Skip to content

AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.

License

Notifications You must be signed in to change notification settings

berylliumsec/nebula

Repository files navigation

Nebula – AI-Powered Penetration Testing Assistant

Nebula is an advanced, AI-powered penetration testing open-source tool that revolutionizes penetration testing by integrating state-of-the-art AI models into your command-line interface. Designed for cybersecurity professionals, ethical hackers, and developers, Nebula automates vulnerability assessments and enhances security workflows with real-time insights and automated note-taking.

Nebula AI-Powered Penetration Testing CLI Interface

Acknowledgement

First i would like to thank the All-Mighty God who is the source of all knowledge, without Him, this would not be possible.

News

Introducing the Deep Application Profiler (DAP). DAP uses neural networks to analyze an executable's internal structure and intent, rather than relying on traditional virus signatures. This approach enables it to detect new, zero-day malware that conventional methods often miss. DAP also provides detailed breakdowns for rapid analyst review and is available as both a web service and an API. Learn More Here

Introducing Nebula Pro, Nebula Pro improves on Nebula 2.0 by adding additional features such as autonomous mode, code analysis and more. Learn More Here

Nebula: AI-Powered Penetration Testing Platform

Nebula is a cutting-edge, AI-powered penetration testing tool designed for cybersecurity professionals and ethical hackers. It integrates advanced open-source AI models such as Meta's Llama-3.1-8B-Instruct, Mistralai's Mistral-7B-Instruct-v0.2, and DeepSeek-R1-Distill-Llama-8B—directly into the command line interface (CLI). By leveraging these state-of-the-art models, Nebula not only enhances vulnerability assessments and penetration testing workflows but also supports any tool that can be invoked from the CLI.

Installation

System Requirements:

  • At least 8GB of GPU memory (tested with 12GB)
  • Python 3.11 or higher

Installation Command:

python -m pip install nebula-ai --upgrade

Running Nebula

Important:

On your first run, you’ll be prompted to select a cache directory where Nebula will download your chosen AI model. Follow these steps:

  1. Create a free Hugging Face Account, agree to the terms, and generate an access token.

  2. Export your token to the CLI:

    export HF_TOKEN=YourTokenHere
  3. Launch Nebula and monitor the download progress on the CLI.

    nebula

This step only needs to be completed once. Monitor the command line interface where you invoked nebula from to monitor the download progress.

Interacting with the models.

To interact with the models, begin your input with a ! for example: ! write a python script to scan the ports of a remote system

Key Features

  • AI-Powered Internet Search:
    Enhance responses by integrating real-time, internet-sourced context to keep you updated on cybersecurity trends.

  • AI-Assisted Note-Taking:
    Automatically record and categorize security findings.

  • Real-Time AI-Driven Insights:
    Get immediate suggestions for discovering and exploiting vulnerabilities based on terminal tool outputs.

  • Enhanced Tool Integration:
    Seamlessly import data from external tools for AI-powered note-taking and advice.

  • Integrated Screenshot & Editing:
    Capture and annotate images directly within Nebula for streamlined documentation.

  • Manual Note-Taking & Automatic Command Logging:
    Maintain a detailed log of your actions and findings with both automated and manual note-taking features.

Getting Started

For a comprehensive video guide visit here and here. Please note that some features are only applicable to Nebula Pro.You can also access the help screen within Nebula or refer to the Manual.md document

Roadmap

  • Support more models
  • Add agents

Troubleshooting

Logs are located at /home/[your_username]/.local/share/nebula/logs. You would most likely find the reason for the error in one of those logs

Get More Support