Discover and explore top open-source AI tools and projects—updated daily.
passer-WAI-powered platform for automated CTF challenge resolution
Top 98.2% on SourcePulse
This project provides an AI-driven platform for automating CTF (Capture The Flag) challenges, designed for security researchers and participants. It leverages Large Language Models (LLMs) and a multi-agent system to automate complex vulnerability discovery and exploitation, significantly enhancing efficiency in security competitions.
How It Works
The core architecture employs a multi-agent system comprising five specialized agents: explorer, scanner, solutioner, executor, and actioner. These agents collaborate, with LLMs driving decision-making, vulnerability analysis, and exploit code generation. This approach enables end-to-end automation, from intelligent page exploration and multi-dimensional vulnerability scanning (including XSS, SQLi, command injection, LFI, IDOR) to cross-scenario exploitation and automated exploit execution. The system features a Flask backend for API services and a separate frontend for task management.
Quick Start & Requirements
agent directory, and run pip install -r requirements.txt.agent/config/config.py to set LLM API keys (e.g., DeepSeek, Tencent) and the backend server URL.python flaghunter.py from the agent directory.server directory and run docker-compose up -d. Access the frontend at http://localhost:85 and the backend API at http://localhost:5000.Highlighted Details
Maintenance & Community
The project originated from the Tencent Cloud AI Penetration Hackathon, developed by the xjtuHunter team, securing second place. The core maintainer is 九暑 (passerW). No specific community channels (like Discord or Slack) or detailed roadmap information are provided in the README.
Licensing & Compatibility
The project is released under the MIT License, which permits broad use, including commercial applications and linking within closed-source projects.
Limitations & Caveats
This tool is strictly intended for legal CTF competitions and authorized security research. Use on unauthorized systems is prohibited. The functionality relies on obtaining and configuring API keys for specific LLM providers.
3 months ago
Inactive
aliasrobotics
usestrix