PARO-ULTRA: Autonomous AI Pentesting Framework for External Asset Discovery & Vulnerability Scanning. Integrates 10+ tools (Nuclei, Nmap, etc.) with stealth evasion, real-time dashboard, and 3000+ vuln detection.
PARO-ULTRA is an advanced, autonomous AI-driven pentesting framework built in Python/Flask. It automates external asset discovery, WAF-aware scanning, and vulnerability detection across 1000+ network and 3000+ web vulnerabilities. Designed for security professionals, it integrates open-source tools like Nuclei, Nmap, and more, with built-in stealth (random delays, User-Agent rotation) and a real-time dark-mode dashboard for monitoring.
- Automated Discovery: Passive subdomain enumeration using
subfinder,assetfinder, andamass. - Health Checks & WAF Analysis: Filters live assets with
httpxand detects/bypasses WAFs (e.g., Cloudflare, Akamai) usingwafw00f. - Deep Crawling: Extracts URLs via
waybackurlsandkatana. - Pattern Matching: Pure Python regex for categorizing URLs (SQLi, XSS, LFI, Redirect).
- Vulnerability Scanning: Targeted scans with
dalfox(XSS),nuclei(full templates),nikto,sstimap, andnmap(NSE scripts). - Stealth & Evasion: Random delays, User-Agent rotation, and automatic scan reduction for protected targets.
- Real-Time Dashboard: Flask-based UI with live logs, counters (subdomains/URLs/vulns), and findings table.
- Concurrency: Background threading with proper Flask app context handling.
- Error Handling: Robust subprocess management with timeouts and graceful tool skipping.
- Export: JSON report export for findings.
- Backend: Python 3.x + Flask (web server), SQLAlchemy (SQLite DB).
- Frontend: HTML5 + Bootstrap 5 (dark-mode dashboard), JavaScript (Fetch API for real-time updates).
- Tools Integration: Wrapper for 10+ external tools via subprocess calls.
- Database Models:
Target,Subdomain,Url,Vulnerabilityfor persistent storage. - Phased Workflow:
- Discovery (Subdomains).
- WAF Analysis (Stealth filtering).
- Crawling (URL extraction).
- Pattern Matching (Regex categorization).
- Scanning (Targeted vulns).
- Linux/macOS/Windows (with WSL for Windows).
- Python 3.8+.
- Go 1.19+ (for installing tools).
- Git.
-
Clone the Repository:
-
python3 -c "import flask, flask_sqlalchemy, requests; print('Python deps OK')"
-
Install External Tools:
-
go install github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest go install github.com/tomnomnom/assetfinder@latest go install github.com/OWASP/Amass/v3/cmd/amass@latest go install github.com/projectdiscovery/httpx/cmd/httpx@latest pip3 install wafw00f go install github.com/tomnomnom/waybackurls@latest go install github.com/projectdiscovery/katana/cmd/katana@latest go install github.com/hahwul/dalfox/v2@latest go install github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest nuclei -update-templates # Downloads 3000+ templates sudo apt install -y nikto pip3 install sstimap
Copy code
-
Verify:
which subfinder assetfinder amass httpx wafw00f waybackurls katana dalfox nuclei nikto sstimap -
Add
~/go/binto PATH:export PATH=$PATH:~/go/bin(add to ~/.bashrc). -
Verify:
which subfinder assetfinder amass httpx wafw00f waybackurls katana dalfox nuclei nikto sstimap
- Update Nuclei Path: In
audit_engine.py, replace/path/to/nuclei-templateswith~/.nuclei-templates.
-
Run the Application:
-
- Access the dashboard at
http://localhost:5000.
- Access the dashboard at
-
Start a Scan:
- Enter a target domain (e.g.,
example.com). - Click "Start Audit".
- Monitor real-time logs, counters, and findings.
- Export Report:
- Click "Export Report" to download a JSON file of vulnerabilities.
- Stop/Resume: Use "Stop Task" to halt background scans.
- Input:
company.com - Output: Discovers subdomains, filters WAF-protected ones, crawls URLs, matches patterns, scans for vulns, and displays results in the dashboard.
Contributions are welcome! Please:
- Fork the repo.
- Create a feature branch.
- Submit a pull request with tests.
This project is licensed under the MIT License - see the LICENSE file for details.
PARO-ULTRA is for educational and authorized security testing only. Use on unauthorized targets is illegal. The authors are not responsible for misuse. Always obtain written permission before scanning.
- Author: @mr._vishal_hacker
- vishalsharma852863@gmail.com