ββββ ββββββ ββββββ βββ ββββββββββββββββ βββββββ
βββββ ββββββ ββββββ βββ ββββββββββββββββββββββββ
ββββββ ββββββ ββββββ βββ ββββββββββββββ βββ
βββββββββββββ ββββββ βββ ββββββββββββββ βββ
βββ βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
βββ βββββ βββββββ ββββββββββββββββββββββββββββββββ βββββββ
OFFENSIVE SECURITY FRAMEWORK
Advanced Penetration Testing & Red Team Operations Framework
A custom ParrotSec-based distribution for offensive security operations
NULLSEC is a comprehensive offensive security operations platform featuring:
- 150+ Custom Attack Modules across 12 categories
- Full Metasploit Framework Integration
- AI-Powered Security Assistant (NullSec AI v3)
- Interactive TUI Launcher with search and filtering
- Dual Operation Modes - TEST (safe demos) + LIVE (real attacks)
- Custom ISO Builder for deployment
```bash
./nullsec
python3 nullsec-launcher.py
python3 nullsec-ai.py
./build-iso.sh ```
| Category | Count | Description |
|---|---|---|
| Network | 25+ | Scanning, pivoting, tunneling, MITM |
| Web | 20+ | XSS, SQLi, SSRF, API attacks |
| Wireless | 15+ | WiFi, Bluetooth, RF, RFID |
| Malware | 15+ | Payloads, evasion, persistence |
| Cloud | 12+ | AWS, Azure, GCP, Kubernetes |
| ICS/SCADA | 10+ | PLC, Modbus, industrial systems |
| Mobile | 8+ | Android, iOS exploitation |
| Social | 8+ | Phishing, vishing, pretexting |
| Active Directory | 8+ | Kerberos, Golden Ticket, DCSync |
| Cryptography | 6+ | Breaking crypto, key extraction |
| IoT | 10+ | Cameras, smart devices, firmware |
| Evasion | 12+ | AV/EDR bypass, anti-forensics |
``` nullsec> use network/port-scanner nullsec (port-scanner)> set TARGET 192.168.1.0/24 nullsec (port-scanner)> run ```
- Category browsing with vim-style navigation
- Real-time search filtering
- Module favorites and history
- Detailed module info panels
- Natural language security queries
- Automatic tool recommendations
- Attack chain suggestions
- CVE lookups and analysis
- Direct MSF console access
- Payload generation wizard
- Multi-handler setup
- Session management
| Document | Description |
|---|---|
| FRAMEWORK.md | Core framework documentation |
| MODULE_DEVELOPMENT_GUIDE.md | Creating custom modules |
| NULLSEC_AI_V3_GUIDE.md | AI assistant usage |
| DEPLOYMENT_GUIDE.md | Installation & deployment |
| ISO_BUILD_INSTRUCTIONS.txt | Custom ISO creation |
- OS: ParrotSec Linux 5.x+ / Kali Linux 2023+
- RAM: 4GB minimum, 8GB recommended
- Disk: 40GB+ for full installation
- Network: Wireless card for WiFi attacks (optional)
``` nullsec/ βββ nullsec # Main framework launcher βββ nullsec-launcher.py # TUI interface βββ nullsec-ai.py # AI assistant βββ app.py # Web dashboard βββ nullsecurity/ # 150+ attack modules β βββ network/ β βββ web/ β βββ wireless/ β βββ ... βββ resources/ # Wordlists, payloads βββ utils/ # Helper scripts βββ static/ # Web assets ```
FOR AUTHORIZED SECURITY TESTING ONLY
This framework is designed for legal penetration testing and security research. Unauthorized access to computer systems is illegal. Only use on systems you own or have explicit written permission to test.
The developers assume no liability for misuse of this software.
- Fork the repository
- Create feature branch (`git checkout -b feature/new-module`)
- Commit changes (`git commit -am 'Add new module'`)
- Push to branch (`git push origin feature/new-module`)
- Open Pull Request
MIT License - See LICENSE for details.
bad-antics development
github.com/bad-antics
For authorized security testing only.