AI-Powered Automated Bug Hunting Platform with Qwen CLI Integration
Automated security scanning platform that leverages AI for intelligent vulnerability discovery, exploit development, and professional bug bounty report generation. Built on top of Qwen CLI with full Kali Linux tools integration.
- Google Dork Finder - 60+ pre-built dorks across 8 categories, powered by Qwen web search
- Subdomain Enumeration - Passive DNS and brute-force techniques
- OSINT Gathering - Open-source intelligence collection
- Tech Stack Analysis - Automatic framework and technology detection
- Web Application Scanner - XSS, SQLi, security headers, cookies, info disclosure
- API Scanner - REST and GraphQL security testing
- Infrastructure Scanner - Port scanning, service detection
- Mobile Scanner - APK/IPA analysis (stub)
- 40+ Security Tools - Direct access to Kali's toolkit
- Automated Installation - One-command tool installation with graceful fallbacks
- Unified CLI Interface - Run any Kali tool from the CLI
- Quick Scan Presets - Pre-configured multi-tool scanning profiles
- Qwen CLI Integration - Uses Qwen's built-in tools (
web_search,run_shell_command, etc.) - Smart Recon - AI analyzes scan data to identify attack vectors
- Automated Planning - AI creates prioritized attack plans
- Vulnerability Discovery - Suggests what to test next based on findings
- Anti-Refusal System - Engineered prompts for authorized security research
- Beautiful UI - Dark theme with interactive charts
- Real-time Stats - Auto-refresh every 10 seconds
- Finding Management - Filter, triage, and update status
- REST API - Full programmatic access via
/api/*endpoints - Daemon Mode - Run as background service
- HTML Reports - Beautiful, client-ready reports
- Markdown Reports - Bug bounty platform compatible
- Auto-Generation - Reports created automatically after scans
- Folder Organization - Each scan gets its own report folder
- SQLite Database - Persistent storage for all findings
from aibughunter.api import BugHunter
async with BugHunter() as hunter:
results = await hunter.hunt("https://target.com")
findings = await hunter.scan_web("https://target.com")
stats = hunter.get_stats()# Clone the repository
git clone https://github.com/Preshy/aibughunter.git
cd aibughunter
# Install
pip install -e .- Python 3.10+
- Qwen CLI - Already installed (uses the
qwencommand) - Kali Linux - Optional, for full tool integration
aibughunter --version
aibughunter --helpEnd-to-end bug hunting workflow:
# Start a full hunt on a target
aibughunter hunt https://target.com
# With custom options
aibughunter hunt https://target.com --depth aggressive --auto-exploit --report# Start dashboard as daemon (background)
aibughunter web serve --daemon
# Open in browser
open http://127.0.0.1:8000
# Stop daemon
aibughunter web stop
# Check status
aibughunter web statusDashboard Features:
- Real-time vulnerability statistics
- Interactive severity charts
- Filter findings by severity/status/target
- Update finding status (New β Triaged β Reported β Resolved)
- Recent scan history
# Find exposed admin panels
aibughunter recon dork exposed_panels
# Find config files with credentials
aibughunter recon dork config_files -m 50
# Auto-find bug bounty targets
aibughunter recon dork --find-targets
# Search for specific domain
aibughunter recon dork subdomains -t example.com
# Add custom dork
aibughunter recon dork --add-custom "inurl:login site:example.com"
# List all categories
aibughunter recon dork --listAvailable Categories:
| Category | Description | Dorks |
|---|---|---|
exposed_panels |
Admin dashboards, login pages | 10 |
config_files |
Environment files, configs with secrets | 10 |
sensitive_files |
Leaked documents, credentials | 10 |
vulnerable_apps |
WordPress, Joomla, Drupal installations | 10 |
cloud_storage |
Exposed S3 buckets, Google Cloud storage | 5 |
api_endpoints |
Public APIs, GraphQL, Swagger docs | 8 |
error_pages |
SQL errors, stack traces | 6 |
subdomains |
Subdomain enumeration | 1 |
# List all available tools
aibughunter kali list
# Show installed tools
aibughunter kali list --installed
# Search for tools
aibughunter kali search sql
# Get tool info
aibughunter kali info sqlmap
# Install a tool
aibughunter kali install nmap
# Run a tool
aibughunter kali run nmap -sV -sC target.com
# Quick scan with multiple tools
aibughunter kali quick-scan https://target.com --type standard
# View statistics
aibughunter kali statsAvailable Tools by Category:
- Reconnaissance: nmap, masscan, amass, theharvester, sublist3r
- Web Application: sqlmap, nikto, wfuzz, gobuster, ffuf, wpscan, joomscan
- Vulnerability Scanning: nuclei, openvas, nessus
- Exploitation: metasploit, searchsploit, beef
- Password Attacks: john, hashcat, hydra, crunch, cewl
- Sniffing: wireshark, tcpdump, mitmproxy
- Wireless: aircrack-ng, wifite
- Post Exploitation: mimikatz, mimipenguin
- Forensics: autopsy, volatility
# Subdomain enumeration
aibughunter recon subdomains example.com
# Technology stack analysis
aibughunter recon techstack https://target.com --detailed
# Endpoint discovery
aibughunter recon endpoints https://target.com --crawl --js
# OSINT gathering
aibughunter recon osint example.com --emails --leaks# Web application scan
aibughunter scan web https://target.com --depth aggressive
# API scanning
aibughunter scan api https://api.target.com/v1 --type rest
aibughunter scan api https://api.target.com/graphql --type graphql
# Infrastructure scanning
aibughunter scan infra target.com --ports top-1000
# Mobile app scanning
aibughunter scan mobile app.apk --platform android# Generate reports (auto-creates both Markdown + HTML)
aibughunter report generate
# List all findings
aibughunter report list-findings
# Generate POC for a vulnerability
aibughunter report poc VULN-001
# Export findings
aibughunter report export --format json --output findings.json# Add target to scope
aibughunter targets add example.com --program hackerone
# List targets
aibughunter targets list
# Import scope from file
aibughunter targets import-scope scope.json --program bugcrowd
# Export scope
aibughunter targets export-scope --output my-scope.jsonimport asyncio
from aibughunter.api import BugHunter, hunt, scan, query
async def main():
# Full hunt
async with BugHunter() as hunter:
results = await hunter.hunt("https://target.com")
print(f"Found {results['total_findings']} vulnerabilities")
if results['report_path']:
print(f"Report: {results['report_path']}")
# Quick scan
findings = await scan("https://target.com", scan_type="web")
# Query database
high_vulns = query(severity="high")
# Find targets
async with BugHunter() as hunter:
targets = await hunter.find_targets(max_results=50)
# Reconnaissance
async with BugHunter() as hunter:
recon = await hunter.recon("https://target.com")
# Generate report
async with BugHunter() as hunter:
report_path = await hunter.generate_report(scan_id="scan_123")
asyncio.run(main())When the dashboard is running, access the API at http://127.0.0.1:8000:
# Get statistics
curl http://127.0.0.1:8000/api/stats
# Query findings
curl "http://127.0.0.1:8000/api/findings?severity=high"
# List scans
curl http://127.0.0.1:8000/api/scans
# Get specific scan
curl http://127.0.0.1:8000/api/scans/scan_123
# Update finding status
curl -X PUT "http://127.0.0.1:8000/api/findings/VULN-001/status?status=triaged"
# List targets
curl http://127.0.0.1:8000/api/targetsaibughunter/
βββ aibughunter/
β βββ api/ # π Python API module
β β βββ __init__.py # BugHunter class
β βββ ai/ # π€ AI integration
β β βββ qwen_client.py # Qwen CLI wrapper
β βββ commands/ # π» CLI commands
β β βββ scan.py # Scanning commands
β β βββ recon.py # Reconnaissance + Dorks
β β βββ kali.py # Kali Linux tools
β β βββ web.py # π Web dashboard
β β βββ report.py # Report generation
β β βββ config.py # Configuration
β β βββ targets.py # Target management
β βββ core/ # βοΈ Core functionality
β β βββ orchestrator.py # Main hunt coordinator
β β βββ database.py # πΎ SQLite database
β β βββ scope.py # Scope management
β β βββ dashboard.py # Terminal dashboard
β βββ scanners/ # π Scanning modules
β β βββ recon_scanner.py # Reconnaissance
β β βββ dork_finder.py # Google Dork finder
β β βββ web_scanner.py # Web vulnerabilities
β β βββ api_scanner.py # API security
β β βββ infra_scanner.py # Infrastructure
β β βββ exploit_module.py# Exploitation testing
β βββ tools/ # π οΈ Tool management
β β βββ kali_tools.py # Kali Linux integration
β β βββ manager.py # General tools
β β βββ creator.py # AI tool creator
β βββ reports/ # π Report generation
β β βββ generator.py # Report templates
β β βββ html_template.py # HTML report template
β β βββ poc_generator.py # POC generation
β β βββ exporter.py # Export findings
β βββ web/ # π Web dashboard
β βββ api.py # FastAPI application
β βββ dashboard.html # Dashboard UI
βββ tests/ # π§ͺ Test suite
βββ examples/ # π Usage examples
βββ data/ # πΎ SQLite database
βββ reports/ # π Generated reports
# .env file
AIBH_QWEN_MODEL=coder-model
AIBH_SCAN_RATE_LIMIT=0.1
AIBH_SCAN_MAX_CONCURRENT=5# Show current config
aibughunter config show
# Set configuration
aibughunter config set qwen-model coder-model
aibughunter config set scan-rate-limit 0.5
# Validate configuration
aibughunter config validateAll findings are stored in SQLite at data/aibughunter.db:
-- Tables:
-- scans - Scan history with duration and status
-- findings - All vulnerabilities (queryable, filterable)
-- targets - Target scope management
-- programs - Bug bounty programs
-- tool_usage - Tool execution history# Discover vulnerable targets automatically
aibughunter recon dork --find-targets
# Filter for high-severity results
# (Results are sorted by severity automatically)
# Add promising targets to scope
aibughunter targets add target.com --program hackerone# Full workflow
aibughunter hunt https://webapp.com
# Or step-by-step
aibughunter recon subdomains webapp.com
aibughunter recon techstack https://webapp.com
aibughunter scan web https://webapp.com --depth aggressive# examples/api_usage.py
import asyncio
from aibughunter.api import BugHunter
async def bug_hunt():
targets = ["https://target1.com", "https://target2.com"]
async with BugHunter(output_dir="./my-reports") as hunter:
for target in targets:
print(f"\nHunting {target}...")
# Reconnaissance
recon = await hunter.recon(target)
print(f" Found {len(recon['endpoints'])} endpoints")
# Web scanning
findings = await hunter.scan_web(target, depth="standard")
print(f" Found {len(findings)} vulnerabilities")
# Generate report
if findings:
report = await hunter.generate_report()
print(f" Report: {report}")
asyncio.run(bug_hunt())# Quick reconnaissance
aibughunter kali run nmap -sV -sC -O example.com
# Web application testing
aibughunter kali run sqlmap -u "https://example.com/page?id=1" --batch --dbs
# Directory enumeration
aibughunter kali run ffuf -u https://example.com/FUZZ -w wordlist.txt -mc 200,301,302# Run all tests
python run_tests.py
# Or directly
pytest tests/ -v
# Run specific test file
pytest tests/test_qwen_client.py -vTest Coverage:
- β Qwen CLI client integration
- β Configuration management
- β Google Dork finder
- β Scope management
- β Tools management
- β Report generation & POC
- β Finding storage & export
- Core CLI framework
- Qwen CLI integration (subprocess)
- Google Dork finder
- Kali Linux tools integration
- Web application scanner
- API scanner
- SQLite database
- Web dashboard with FastAPI
- Python API module
- HTML report generation
- Mobile app scanner (full implementation)
- Automated exploit development
- CI/CD integration
- Burp Suite extension
- Team collaboration features
- Vulnerability database
- Integration with bug bounty platforms (HackerOne, Bugcrowd APIs)
IMPORTANT: This tool is for authorized security testing only.
- β Only test targets you own or have explicit permission to test
- β Respect scope and rules of engagement
- β Follow responsible disclosure practices
- β Comply with applicable laws and regulations
- β Bug bounty programs require following their specific rules
MIT License - See LICENSE file for details
Contributions are welcome! Please read our contributing guidelines and submit pull requests.
- π Documentation: This README
- π Bug Reports: GitHub Issues
- π¬ Discussions: GitHub Discussions
- Qwen CLI - AI foundation
- Kali Linux - Security tools
- FastAPI - Web framework
- Typer - CLI framework
Built with β€οΈ for the bug bounty community
"The best way to find bugs is to automate the hunt."