- Rich Parameter Collection - 8 parameter types with validation (IP, Port, File, Choice, Boolean, String, Domain, URL)
- Beautiful UI - Color-coded prompts, progress indicators, formatted displays
- Smart Validation - Real-time input checking with helpful error messages
- Default Values - Suggested defaults for faster workflow
- Numbered Menus - Select options by number for speed
- Automatic Logging - Every attack logged with timestamps to
~/nullsec/logs/ - Target Organization - Each target gets its own directory
- Subdirectories - Organized folders for scans/, exploits/, credentials/, screenshots/
- Detailed Logs - Full execution history with parameters and results
- File Preservation - All output files saved and cataloged
- Auto-Detection - Framework scans logs for vulnerability indicators
- Severity Levels - Critical/High/Medium/Low color-coded tracking
- Manual Logging -
log_vulnerability()function for explicit recording - Comprehensive Reports - All vulns listed in SUMMARY.md with details
- Next Steps - AI-generated recommendations after each attack
- Context-Aware - Suggestions based on attack type and findings
- Exploitation Paths - Identifies follow-up attack opportunities
- Professional Reporting - Markdown summaries ready for clients
- CLI Launcher - nullsec-launcher.py enhanced
- Desktop GUI - nullsec_desktop.py enhanced
- Windows Version - Ready for similar enhancement
- All Modules - Framework auto-detects .json configs
- Templates - module-template.sh and module-template.json for quick starts
- Helper Functions - log_to_file(), save_output(), log_vulnerability()
- Documentation - Two comprehensive guides (ENHANCED_FRAMEWORK_GUIDE.md, MODULE_DEVELOPMENT_GUIDE.md)
- Examples - Complete AD attack module as reference
module-framework.py- Main interactive framework (300+ lines)nullsec-launcher.py- Updated to use enhanced frameworknullsec-desktop/nullsec_desktop.py- Updated GUI integration
nullsecurity/ad-attack-enhanced.sh- Enhanced AD attack modulenullsecurity/ad-attack.json- Configuration for AD module
nullsecurity/module-template.sh- Bash script templatenullsecurity/module-template.json- JSON config templateENHANCED_FRAMEWORK_GUIDE.md- User guide (3.6KB)MODULE_DEVELOPMENT_GUIDE.md- Developer guide (11KB)MODULE_ENHANCEMENTS_SUMMARY.md- This file
cd ~/nullsec
python3 module-framework.py \
nullsecurity/ad-attack-enhanced.sh \
nullsecurity/ad-attack.jsonYou'll get:
- Module description and examples
- Prerequisite checking
- Interactive parameter collection:
- Attack vector selection (8 choices)
- Domain controller IP
- Domain name
- Optional credentials
- Stealth mode toggle
- Output format choice
- Timeout setting
- Parameter summary and confirmation
- Beautiful execution display
- Comprehensive result summary
- Vulnerability list with severities
- Next steps suggestions
- All files saved to
~/nullsec/logs/targets/[target]/
./nullsec-launcher.py
# Navigate to any module with .json config
# Automatically uses enhanced mode!cd nullsecurity/
cp module-template.sh my-scan.sh
cp module-template.json my-scan.json
# Edit both files
chmod +x my-scan.sh
# Test it:
cd ..
python3 module-framework.py nullsecurity/my-scan.sh nullsecurity/my-scan.json~/nullsec/logs/targets/
βββ 192.168.1.100/
β βββ SUMMARY.md # Main report
β βββ ad-attack_20260114_153045.log # Timestamped logs
β βββ nmap-scan_20260114_154230.log
β βββ scans/nmap_full.xml # Scan results
β βββ exploits/exploit_attempts.txt # Exploitation data
β βββ credentials/hashes.txt # Captured creds
β βββ screenshots/evidence.png # Visual proof
βββ dc01.corp.local/
βββ SUMMARY.md
βββ asrep_hashes.txt
βββ bloodhound_data.zip
βββ ldap_enumeration.txt
Target [192.168.1.1]:
ββ CONFIGURATION
ββ[1/8] Select Attack Vector
β βΉ Choose the Active Directory attack technique to execute
β Options: LDAP Enumeration, AS-REP Roasting, DCSync, etc.
β
β 1) LDAP Enumeration
β 2) AS-REP Roasting
β 3) DCSync Attack
β [...]
β βΈ Select [1-8]: 2
β β
ββ[2/8] Domain Controller IP/Hostname
β βΉ Target domain controller address (IP or hostname)
β Default: dc01.corp.local
β βΈ dc01.corp.local
β Using default: dc01.corp.local
β β
[...]
Framework scans logs for these patterns:
- Weak/default credentials
- SQL injection indicators
- XSS vulnerabilities
- RCE opportunities
- File inclusion bugs
- Open ports/services
- Outdated software versions
- Security misconfigurations
log_vulnerability "critical" "Auth Bypass" "Admin panel accessible without login"
log_vulnerability "high" "SQLi" "Parameter 'id' vulnerable to SQL injection"
log_vulnerability "medium" "Weak Password" "Admin account uses password: admin123"### Discovered Vulnerabilities
π΄ **Authentication Bypass** (CRITICAL)
- Admin panel accessible without login
π **SQL Injection** (HIGH)
- Parameter 'id' vulnerable to SQL injection
π‘ **Weak Password** (MEDIUM)
- Admin account uses weak password- β Use enhanced modules from launcher/desktop
- β
Review logs in
~/nullsec/logs/targets/ - β Check SUMMARY.md for attack reports
- β Follow suggested next steps from framework
- β Convert existing modules using templates
- β Add .json configs for all 185+ modules
- β Use helper functions for logging
- β Test with module-framework.py
- β Organize findings by target automatically
- β Track vulnerabilities with severity levels
- β Generate professional reports from SUMMARY.md
- β Build attack chains with next steps suggestions
- β‘ Faster - Smart defaults and numbered menus
- π― Easier - Clear prompts with help text
- π Safer - Validation prevents errors
- π Professional - Beautiful formatted output
- π Organized - All data in target folders
- π Traceable - Complete execution logs
- π― Actionable - Next steps automatically suggested
- π Reportable - Ready-made summaries
- π Quick - Templates for rapid module creation
- π Documented - Comprehensive guides
- π§ Flexible - 8 parameter types available
- β Tested - Working example (AD attack)
- ENHANCED_FRAMEWORK_GUIDE.md - User guide for the interactive system
- MODULE_DEVELOPMENT_GUIDE.md - Complete developer guide with examples
- module-template.sh - Copy this to start new modules
- module-template.json - Config template
- ad-attack-enhanced.sh - Reference implementation
| Feature | Old Framework | Enhanced Framework |
|---|---|---|
| Parameters | Simple read -p prompts |
Rich interactive with validation |
| Logging | Manual or none | Automatic with timestamps |
| Output | Terminal only | Saved to organized directories |
| Vulnerabilities | Manual tracking | Auto-detected + manual logging |
| Reports | None | Markdown summaries with next steps |
| Validation | None | IP, port, file, etc. validation |
| Help Text | None | Descriptions and examples |
| Target Organization | None | Dedicated folders per target |
| Next Steps | Manual analysis | AI-generated suggestions |
All enhancements are live and ready. Launch any module through:
./nullsec-launcher.py(CLI)- NullSec Desktop (GUI)
- Direct:
python3 module-framework.py <script> <config>
Every attack will now:
- β Collect parameters interactively
- β Log everything to target directory
- β Track vulnerabilities automatically
- β Save all output files
- β Generate summary report
- β Suggest next steps
The framework is now significantly more professional, user-friendly, and effective for penetration testing workflows!