NO API KEYS REQUIRED - NULLSEC AI v3.0 works 100% offline with no accounts, no subscriptions, and no API keys needed!
- Works without any internet connection
- No API keys or user accounts required
- Privacy-focused - all data stays local
- Rule-based expert system as fallback
All models are open source and run locally:
| Model | Size | Specialty | Best For |
|---|---|---|---|
| DeepSeek Coder | 6.7B | Code generation | Exploit development, shellcode |
| CodeLlama | 13B | Meta's code model | General coding, payloads |
| WizardCoder | 15B | Enhanced coding | Complex exploit chains |
| Mistral | 7B | Fast general | Quick analysis, recon |
| Mixtral | 8x7B | Expert mixture | Advanced scenarios |
| OpenHermes | 7B | Instruction tuned | Detailed explanations |
| Solar | 10.7B | Advanced reasoning | Attack planning |
| Phi-2 | 2.7B | Efficient | Low resource systems |
| Orca2 | 13B | Reasoning | Complex problem solving |
| Neural Chat | 7B | Conversational | Interactive pentesting |
When no AI is available, the system uses:
- 100+ pre-programmed pentesting rules
- Methodology-based command generation
- Tool recommendation engine
- Best practice guidance
- Ollama (Recommended) - Full featured local AI
- LM Studio - GUI-based local AI
- GPT4All - Easy to use desktop app
- LocalAI - OpenAI-compatible local server
# Install Ollama
curl -fsSL https://ollama.com/install.sh | sh
# Pull your first model (choose one or all)
ollama pull deepseek-coder:6.7b # Best for exploits
ollama pull codellama:13b # General purpose
ollama pull mistral:7b # Fast and efficient
# Launch NULLSEC AI
cd /home/antics/nullsec
python3 nullsec-ai.py# Just run it - works immediately with expert system
cd /home/antics/nullsec
python3 nullsec-ai.py
# The system will use rule-based expert mode
# Still provides pentesting commands and advice- Download LM Studio from https://lmstudio.ai
- Download a model through the GUI
- Start the local server (default port 1234)
- Run NULLSEC AI - auto-detects LM Studio
$ python3 nullsec-ai.py
# Set your target
set target 192.168.1.100
# Choose attack category
set category web
# Ask questions
How do I test for SQL injection?
What ports should I scan first?
Generate a reverse shell payload for Linux
# Execute commands directly
execute nmap -sV 192.168.1.100
# View available models
models
# Install new model
install wizardcoder:15b- network - Port scanning, pivoting, MITM attacks
- web - SQLi, XSS, directory fuzzing, API testing
- wireless - WiFi cracking, Bluetooth, RFID, SDR
- credentials - Password cracking, hash attacks, Kerberos
- malware - Payload generation, C2, persistence, evasion
- recon - OSINT, subdomain enum, technology detection
- cloud - AWS/Azure/GCP exploitation, container security
- mobile - Android/iOS testing, APK analysis
- general - All-purpose pentesting guidance
nullsec-ai(general) > set target testsite.com
[+] Target set to: testsite.com
nullsec-ai(general) > set category web
[+] Category set to: web
nullsec-ai(web)[testsite.com] > enumerate this web application
[AI Response]
WEB APPLICATION ENUMERATION:
1. Technology Detection:
whatweb http://testsite.com
wappalyzer testsite.com
2. Directory/File Discovery:
gobuster dir -u http://testsite.com -w /usr/share/wordlists/dirb/common.txt
ffuf -u http://testsite.com/FUZZ -w wordlist.txt
3. Subdomain Enumeration:
subfinder -d testsite.com
amass enum -d testsite.com
4. Parameter Discovery:
arjun -u http://testsite.com
5. Vulnerability Scanning:
nikto -h http://testsite.com
nuclei -u http://testsite.com
nullsec-ai(web)[testsite.com] > execute gobuster dir -u http://testsite.com -w /usr/share/wordlists/dirb/common.txt
[>] gobuster dir -u http://testsite.com -w /usr/share/wordlists/dirb/common.txt
[gobuster output...]
# List installed models
nullsec-ai> models
# Install specific model
nullsec-ai> install deepseek-coder:6.7b
# Change preferred model (edit ~/.nullsec-ai-v3.json)
{
"preferred_provider": "ollama",
"preferred_model": "deepseek-coder:6.7b"
}# Execute commands and log to knowledge base
nullsec-ai> execute nmap -sV 192.168.1.0/24
# View command history
nullsec-ai> historyThe AI learns from your attacks and stores:
- Commands executed
- Vulnerabilities found
- Attack patterns
- Successful exploits
Database location: /home/antics/nullsec/.nullsec-ai-v3.db
Edit /home/antics/nullsec/.nullsec-ai-v3.json:
{
"preferred_provider": "ollama",
"preferred_model": "deepseek-coder:6.7b",
"temperature": 0.7,
"max_tokens": 2000,
"learning_enabled": true,
"auto_execute": false
}Options:
preferred_provider: ollama, lmstudio, gpt4all, localaipreferred_model: Model name to usetemperature: 0.0-1.0 (creativity level)max_tokens: Response length limitlearning_enabled: Store attack patternsauto_execute: Auto-run AI-suggested commands (dangerous!)
- Phi-2 (2.7B) - Very fast, good for low-spec systems
- Mistral (7B) - Excellent speed/quality balance
- OpenHermes (7B) - Great for conversations
- Neural Chat (7B) - Good interaction quality
Use when: Quick responses needed, limited resources
- CodeLlama (13B) - Meta's code specialist
- Orca2 (13B) - Strong reasoning abilities
Use when: Balance of speed and capability
- WizardCoder (15B) - Enhanced code generation
- Mixtral (8x7B = ~47B) - Expert mixture, very capable
- Solar (10.7B) - Advanced reasoning
Use when: Complex exploit chains, detailed analysis
- DeepSeek Coder (6.7B) - RECOMMENDED for pentesting
- Trained specifically on code and security
- Excellent at exploit generation
- Great balance of size and capability
- Use smaller models (Phi-2, Mistral 7B)
- Reduce max_tokens in config
- Use GPU acceleration if available
- Use larger models (Mixtral, WizardCoder)
- Increase temperature for creativity
- Provide detailed context
# Check Ollama status
ollama list
# Monitor resource usage
htop
# Clear GPU cache (if applicable)
ollama stop <model>100% Private:
- All processing happens locally
- No data sent to external servers
- No telemetry or tracking
- No API keys or accounts
Security Note: The AI runs on your machine and can suggest potentially dangerous commands. Always:
- Review commands before executing
- Use in isolated test environments
- Understand what commands do
- Keep auto_execute disabled
# Install Ollama
curl -fsSL https://ollama.com/install.sh | sh
# Pull a model
ollama pull deepseek-coder:6.7b
# Restart NULLSEC AI
python3 nullsec-ai.py# List available models
ollama list
# Pull the specific model
ollama pull <model-name># Use a smaller model
ollama pull mistral:7b
# Then in config, set:
"preferred_model": "mistral:7b"# Use Phi-2 (smallest)
ollama pull phi:2.7b
# Or increase swap space
sudo fallocate -l 8G /swapfile
sudo chmod 600 /swapfile
sudo mkswap /swapfile
sudo swapon /swapfile"How do I discover all subdomains for example.com?"
"What's the best way to enumerate SMB shares?"
"Generate a comprehensive recon plan for 192.168.1.0/24"
"Create a reverse shell payload for Windows"
"How to test for SQL injection in POST parameters?"
"Generate a XXE attack payload"
"What's the best approach to exploit EternalBlue?"
"How to escalate privileges on Linux?"
"Commands to dump credentials from Windows"
"How to establish persistence on a compromised system?"
"How to bypass Windows Defender when running Mimikatz?"
"Obfuscate this PowerShell payload"
"Techniques to avoid IDS detection during port scanning"
The AI provides guidance on:
- OWASP Top 10 exploitation
- Network pentesting methodologies
- Privilege escalation techniques
- Wireless security attacks
- Cloud penetration testing
- Mobile app security
- Red team operations
# Fast start with specific target
echo -e "set target 192.168.1.100\nscan this target\nexit" | python3 nullsec-ai.py
# Get web enumeration commands
echo -e "set category web\nenumerate web app\nexit" | python3 nullsec-ai.py
# Check installed models
ollama list
# Update Ollama
curl -fsSL https://ollama.com/install.sh | shThe AI integrates seamlessly with NULLSEC:
# From NULLSEC launcher
python3 nullsec-launcher.py
[I] AI Console # Launches AI assistant
# Direct from command line
python3 nullsec-ai.py
# In scripts
python3 nullsec-ai.py < queries.txtPlanned features:
- Fine-tuned models specifically for pentesting
- Automated exploit chain generation
- Integration with Metasploit
- Real-time vulnerability database queries
- Collaborative multi-agent attacks
- Visual attack graph generation
NULLSEC AI v3.0 brings professional AI-powered pentesting to everyone:
β
No API keys or accounts - 100% free and private
β
Works offline - No internet required
β
10+ AI models - Choose based on your needs
β
Expert fallback - Works even without AI
β
Learns from you - Builds knowledge base
β
Easy to use - Simple command interface
Get started in 2 minutes - no signup, no payment, no tracking!
Author: bad-antics development
Repository: github.com/bad-antics/nullsec
Version: 3.0
License: For authorized security testing only