Skip to content

Releases: CyberSecurityUP/NeuroSploit

NeuroSploitv2 - v1.2.0

14 Jan 19:23
5e73003

Choose a tag to compare

📘 Summary of Changes

The README has been updated with the following improvements and additions compared to the previous version (v2.2):

🆕 New or Expanded Sections

  • Adaptive AI Mode described with more detail in workflow and features.
  • 3 Execution Modes (CLI, Interactive, Experience/Wizard) clearly outlined with examples.
  • Consolidated Recon & Context-Based Analysis sections expanded, explaining how reconnaissance outputs are merged and reused without redundant tool runs.
  • LLM Providers & Profiles documentation expanded — listing support for multiple providers and how profiles are configured.
  • Agent Roles section expanded with examples of built-in roles and custom agent creation steps.

🛠 Improvements in Documentation

  • Installation instructions added clarity, including prerequisites, environment setup, and example commands.
  • Quick Start examples now include recommended workflows (Wizard, Two-Step Workflow, Interactive).
  • Detailed CLI Reference section was refined, showing flags, options, and usage patterns.
  • Reconnaissance & Tool Usage details improved with descriptions of included tools and execution.
  • Output Files & Reporting explained with output types (JSON, context, HTML), including report features like charts and summaries.

📜 Structural & Content Enhancements

  • Expanded Workflow Diagrams and Examples to guide users through typical recon → AI analysis → reporting flows.
  • Added Security Notice and responsible usage guidance in README to emphasize authorized testing only.
  • More comprehensive Architecture Overview listing directory structure and key components.

✨ Key Improvements

Improved adaptive intelligence descriptions to clarify how NeuroSploit decides when to run tools vs. AI analysis.

Documentation now includes more agent examples and explains how to customize capabilities via prompts.

Overall documentation flow has been made more user-friendly for both beginners and advanced users.

🐛 Bug & Docs Fixes

Fixed typos and improved consistency in command examples across sections.

Resolved ambiguities in installation steps and environment variable guidance.

NeuroSploitv2 - v1.1.0

12 Jan 12:05
866bb45

Choose a tag to compare

🚀 NeuroSploitv2 - v1.1.0

This release introduces NeuroSploitv2, an AI-powered penetration testing framework designed to automate and enhance offensive security operations using specialized agent roles and flexible large language model integration. The project focuses on combining structured automation, AI-assisted reasoning, and real-world security tooling while maintaining strong ethical guardrails and operational safety principles

✨ Key Features

Modular AI agent roles for Red Team, Blue Team, Bug Bounty, Malware Analysis, and more
Support for multiple LLM providers (Gemini, Claude, GPT, Ollama, LM Studio) with per-agent profiles
Markdown-based prompt system enabling contextual and role-specific AI behavior
Hallucination mitigation strategies, guardrails, and safety checks
Tool chaining for complex reconnaissance and attack workflows

🧠 AI & Automation Capabilities

Granular LLM profiles with control over model, temperature, token limits, caching, and context
Agent-based permission system defining allowed tools per role
Interactive CLI mode and direct command-line execution
AI-assisted planning, analysis, and reporting

🛠️ Built-in Tooling

Reconnaissance modules (OSINT collection, subdomain discovery, DNS enumeration)
Lateral movement helpers (SMB and SSH)
Persistence modules for Linux (cron) and Windows (registry)
Secure execution of external tools such as Nmap, Metasploit, Subfinder, Nuclei, SQLMap, and others

📊 Output & Reporting

Structured JSON campaign results
Automatically generated, human-readable HTML reports
Detailed logging and error handling

NeuroSploitv2

03 Jan 03:39
411627a

Choose a tag to compare

🚀 NeuroSploitv2 - v1.0.0

This release introduces NeuroSploitv2, an AI-powered penetration testing framework designed to automate and enhance offensive security operations using specialized agent roles and flexible large language model integration. The project focuses on combining structured automation, AI-assisted reasoning, and real-world security tooling while maintaining strong ethical guardrails and operational safety principles

✨ Key Features

  • Modular AI agent roles for Red Team, Blue Team, Bug Bounty, Malware Analysis, and more
  • Support for multiple LLM providers (Gemini, Claude, GPT, Ollama, LM Studio) with per-agent profiles
  • Markdown-based prompt system enabling contextual and role-specific AI behavior
  • Hallucination mitigation strategies, guardrails, and safety checks
  • Tool chaining for complex reconnaissance and attack workflows

🧠 AI & Automation Capabilities

  • Granular LLM profiles with control over model, temperature, token limits, caching, and context
  • Agent-based permission system defining allowed tools per role
  • Interactive CLI mode and direct command-line execution
  • AI-assisted planning, analysis, and reporting

🛠️ Built-in Tooling

  • Reconnaissance modules (OSINT collection, subdomain discovery, DNS enumeration)
  • Lateral movement helpers (SMB and SSH)
  • Persistence modules for Linux (cron) and Windows (registry)
  • Secure execution of external tools such as Nmap, Metasploit, Subfinder, Nuclei, SQLMap, and others

📊 Output & Reporting

  • Structured JSON campaign results
  • Automatically generated, human-readable HTML reports
  • Detailed logging and error handling