,penetration-testing,cybersecurity,nmap,metasploit
13
- Classifier: Development Status :: 4 - Beta
14
- Classifier: Environment :: Console
15
- Classifier: Environment :: Console :: Curses
16
- Classifier: Intended Audience :: Developers
17
- Classifier: Intended Audience :: Information Technology
18
- Classifier: Intended Audience :: System Administrators
19
- Classifier: License :: OSI Approved :: MIT License
20
- Classifier: Operating System :: POSIX :: Linux
21
- Classifier: Operating System :: MacOS
22
- Classifier: Programming Language :: Python :: 3
23
- Classifier: Programming Language :: Python :: 3.8
24
- Classifier: Programming Language :: Python :: 3.9
25
- Classifier: Programming Language :: Python :: 3.10
26
- Classifier: Programming Language :: Python :: 3.11
27
- Classifier: Programming Language :: Python :: 3.12
28
- Classifier: Programming Language :: Python :: 3.13
29
- Classifier: Topic :: Security
30
- Classifier: Topic :: System :: Networking
31
- Requires-Python: >=3.8
32
- Description-Content-Type: text/markdown
33
- License-File: LICENSE
34
- Requires-Dist: anthropic>=0.40.0
35
- Requires-Dist: click>=8.0.0
36
- Requires-Dist: cryptography>=3.4.0
37
- Requires-Dist: defusedxml>=0.7.0
38
- Requires-Dist: impacket>=0.11.0
39
- Requires-Dist: markdown>=3.4.0
40
- Requires-Dist: msgpack>=1.0.0
41
- Requires-Dist: ollama>=0.1.0
42
- Requires-Dist: psycopg2-binary>=2.9.0
43
- Requires-Dist: psutil>=5.9.0
44
- Requires-Dist: python-json-logger>=2.0.0
45
- Requires-Dist: requests>=2.28.0
46
- Requires-Dist: rich>=10.0.0
47
- Requires-Dist: wcwidth>=0.2.0
48
- Provides-Extra: dev
49
- Requires-Dist: pytest>=7.0.0; extra == "dev"
50
- Dynamic: license-file
51
-
52
- # SoulEyez Beta Program
53
-
54
- [![CI](https://github.com/cyber-soul-security/souleyez/actions/workflows/python-ci.yml/badge.svg)](https://github.com/cyber-soul-security/souleyez/actions/workflows/python-ci.yml)
55
- [![codecov](https://codecov.io/gh/cyber-soul-security/souleyez/branch/main/graph/badge.svg)](https://codecov.io/gh/cyber-soul-security/souleyez)
56
- [![Python 3.9+](https://img.shields.io/badge/python-3.9+-blue.svg)](https://www.python.org/downloads/)
57
- [![Code style: black](https://img.shields.io/badge/code%20style-black-000000.svg)](https://github.com/psf/black)
58
- [![Security: bandit](https://img.shields.io/badge/security-bandit-yellow.svg)](https://github.com/PyCQA/bandit)
59
-
60
- Welcome to the SoulEyez beta! Thank you for helping us test and improve this penetration testing management platform.
61
-
62
- ---
63
-
64
- ## What is SoulEyez?
65
-
66
- **SoulEyez is your penetration testing command center.** Instead of juggling dozens of terminal windows and text files, SoulEyez gives you one organized place to:
67
-
68
- - **Run security scans** - Execute tools like Nmap, Gobuster, SQLMap with simple commands
69
- - **Auto-discover next steps** - When one scan finds something interesting, SoulEyez automatically suggests (or runs) the next logical tool
70
- - **Stay organized** - Keep all your targets, findings, and credentials in one searchable database
71
- - **Generate reports** - Export professional reports when you're done
72
-
73
- ### Who is this for?
74
-
75
- - **Security professionals** conducting authorized penetration tests
76
- - **CTF players** who want better organization during competitions
77
- - **Students** learning penetration testing methodology
78
-
79
- > ⚠️ **Important**: Only use SoulEyez on systems you have explicit authorization to test.
80
-
81
- ## Version: 2.32.0
82
-
83
- ### What's Included
84
-
85
- | Feature | FREE Tier | PRO Tier |
86
- |---------|-----------|----------|
87
- | **Core Features** | | |
88
- | Run security scans | ✅ | ✅ |
89
- | Organize targets & findings | ✅ | ✅ |
90
- | Encrypted credential storage | ✅ | ✅ |
91
- | 20+ integrated tools | ✅ | ✅ |
92
- | Report generation | ✅ | ✅ |
93
- | **AI & Automation** | | |
94
- | AI-powered suggestions | ❌ | ✅ |
95
- | Automatic tool chaining | ❌ | ✅ |
96
- | AI Execute (natural language commands) | ❌ | ✅ |
97
- | **Exploitation** | | |
98
- | Metasploit integration | ❌ | ✅ |
99
- | Exploit suggestions (MSF modules) | ❌ | ✅ |
100
- | Exploitation progress tracking | ❌ | ✅ |
101
- | **SIEM Integration (Purple Team)** | | |
102
- | Wazuh integration | ❌ | ✅ |
103
- | Splunk integration | ❌ | ✅ |
104
- | Detection validation | ❌ | ✅ |
105
- | Vulnerability management views | ❌ | ✅ |
106
- | Gap analysis (passive vs active) | ❌ | ✅ |
107
- | MITRE ATT&CK detection reports | ❌ | ✅ |
108
- | **Intelligence Hub** | | |
109
- | Attack surface scoring | ❌ | ✅ |
110
- | Exploitation gaps analysis | ❌ | ✅ |
111
- | Real-time SIEM alerts | ❌ | ✅ |
112
-
113
- ### System Requirements
114
-
115
- - **Operating System**: Kali Linux or Ubuntu 22.04+ (Windows users: use WSL)
116
- - **Python**: 3.8 or newer
117
- - **Storage**: ~500MB for SoulEyez + tools
118
-
119
- > **🐉 Kali Linux Recommended**
120
- >
121
- > SoulEyez performs significantly better on **Kali Linux** than other distributions:
122
- > - All pentesting tools pre-installed and optimized
123
- > - Metasploit database and RPC already configured
124
- > - Security-focused kernel and networking stack
125
- > - No dependency hunting or version conflicts
126
- > - Wordlists, databases, and tool configs ready to go
127
- >
128
- > While Ubuntu and other Debian-based distros are supported, you may experience slower setup times and occasional tool compatibility issues.
129
-
130
- ### Known Issues
131
-
132
- - Very large scan outputs (>10MB) may slow the interface
133
- - Some edge cases in tool output parsing
134
-
135
- ## Quick Start (Step-by-Step)
136
-
137
- ### Step 1: Install Prerequisites
138
-
139
- First, we need `pipx` - a tool that safely installs Python CLI apps:
140
-
141
- ```bash
142
- sudo apt install pipx # Install pipx
143
- pipx ensurepath # Add pipx apps to your PATH
144
- source ~/.bashrc # Reload your shell (or close and reopen terminal)
145
- ```
146
-
147
- > **Kali Linux users:** Kali uses zsh by default. Use `source ~/.zshrc` instead of `source ~/.bashrc`
148
-
149
- > 💡 **What's pipx?** It's like `apt` but for Python command-line tools. It keeps each tool isolated so they don't conflict with each other.
150
-
151
- ### Step 2: Install SoulEyez
152
-
153
- ```bash
154
- pipx install souleyez
155
- ```
156
-
157
- This downloads SoulEyez and all its dependencies. Takes 1-2 minutes.
158
-
159
- ### Step 3: Launch SoulEyez
160
-
161
- ```bash
162
- souleyez dashboard
163
- ```
164
-
165
- ### Step 4: First-Time Setup Wizard
166
-
167
- On your first run, SoulEyez guides you through setup:
168
-
169
- 1. **Tool Installation** - Detects missing security tools (nmap, sqlmap, etc.) and offers to install them
170
- 2. **Vault Password** - You'll create a master password that encrypts sensitive data
171
- 3. **Admin Account** - Create your login credentials
172
- 4. **First Engagement** - Set up your first project (like "Home Lab Test" or "CTF Challenge")
173
-
174
- > 💡 **What's an engagement?** Think of it as a project folder. Everything you discover during a test (hosts, services, credentials) is stored in that engagement.
175
-
176
- ### Step 5: You're Ready!
177
-
178
- Once setup completes, you'll see the main menu. Navigate using the numbered options.
179
-
180
- **Recommended: Run the built-in tutorial!**
181
-
182
- Go to: **Settings & Security** → **[t] Tutorial**
183
-
184
- The interactive tutorial walks you through:
185
- 1. Creating your first engagement
186
- 2. Running a basic reconnaissance scan
187
- 3. Viewing and understanding results
188
- 4. Using the real-time dashboard
189
- 5. Next steps and tips
190
-
191
- ---
192
-
193
- ## Common Commands
194
-
195
- Here are the commands you'll use most often:
196
-
197
- | Command | What it does |
198
- |---------|--------------|
199
- | `souleyez dashboard` | Launch the main interface |
200
- | `souleyez doctor` | Check if everything is set up correctly |
201
- | `souleyez setup` | Install/update pentesting tools |
202
- | `souleyez --help` | Show all available commands |
203
- | `souleyez <command> --help` | Get help for a specific command |
204
-
205
- ### Quick Troubleshooting
206
-
207
- | Problem | Solution |
208
- |---------|----------|
209
- | "command not found: souleyez" | Run `pipx ensurepath` then restart your terminal |
210
- | "Tool not found" errors | Run `souleyez setup` to install missing tools |
211
- | Forgot your password | Data is encrypted - you'll need to start fresh with `rm -rf ~/.souleyez` |
212
- | Something seems broken | Run `souleyez doctor` to diagnose the issue |
213
-
214
- ---
215
-
216
- ## Reporting Issues & Feedback
217
-
218
- ### Email (Preferred for Beta)
219
- **cysoul.secit@gmail.com**
220
-
221
- When reporting issues, please include:
222
- - SoulEyez version (`souleyez --version`)
223
- - Operating system and version
224
- - Steps to reproduce
225
- - Error messages (screenshots or copy/paste)
226
- - Expected vs actual behavior
227
-
228
- ### Bug Report Template
229
- ```
230
- **Description:**
231
- [Brief description of the issue]
232
-
233
- **Steps to Reproduce:**
234
- 1.
235
- 2.
236
- 3.
237
-
238
- **Expected Behavior:**
239
- [What should happen]
240
-
241
- **Actual Behavior:**
242
- [What actually happens]
243
-
244
- **Environment:**
245
- - OS:
246
- - Python:
247
- - SoulEyez version:
248
-
249
- **Screenshots/Logs:**
250
- [If applicable]
251
- ```
252
-
253
- ### Feature Requests
254
- We welcome feature suggestions! Please prefix your issue title with `[Feature Request]`.
255
-
256
- ## Security Vulnerabilities
257
-
258
- For security-related issues, please do NOT open a public GitHub issue.
259
-
260
- Contact: cysoul.secit@gmail.com
261
-
262
- Or see [SECURITY.md](SECURITY.md) for our security policy.
263
-
264
- ## Beta Feedback Survey
265
-
266
- Help us improve SoulEyez by completing our quick feedback survey:
267
-
268
- **[Take the Beta Feedback Survey](https://docs.google.com/forms/d/e/1FAIpQLSfylyvCor681VLeP7qGgFRDHCyzRDCFhiyjE6IqLbQDUB6-Jg/viewform?usp=send_form)**
269
-
270
- ## Beta Testing Guidelines
271
-
272
- ### What We Need Tested
273
- - [ ] Full workflow: Create engagement → Add hosts → Run scans → Record findings → Generate report
274
- - [ ] Credential encryption/decryption cycle
275
- - [ ] Multi-user collaboration features
276
- - [ ] Tool parsers (especially edge cases)
277
- - [ ] Auto-chaining behavior
278
- - [ ] Report generation quality
279
- - [ ] UI responsiveness and navigation
280
-
281
- ### What to Avoid
282
- - Don't test on production networks without authorization
283
- - Don't store real client data in the beta (use test data)
284
- - Don't share your vault password
285
-
286
- ## Support
287
-
288
- - **Email**: cysoul.secit@gmail.com
289
- - **Built-in Help**: Run `souleyez --help` or `souleyez <command> --help`
290
- - **Diagnostics**: Run `souleyez doctor` to check your setup
291
-
292
- ---
293
-
294
- ## Glossary (New to Pentesting?)
295
-
296
- | Term | Meaning |
297
- |------|---------|
298
- | **Engagement** | A project or assessment - contains all data for one test |
299
- | **Target/Host** | A computer, server, or device you're testing |
300
- | **Service** | A program running on a port (like a web server on port 80) |
301
- | **Finding** | A security issue or vulnerability you discovered |
302
- | **Credential** | Username/password combo found during testing |
303
- | **Port** | A numbered "door" on a computer where services listen (e.g., 22=SSH, 80=HTTP) |
304
- | **Nmap** | Network scanner - finds open ports and services |
305
- | **Gobuster** | Directory scanner - finds hidden web pages |
306
- | **SQLMap** | Automatically tests for SQL injection vulnerabilities |
307
- | **Metasploit** | Framework for running exploits (PRO feature) |
308
-
309
- ---
310
-
311
- ## Thank You!
312
-
313
- Your feedback is invaluable in making SoulEyez better. Every bug report, feature suggestion, and piece of feedback helps us build a tool that truly serves the security community.
314
-
315
- Happy hacking! 🛡️
316
-
317
- ---
318
-
319
- **Version**: 2.32.0 | **Release Date**: January 2026 | **Maintainer**: CyberSoul Security