souleyez 2.39.0__py3-none-any.whl → 2.43.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of souleyez might be problematic. Click here for more details.

@@ -1,265 +0,0 @@
1
- Metadata-Version: 2.4
2
- Name: souleyez
3
- Version: 2.39.0
4
- Summary: AI-Powered Penetration Testing Platform with 40+ integrated tools
5
- Author-email: CyberSoul Security <contact@cybersoulsecurity.com>
6
- Maintainer-email: CyberSoul Security <contact@cybersoulsecurity.com>
7
- License: MIT
8
- Project-URL: Homepage, https://github.com/cyber-soul-security/SoulEyez
9
- Project-URL: Documentation, https://github.com/cyber-soul-security/SoulEyez#readme
10
- Project-URL: Repository, https://github.com/cyber-soul-security/SoulEyez.git
11
- Project-URL: Issues, https://github.com/cyber-soul-security/SoulEyez/issues
12
- Keywords: pentesting,security,hacking,penetration-testing,cybersecurity,nmap,metasploit
13
- Classifier: Development Status :: 4 - Beta
14
- Classifier: Environment :: Console
15
- Classifier: Environment :: Console :: Curses
16
- Classifier: Intended Audience :: Developers
17
- Classifier: Intended Audience :: Information Technology
18
- Classifier: Intended Audience :: System Administrators
19
- Classifier: License :: OSI Approved :: MIT License
20
- Classifier: Operating System :: POSIX :: Linux
21
- Classifier: Operating System :: MacOS
22
- Classifier: Programming Language :: Python :: 3
23
- Classifier: Programming Language :: Python :: 3.8
24
- Classifier: Programming Language :: Python :: 3.9
25
- Classifier: Programming Language :: Python :: 3.10
26
- Classifier: Programming Language :: Python :: 3.11
27
- Classifier: Programming Language :: Python :: 3.12
28
- Classifier: Programming Language :: Python :: 3.13
29
- Classifier: Topic :: Security
30
- Classifier: Topic :: System :: Networking
31
- Requires-Python: >=3.8
32
- Description-Content-Type: text/markdown
33
- License-File: LICENSE
34
- Requires-Dist: anthropic>=0.40.0
35
- Requires-Dist: click>=8.0.0
36
- Requires-Dist: cryptography>=3.4.0
37
- Requires-Dist: defusedxml>=0.7.0
38
- Requires-Dist: impacket>=0.11.0
39
- Requires-Dist: markdown>=3.4.0
40
- Requires-Dist: msgpack>=1.0.0
41
- Requires-Dist: ollama>=0.1.0
42
- Requires-Dist: psycopg2-binary>=2.9.0
43
- Requires-Dist: psutil>=5.9.0
44
- Requires-Dist: python-json-logger>=2.0.0
45
- Requires-Dist: requests>=2.28.0
46
- Requires-Dist: rich>=10.0.0
47
- Requires-Dist: wcwidth>=0.2.0
48
- Provides-Extra: dev
49
- Requires-Dist: pytest>=7.0.0; extra == "dev"
50
- Dynamic: license-file
51
-
52
- # SoulEyez — AI-Powered Penetration Testing Platform
53
-
54
- [![CI](https://github.com/cyber-soul-security/souleyez/actions/workflows/python-ci.yml/badge.svg)](https://github.com/cyber-soul-security/souleyez/actions/workflows/python-ci.yml)
55
- [![codecov](https://codecov.io/gh/cyber-soul-security/souleyez/branch/main/graph/badge.svg)](https://codecov.io/gh/cyber-soul-security/souleyez)
56
- [![Python 3.9+](https://img.shields.io/badge/python-3.9+-blue.svg)](https://www.python.org/downloads/)
57
- [![Code style: black](https://img.shields.io/badge/code%20style-black-000000.svg)](https://github.com/psf/black)
58
- [![Security: bandit](https://img.shields.io/badge/security-bandit-yellow.svg)](https://github.com/PyCQA/bandit)
59
-
60
- **LEGAL NOTICE — Use Responsibly**
61
- Only use SoulEyez on systems you own or have explicit written permission to test.
62
- Unauthorized scanning or exploitation is illegal. The authors are not responsible for misuse.
63
-
64
- ---
65
-
66
- ## Features
67
-
68
- ### Core Capabilities
69
- - 🎯 **Interactive Dashboard** - Real-time engagement monitoring with live updates
70
- - 🔗 **Smart Tool Chaining** - Automatic follow-up scans based on discoveries
71
- - 📊 **Findings Management** - Track and categorize vulnerabilities by severity
72
- - 🔑 **Credential Vault** - Encrypted storage for discovered credentials
73
- - 🌐 **Network Mapping** - Host discovery and service enumeration
74
- - 📈 **Progress Tracking** - Monitor scan completion and tool execution
75
- - 💾 **SQLite Storage** - Local database for all engagement data
76
- - 🔄 **Background Jobs** - Queue-based tool execution with status monitoring
77
-
78
- ### Integrated Tools (40+)
79
- - **Reconnaissance**: nmap, masscan, theHarvester, whois, dnsrecon
80
- - **Web Testing**: nikto, gobuster, ffuf, sqlmap, nuclei, wpscan
81
- - **Enumeration**: enum4linux-ng, smbmap, crackmapexec, snmpwalk
82
- - **Exploitation**: Metasploit integration, searchsploit
83
- - **Password Attacks**: hydra, hashcat, john
84
- - **Post-Exploitation**: impacket suite, bloodhound
85
-
86
- ### Pentest Workflow & Intelligence
87
- - 📁 **Evidence Vault** - Unified artifact collection organized by PTES phases
88
- - 🎯 **Attack Surface Dashboard** - Track what's exploited vs pending with priority scoring
89
- - 💣 **Exploit Suggestions** - Automatic CVE/Metasploit recommendations for discovered services
90
- - 🔗 **Correlation Engine** - Cross-phase attack tracking and gap analysis
91
- - 📝 **Report Generator** - Professional reports in Markdown/HTML/PDF formats
92
- - ✅ **Deliverable Tracking** - Manage testing requirements and acceptance criteria
93
- - 📸 **Screenshot Management** - Organized visual evidence by methodology phase
94
-
95
- ### Purple Team / SIEM Integration
96
- - 🛡️ **Wazuh Integration** - Connect to Wazuh Manager for detection validation
97
- - 📊 **Splunk Integration** - Query Splunk for alerts and vulnerability data
98
- - ✓ **Detection Validation** - Verify if your attacks triggered SIEM alerts
99
- - 🔍 **Vulnerability Management** - View CVEs from Wazuh agents synced to Splunk
100
- - ⚖️ **Gap Analysis** - Compare passive (SIEM) vs active (scan) findings
101
- - 🗺️ **MITRE ATT&CK Reports** - Detection coverage heatmaps by technique
102
- - 📡 **Real-time Alerts** - Monitor SIEM alerts during live engagements
103
-
104
- ---
105
-
106
- ## 🔐 Security & Data Protection
107
-
108
- ### Credential Encryption
109
-
110
- SoulEyez encrypts all stored credentials using Fernet (AES-128-CBC + HMAC-SHA256) with PBKDF2 key derivation (600k iterations).
111
-
112
- ```bash
113
- # Enable encryption with master password
114
- souleyez db encrypt
115
-
116
- # Add credentials (automatically encrypted)
117
- souleyez creds add --username admin --password secret123 --service ssh --host 10.0.0.82
118
-
119
- # View credentials (requires master password)
120
- souleyez creds list
121
- ```
122
-
123
- **Key Points:**
124
- - Master password is never stored (cannot be recovered if lost)
125
- - Credentials encrypted at rest with industry-standard cryptography
126
- - Dashboard shows masked values (••••••••) until explicitly revealed
127
- - Each user should maintain their own database
128
-
129
- ### Data Masking
130
-
131
- Sensitive data is automatically masked in the UI:
132
- - Passwords: `Su***********3!`
133
- - Credit card numbers: `45**************34`
134
- - Access warning prompts before viewing sensitive data
135
-
136
- See [SECURITY.md](SECURITY.md) for complete security guidelines.
137
-
138
- ---
139
-
140
- ## 📝 Configuration
141
-
142
- SoulEyez uses a flexible configuration system:
143
-
144
- 1. **Environment Variables** - `SOULEYEZ_*` prefix (highest priority)
145
- 2. **Config File** - `~/.souleyez/config.json` (auto-created)
146
- 3. **Default Values** - Built-in safe defaults
147
-
148
- ```bash
149
- # Edit config file
150
- nano ~/.souleyez/config.json
151
-
152
- # Or use environment variables
153
- export SOULEYEZ_DATABASE_PATH=/custom/path/souleyez.db
154
- export SOULEYEZ_LOGGING_LEVEL=DEBUG
155
- ```
156
-
157
- See [docs/CONFIG.md](souleyez/docs/CONFIG.md) for complete configuration options.
158
-
159
- ---
160
-
161
- ## Supported Operating Systems
162
-
163
- | OS | Status | Notes |
164
- |----|--------|-------|
165
- | **Kali Linux** | ✅ Recommended | All pentesting tools pre-installed |
166
- | **Ubuntu 22.04+** | ✅ Supported | Tools installed via `souleyez setup` |
167
- | **Parrot OS** | ✅ Supported | Security-focused distro |
168
- | **Debian 12+** | ✅ Supported | Stable base system |
169
- | **Other Linux** | ⚠️ Unofficial | Manual testing required |
170
- | **macOS/Windows** | ❌ Not Supported | Use Linux in a VM |
171
-
172
- **Architectures:** AMD64, ARM64
173
-
174
- ---
175
-
176
- ## System Requirements
177
-
178
- | Component | Minimum | Recommended |
179
- |-----------|---------|-------------|
180
- | **CPU** | 2 cores | 4+ cores |
181
- | **RAM** | 4GB | 8GB+ |
182
- | **Disk** | 10GB | 50GB+ |
183
- | **GPU** | None | Optional (for hashcat) |
184
-
185
- ---
186
-
187
- ## Installation
188
-
189
- ```bash
190
- # Install pipx if needed
191
- sudo apt install pipx
192
- pipx ensurepath
193
- source ~/.bashrc # Kali Linux: use 'source ~/.zshrc' instead
194
-
195
- # Install SoulEyez
196
- pipx install souleyez
197
-
198
- # Install pentesting tools
199
- souleyez setup
200
- ```
201
-
202
- > **Kali Linux users:** Kali uses zsh by default. Use `source ~/.zshrc` instead of `source ~/.bashrc`
203
-
204
- See [docs/user-guide/installation.md](souleyez/docs/user-guide/installation.md) for detailed instructions.
205
-
206
- ---
207
-
208
- ## Usage
209
-
210
- ### Interactive Mode (Recommended)
211
-
212
- ```bash
213
- souleyez interactive
214
- ```
215
-
216
- Menu-driven interface with guided workflows, tool selection by phase, and integrated help.
217
-
218
- ### Dashboard
219
-
220
- ```bash
221
- souleyez dashboard
222
- ```
223
-
224
- Real-time monitoring with hotkeys: `[h]` Help, `[a]` Auto-chain, `[m]` Menu, `[q]` Quit
225
-
226
- ### Command Line
227
-
228
- ```bash
229
- # Engagement management
230
- souleyez workspace create <name>
231
- souleyez workspace use <name>
232
-
233
- # Run scans
234
- souleyez run nmap <target>
235
- souleyez run gobuster <target>
236
-
237
- # View results
238
- souleyez findings list
239
- souleyez creds list
240
- ```
241
-
242
- ---
243
-
244
- ## Documentation
245
-
246
- - **[Installation Guide](souleyez/docs/user-guide/installation.md)** - Setup instructions
247
- - **[Getting Started](souleyez/docs/user-guide/getting-started.md)** - Quick start guide
248
- - **[Workflows](souleyez/docs/user-guide/workflows.md)** - Complete pentesting workflows
249
- - **[Evidence Vault](souleyez/docs/user-guide/evidence-vault.md)** - Artifact collection
250
- - **[Report Generation](souleyez/docs/user-guide/report-generation.md)** - Professional reports
251
- - **[SECURITY.md](SECURITY.md)** - Security best practices
252
- - **[AUTO_CHAINING_GUIDE.md](AUTO_CHAINING_GUIDE.md)** - Automated workflows
253
-
254
- ---
255
-
256
- ## Support
257
-
258
- - **GitHub Issues**: https://github.com/cyber-soul-security/SoulEyez/issues
259
- - **Security Issues**: Report privately (see SECURITY.md)
260
-
261
- ---
262
-
263
- ## License
264
-
265
- See [LICENSE](LICENSE) for details.