KaliGPT is a production-ready, AI-powered penetration testing assistant designed specifically for Kali Linux. It reads and understands terminal output in real-time, automatically recommends the next step in the pentesting process, generates custom payloads, and can execute commands with user approval.
Available Interfaces:
- π₯οΈ Desktop GUI - Modern Tkinter-based interface
- π Web GUI - Flask-powered web interface
- π» CLI - Command-line interface for terminal users
- Real-time terminal output capture using PTY/pexpect
- Intelligent command analysis with context awareness
- Automatic next-step recommendations following pentesting methodology
- Multi-model LLM support (GPT-4, LLaMA, Mistral, Qwen, local models)
Built-in parsers for popular pentesting tools:
- Nmap - Network scanning and service detection
- Metasploit - Exploitation framework integration
- SQLmap - SQL injection detection and exploitation
- Nikto - Web vulnerability scanning
- Gobuster - Directory/file enumeration
- Hydra - Password cracking
- And more...
Automatic generation of:
- SQL Injection payloads (Union, Boolean, Time-based, Error-based)
- XSS payloads (Reflected, Stored, DOM-based)
- LFI/RFI exploits
- Command injection payloads
- Reverse shells (Bash, Python, PHP, PowerShell, etc.)
- Web shells (PHP, ASP, JSP)
- Privilege escalation scripts
Generate professional pentest reports in:
- Markdown - Easy to read and edit
- HTML - Styled, presentation-ready reports
- JSON - Machine-readable structured data
- PDF - (via HTML conversion)
Follows the complete methodology:
- Reconnaissance - Initial information gathering
- Enumeration - Service and vulnerability discovery
- Exploitation - Gaining access
- Post-Exploitation - Privilege escalation, lateral movement
- Reporting - Automated documentation
# Clone the repository
git clone https://github.com/yashab-cyber/KaliGpt.git
cd KaliGpt
# Run the interactive installer (recommended)
chmod +x scripts/installer.sh
./scripts/installer.shThe installer will:
- β Ask you to choose your preferred interface (GUI/Web/CLI)
- β Install all required dependencies
- β Set up Ollama and download AI models
- β Create a desktop icon and application menu entry
- β Configure command-line shortcuts
After installation:
- π₯οΈ Desktop Icon: Click the KaliGPT icon on your desktop or find it in Applications β Security
- π» Command Line: Run
kaligptfrom anywhere - π Launcher: Run
kaligpt-launcherto choose your interface
# Install dependencies
pip3 install -r requirements.txt
# For Desktop GUI
pip3 install pillow
# For Web GUI
pip3 install flask flask-socketio# Run the uninstaller
./scripts/uninstall.sh# Check model setup and dependencies
python3 scripts/verify_models.py
# This will show:
# - Installed dependencies
# - Configured API keys
# - Available local models
# - Ready-to-use AI modelsDesktop GUI (Default):
- Click the KaliGPT icon on your desktop
- Or run:
kaligpt
Web GUI:
python3 ui/web_gui.py
# Open browser to http://localhost:5000Command Line:
kaligpt
# Or directly: python3 ui/cli.pyModern desktop interface with full AI integration:
# Launch desktop GUI
python3 ui/gui.pyFeatures:
- π¨ Kali Linux-inspired dark theme
- π€ Real-time AI analysis
- π Interactive payload generator
- π Visual session history
- π Built-in report generation
- π Multi-tab interface
Requirements:
# Install GUI dependencies
pip install pillow # For logo supportBrowser-based interface accessible from anywhere:
# Launch web GUI
python3 ui/web_gui.py
# Access at: http://localhost:5000Features:
- π Modern web interface
- π± Responsive design
- π WebSocket support for real-time updates
- π» Multi-device access
- π― RESTful API
- π Interactive dashboards
Requirements:
# Install web GUI dependencies
pip install flask flask-socketioScreenshots:
# Launch interactive mode
kaligpt
# Set target
KaliGPT> target 192.168.1.100
# Run a command
KaliGPT> run nmap -sV 192.168.1.100
# AI will analyze the output and suggest next steps
# You can approve or reject recommendations
# Generate payloads
KaliGPT> payload sqli
# Get help
KaliGPT> help
# Generate report
KaliGPT> report# Execute a single command and analyze
kaligpt --command "nmap -sV 192.168.1.100"# Use GPT-5.1 (latest OpenAI model)
export OPENAI_API_KEY=your_key_here
kaligpt --model gpt-5.1
# Use GPT-5
kaligpt --model gpt-5
# Use Gemini 3 Pro (latest Google model)
export GOOGLE_API_KEY=your_key_here
kaligpt --model gemini-3
# Use Claude Sonnet 4.5 (latest Anthropic model)
export ANTHROPIC_API_KEY=your_key_here
kaligpt --model claude-sonnet-4.5
# Use Claude Opus 4 (most powerful)
kaligpt --model claude-opus-4
# Use local LLaMA (free, runs locally)
kaligpt --model llama
# List available models
kaligpt --list-models# 1. Set target
KaliGPT> target 192.168.1.100
# 2. Initial reconnaissance
KaliGPT> run nmap -sV -sC 192.168.1.100
# AI analyzes: Found web server on port 80
# AI recommends: Run Nikto scan
# 3. Web vulnerability scanning
KaliGPT> run nikto -h http://192.168.1.100
# AI analyzes: Found potential SQL injection
# AI recommends: Test with SQLmap
# 4. SQL injection testing
KaliGPT> run sqlmap -u "http://192.168.1.100/login.php?id=1" --dbs
# AI analyzes: SQL injection confirmed, databases found
# AI recommends: Dump database contents
# 5. Data extraction
KaliGPT> run sqlmap -u "http://192.168.1.100/login.php?id=1" -D webapp --dump
# 6. Generate report
KaliGPT> reportKaliGPT/
βββ core/ # Core functionality
β βββ terminal_capture.py # Real-time command capture
β βββ ai_engine.py # AI interaction engine
β βββ decision_engine.py # Tactical decision making
β βββ executor.py # Safe command execution
β
βββ parsers/ # Tool output parsers
β βββ nmap_parser.py
β βββ msf_parser.py
β βββ sqlmap_parser.py
β βββ nikto_parser.py
β βββ gobuster_parser.py
β βββ hydra_parser.py
β
βββ payloads/ # Payload generation
β βββ generator.py
β βββ templates/
β
βββ models/ # LLM integrations
β βββ gpt.py
β βββ local_llama.py
β βββ mistral.py
β βββ qwen.py
β βββ model_selector.py
β
βββ reporting/ # Report generation
β βββ report_builder.py
β βββ templates/
β
βββ ui/ # User interface
β βββ cli.py
β
βββ config/ # Configuration
β βββ settings.json
β βββ model_config.json
β
βββ scripts/ # Utility scripts
βββ installer.sh
Edit config/model_config.json:
{
"model_type": "llama",
"model": "llama2",
"temperature": 0.7,
"max_tokens": 2000
}Edit config/settings.json:
{
"general": {
"auto_execute": false,
"safe_mode": true
},
"ai": {
"default_model": "llama",
"temperature": 0.7
}
}- GPT-5.1 - OpenAI's latest flagship model (requires OpenAI API key)
- GPT-5 - OpenAI's latest generation (requires OpenAI API key)
- GPT-4 - Most capable GPT-4 model (requires OpenAI API key)
- GPT-3.5-turbo - Fast and cost-effective
- Gemini 3 Pro - Google's latest multimodal AI (requires Google API key)
- Gemini 2.0 Pro - Google's advanced model (requires Google API key)
- Claude Sonnet 4.5 - Anthropic's latest flagship (requires Anthropic API key)
- Claude Opus 4 - Anthropic's most powerful model (requires Anthropic API key)
- Claude Sonnet 3.5 - Fast and intelligent (requires Anthropic API key)
- Mistral - Via Mistral AI API
- LLaMA 2 - Meta's open-source LLM (Recommended for local use)
- LLaMA 3 - Latest version
- Mistral - Via Ollama
- Qwen - Alibaba's model
# OpenAI (GPT-5.1, GPT-5, GPT-4, GPT-3.5)
export OPENAI_API_KEY=your_openai_key_here
# Google Gemini (Gemini 3 Pro, Gemini 2.0 Pro)
export GOOGLE_API_KEY=your_google_key_here
# Anthropic Claude (Sonnet 4.5, Opus 4, Sonnet 3.5)
export ANTHROPIC_API_KEY=your_anthropic_key_here
# Add to your shell profile for persistence
echo 'export OPENAI_API_KEY=your_key' >> ~/.bashrc
echo 'export GOOGLE_API_KEY=your_key' >> ~/.bashrc
echo 'export ANTHROPIC_API_KEY=your_key' >> ~/.bashrc# Install Ollama
curl -fsSL https://ollama.com/install.sh | sh
# Download models
ollama pull llama2 # Recommended
ollama pull mistral # Alternative
ollama pull llama3 # Latest
# Start Ollama
ollama serveKaliGPT runs in safe mode by default, blocking potentially dangerous commands:
rm -rf /dd if=/dev/zero- Fork bombs
- Filesystem formatting commands
All commands require user approval before execution (unless --auto flag is used).
All commands and outputs are logged for audit purposes.
KaliGPT> payload sqliGenerates:
- Union-based SQLi
- Boolean-based blind SQLi
- Time-based blind SQLi
- Error-based SQLi
- Authentication bypass payloads
KaliGPT> payload xssGenerates:
- Reflected XSS
- Stored XSS
- DOM-based XSS
- Filter bypass techniques
- Cookie stealers
- Keyloggers
KaliGPT> payload reverse_shellGenerates shells for:
- Bash
- Python
- PHP
- Netcat
- PowerShell
- Perl
- Ruby
Generate comprehensive penetration testing reports:
# Markdown report
KaliGPT> report
# HTML report with styling
Select format: html
# All formats
Select format: allReports include:
- Executive Summary
- Target Information
- Findings Summary Table
- Detailed Vulnerability Descriptions
- Remediation Recommendations
- Commands Executed
- Discovered Services
- Technical Appendix
# Test parsers
python3 parsers/nmap_parser.py
python3 parsers/sqlmap_parser.py
# Test payload generator
python3 payloads/generator.py
# Test report builder
python3 reporting/report_builder.pyContributions are welcome! Please:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
- Create
parsers/your_tool_parser.py - Implement the
parse()method - Add to
parsers/__init__.py - Update documentation
- Add generator method to
payloads/generator.py - Update payload templates if needed
- Document the new payload type
This project is licensed under the MIT License - see the LICENSE file for details.
IMPORTANT: KaliGPT is designed for authorized penetration testing and educational purposes only.
- Only use on systems you have explicit permission to test
- Unauthorized access to computer systems is illegal
- The developers assume no liability for misuse
- Always follow responsible disclosure practices
- Comply with all applicable laws and regulations
- Built for the Kali Linux community
- Inspired by the need for AI-assisted pentesting
- Thanks to the open-source security community
- Powered by OpenAI, Meta (LLaMA), Mistral AI, and Ollama
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Documentation: Wiki
- Model Guide: AI Model Configuration Guide
- GUI/Web interface
- Plugin system for custom tools
- Team collaboration features
- Cloud workspace sync
- Advanced AI training on pentest data
- Integration with vulnerability databases (NVD, ExploitDB)
- Automated exploit chaining
- Video/screenshot capture
- Integration with bug bounty platforms
KaliGPT is a free, open-source project that requires significant time and resources to develop and maintain. Your support helps us continue improving and adding new features!
- π₯ Bronze Tier: $500 - $999
- π₯ Gold Tier: $1,000 - $4,999
- π Diamond Tier: $5,000+
Each tier comes with special recognition and benefits!
π§ Contact for donations: yashabalam9@gmail.com
π Learn more: See DONATE.md for complete details on donation tiers, benefits, and how to contribute.
β Star this repository | π Report bugs | π» Contribute code | π Improve docs | π£οΈ Spread the word
- β¨ Added GPT-5.1 and GPT-5 support
- β¨ Added Google Gemini 3 Pro and Gemini 2.0 Pro support
- β¨ Added Claude Sonnet 4.5, Opus 4, and Sonnet 3.5 support
- π Added comprehensive Model Configuration Guide
- π§ Updated dependencies (google-generativeai, anthropic)
- π Enhanced documentation with latest AI models
- Initial release
- Core AI engine
- Tool parsers (Nmap, Metasploit, SQLmap, Nikto, Gobuster, Hydra)
- Payload generator
- Report builder
- Multi-model LLM support
- CLI interface
Made with β€οΈ for the pentesting community
Star β this repo if you find it useful!
