Nullsec
š NullSec ā Offensive Security Framework | 200+ tools, AI lab, mesh net, WiFi Pineapple, Flipper Zero, custom Linux distro
Install / Use
/learn @bad-antics/NullsecREADME
āāāā āāāāāā āāāāāā āāā āāāāāāāāāāāāāāāā āāāāāāā
āāāāā āāāāāā āāāāāā āāā āāāāāāāāāāāāāāāāāāāāāāāā
āāāāāā āāāāāā āāāāāā āāā āāāāāāāāāāāāāā āāā
āāāāāāāāāāāāā āāāāāā āāā āāāāāāāāāāāāāā āāā
āāā āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
āāā āāāāā āāāāāāā āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā āāāāāāā
OFFENSIVE SECURITY FRAMEWORK
NULLSEC Linux
Advanced Penetration Testing & Red Team Operations Framework
A custom ParrotSec-based distribution for offensive security operations
šÆ Overview
NULLSEC is a comprehensive offensive security operations platform featuring:
- 150+ Custom Attack Modules across 12 categories
- Full Metasploit Framework Integration
- AI-Powered Security Assistant (NullSec AI v3)
- Interactive TUI Launcher with search and filtering
- Dual Operation Modes - TEST (safe demos) + LIVE (real attacks)
- Custom ISO Builder for deployment
š Quick Start
```bash
Launch framework console
./nullsec
Launch TUI interface
python3 nullsec-launcher.py
Launch AI assistant
python3 nullsec-ai.py
Build custom ISO
./build-iso.sh ```
š¦ Module Categories
| Category | Count | Description | |----------|-------|-------------| | Network | 25+ | Scanning, pivoting, tunneling, MITM | | Web | 20+ | XSS, SQLi, SSRF, API attacks | | Wireless | 15+ | WiFi, Bluetooth, RF, RFID | | Malware | 15+ | Payloads, evasion, persistence | | Cloud | 12+ | AWS, Azure, GCP, Kubernetes | | ICS/SCADA | 10+ | PLC, Modbus, industrial systems | | Mobile | 8+ | Android, iOS exploitation | | Social | 8+ | Phishing, vishing, pretexting | | Active Directory | 8+ | Kerberos, Golden Ticket, DCSync | | Cryptography | 6+ | Breaking crypto, key extraction | | IoT | 10+ | Cameras, smart devices, firmware | | Evasion | 12+ | AV/EDR bypass, anti-forensics |
š§ Features
Framework Console
``` nullsec> use network/port-scanner nullsec (port-scanner)> set TARGET 192.168.1.0/24 nullsec (port-scanner)> run ```
TUI Launcher
- Category browsing with vim-style navigation
- Real-time search filtering
- Module favorites and history
- Detailed module info panels
AI Assistant
- Natural language security queries
- Automatic tool recommendations
- Attack chain suggestions
- CVE lookups and analysis
Metasploit Integration
- Direct MSF console access
- Payload generation wizard
- Multi-handler setup
- Session management
š Documentation
| Document | Description | |----------|-------------| | FRAMEWORK.md | Core framework documentation | | MODULE_DEVELOPMENT_GUIDE.md | Creating custom modules | | NULLSEC_AI_V3_GUIDE.md | AI assistant usage | | DEPLOYMENT_GUIDE.md | Installation & deployment | | ISO_BUILD_INSTRUCTIONS.txt | Custom ISO creation |
š„ļø System Requirements
- OS: ParrotSec Linux 5.x+ / Kali Linux 2023+
- RAM: 4GB minimum, 8GB recommended
- Disk: 40GB+ for full installation
- Network: Wireless card for WiFi attacks (optional)
š Project Structure
``` nullsec/ āāā nullsec # Main framework launcher āāā nullsec-launcher.py # TUI interface āāā nullsec-ai.py # AI assistant āāā app.py # Web dashboard āāā nullsecurity/ # 150+ attack modules ā āāā network/ ā āāā web/ ā āāā wireless/ ā āāā ... āāā resources/ # Wordlists, payloads āāā utils/ # Helper scripts āāā static/ # Web assets ```
ā ļø Legal Disclaimer
FOR AUTHORIZED SECURITY TESTING ONLY
This framework is designed for legal penetration testing and security research. Unauthorized access to computer systems is illegal. Only use on systems you own or have explicit written permission to test.
The developers assume no liability for misuse of this software.
š¤ Contributing
- Fork the repository
- Create feature branch (`git checkout -b feature/new-module`)
- Commit changes (`git commit -am 'Add new module'`)
- Push to branch (`git push origin feature/new-module`)
- Open Pull Request
š License
MIT License - See LICENSE for details.
<p align="center"> <strong>bad-antics development</strong><br> <a href="https://github.com/bad-antics">github.com/bad-antics</a> </p>
For authorized security testing only.
