Skip to content

jjang-ai/exploitbot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

112 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

exploitbot

exploitbot

Autonomous pentesting on Apple Silicon

version platform license engine

Download DMG

WebsiteFeaturesInstallModelsTools


AI-powered penetration testing toolkit with local LLM inference. No cloud. No guardrails. Open source.

exploitbot runs uncensored models locally on your Mac via MLX, integrated with 30+ real pentesting tools, and generates professional pentest reports from findings.

exploitbot workspace

Features

Local AI Inference — Uncensored models running on Apple Silicon via the vMLX engine. No API keys, no cloud, no content filtering. Your pentest stays on your machine.

Ops System — Named persistent workspaces for each engagement. Switch between targets without losing context. The LLM remembers everything across tool tabs.

3 Interaction Modes

  • Autopilot — Give a target, watch it work. Full autonomous recon → exploitation → reporting.
  • Copilot — AI suggests tools, you approve. Each action explained with risk level.
  • Manual — You drive, AI advises. Full tool controls with chat-based guidance.

30+ Integrated Tools — subfinder, nmap, nuclei, sqlmap, hashcat, metasploit, impacket, and more. Each tool has a bespoke UI — not a generic wrapper.

Stash — Cross-op artifact sharing. Drop credentials, hosts, payloads from any engagement, pull them into any other.

Findings → Reports — The endgame. Confirmed vulnerabilities auto-capture attack chains, evidence, and impact. Generate professional pentest reports in PDF, Markdown, HTML, or JSON.

CVE Knowledge Base — Local database of 250K+ CVEs with semantic search. Auto-enriches findings with CVE data, CVSS scores, and exploit availability.

5 Languages — Full interface and report generation in English, 한국어, 中文, Español, 日本語.

Screenshots

Web vulnerabilities Exploitation
Web vulnerability scanner with CVSS cards Metasploit module browser + payload config
Credential cracking OSINT
GPU-accelerated hash cracking via Metal Username OSINT across 400+ platforms

Install

Download

Download the signed DMG from Releases.

Requires macOS 14+ and Apple Silicon (M1/M2/M3/M4).

Build from Source

git clone https://github.com/jjang-ai/exploitbot.git
cd exploitbot/ExploitBot

# Build
swift build

# Create .app bundle and launch
cp .build/debug/ExploitBot ../ExploitBotXcode/ExploitBot.app/Contents/MacOS/ExploitBot
open ../ExploitBotXcode/ExploitBot.app

Prerequisites:

  • macOS 14+ on Apple Silicon
  • Xcode 16+ (Swift toolchain)
  • A vMLX-compatible model running on localhost:8000 (see vMLX)
  • Pentesting tools installed via homebrew/pip for tool execution

Models

exploitbot includes a model downloader with curated uncensored models from dealignai:

Tier Model Size RAM
S Qwen3.5-VL-122B-A10B-UNCENSORED-JANG_2S ~30 GB 32+ GB
M MiniMax-M2.5-UNCENSORED-JANG_2L ~60 GB 64+ GB
L Qwen3.5-VL-397B-A17B-UNCENSORED-JANG_1L ~112 GB 128+ GB

You can also load any JANG or MLX-compatible model folder from your local disk.

Tools

39 integrated pentesting tools across 8 categories:

Category Tools
Recon subfinder, dnsx, nmap, masscan, httpx, katana, theHarvester
Web nuclei, sqlmap, dalfox, feroxbuster, ffuf, arjun, wpscan, testssl, graphqlmap, jwt_tool
Network netexec, snmpwalk, tshark, bettercap, chisel
Credentials hashcat, hydra, haiti, trufflehog, seclists
Exploit metasploit, pwncat, pwntools, sliver
Post-Exploit linpeas, winpeas, impacket
OSINT sherlock, holehe, exiftool, gowitness
General search_cve (local CVE DB), run_shell

Lightweight tools are bundled in the app. Heavy tools (metasploit, hashcat, etc.) are installed on first use via homebrew/pip.

Architecture

  • UI: SwiftUI (native macOS 14+)
  • Inference: vMLX engine (MLX on Apple Silicon) — localhost server, OpenAI-compatible API
  • IPC: HTTP + SSE streaming to local vMLX server
  • Persistence: SQLite (GRDB.swift) with WAL mode
  • Terminal: SwiftTerm (embedded pty)
  • Reports: HTML → PDF via WKWebView
  • CVE DB: SQLite + sqlite-vec (semantic search with nomic-embed-text)

Documentation

License

Open source. License TBD.

Disclaimer

exploitbot is designed for authorized security testing, penetration testing engagements, CTF competitions, and security research. Always obtain proper authorization before testing any system you do not own. The developers are not responsible for misuse.


exploit.bot · Powered by vMLX engine · Built for Apple Silicon