A comprehensive red team operations management platform with AI integration, Docker-based security tools, and advanced analytics. Transform your security testing workflow with intelligent automation and seamless tool integration.
- Operation Planning: Organize and track red team engagements
 - Target Management: Centralized target tracking and documentation
 - Vulnerability Assessment: Comprehensive vulnerability tracking and reporting
 - Progress Monitoring: Real-time operation status and progress tracking
 
- OpenAI Integration: Leverage GPT models for reconnaissance and analysis
 - Anthropic Claude: Advanced reasoning for complex security scenarios
 - Automated Reporting: AI-generated vulnerability reports and documentation
 - Intelligent Recommendations: AI-suggested attack vectors and methodologies
 
- Kali Linux Environment: Fully containerized Kali Linux with VNC access
 - Burp Suite Professional: Integrated web application security testing
 - Tool Management: Easy deployment and management of security tools
 - Isolated Environments: Secure, isolated testing environments
 
- Dashboard Analytics: Real-time statistics and progress tracking
 - Vulnerability Trends: Historical data analysis and trend visualization
 - Performance Metrics: Operation efficiency and success rate tracking
 - Custom Reports: Detailed reporting and data export capabilities
 
- Google OAuth Integration: Secure authentication with Google accounts
 - Session Management: Secure session handling and user management
 - Role-Based Access: Granular permission control
 - Audit Logging: Comprehensive activity logging and monitoring
 
- Node.js 20.x or higher
 - PostgreSQL 15+
 - Docker & Docker Compose (optional, for security tools)
 - Git
 
git clone https://github.com/attck-nexus/attack-node.git
cd attack-node
chmod +x setup.sh
./setup.sh
npm run dev- 
Clone the repository
git clone https://github.com/attck-nexus/attack-node.git cd attack-node - 
Install dependencies
npm install
 - 
Set up environment variables
cp .env.example .env # Edit .env with your configuration - 
Start services (Docker)
npm run docker:dev
 - 
Configure database
npm run db:push
 - 
Start the application
npm run dev
 - 
Access the application
- Open your browser to 
http://localhost:5000 - Default development user is automatically created
 
 - Open your browser to 
 
Create a .env file in the root directory:
# Database Configuration
DATABASE_URL=postgresql://user:password@localhost:5432/attacknode
# Server Configuration
NODE_ENV=development
PORT=5000
SESSION_SECRET=your_secure_session_secret_here
# AI Integration
OPENAI_API_KEY=your_openai_api_key
ANTHROPIC_API_KEY=your_anthropic_api_key
# Google OAuth (Production)
GOOGLE_CLIENT_ID=your_google_client_id
GOOGLE_CLIENT_SECRET=your_google_client_secret- Node.js - Runtime environment
 - Express.js - Web framework
 - TypeScript - Type safety
 - Drizzle ORM - Database ORM
 - PostgreSQL - Primary database
 - Passport.js - Authentication
 - Multer - File uploads
 - WebSocket - Real-time communication
 
- React 18 - UI framework
 - TypeScript - Type safety
 - Tailwind CSS - Styling
 - Radix UI - Component library
 - Tanstack Query - Data fetching
 - Wouter - Client-side routing
 - Framer Motion - Animations
 
- OpenAI SDK - GPT model integration
 - Anthropic SDK - Claude model integration
 - Docker - Containerization
 - WebSocket - Real-time updates
 
attack-node/
โโโ client/                 # React frontend
โ   โโโ src/
โ   โ   โโโ components/    # UI components
โ   โ   โโโ pages/         # Page components
โ   โ   โโโ hooks/         # Custom hooks
โ   โ   โโโ lib/          # Utilities
โโโ server/                # Express backend
โ   โโโ services/         # Business logic
โ   โโโ routes.ts         # API routes
โ   โโโ index.ts          # Server entry point
โโโ shared/               # Shared types and schemas
โโโ uploads/              # File uploads
โโโ public/              # Static assets
# Development
npm run dev          # Start development server
npm run check        # TypeScript type checking
# Production
npm run build        # Build for production
npm run start        # Start production server
# Database
npm run db:push      # Push database schema changesAccess Information:
- URL: 
https://localhost:6902(HTTPS required) - Username: 
kasm_user - Password: 
password - User Privileges: Root access enabled for full system control
 - SSL Certificate: Self-signed (accept browser security warning)
 
Features:
- Persistent Storage: All files and configurations automatically saved
 - Root Access: Full administrative privileges for advanced operations
 - Shared Directory: Access to 
/home/kasm-user/sharedfor file transfers - Pre-installed Tools: Complete Kali Linux arsenal (Nmap, Metasploit, Burp Suite, etc.)
 
Getting Started:
- Start Kali Linux container from the Integrations tab or Kali Environment page
 - Wait for container initialization (1-2 minutes for full setup)
 - Navigate to 
https://localhost:6902in your browser - Accept the SSL certificate warning (click "Advanced" โ "Proceed to localhost")
 - Login with username 
kasm_userand passwordpassword - Enjoy full Kali Linux desktop with root privileges and persistent storage
 
Data Persistence:
- Home Directory: All user files persist between container restarts
 - Tool Configurations: Settings and preferences automatically saved
 - Downloads: Files downloaded remain available across sessions
 - Custom Scripts: Personal scripts and tools persist permanently
 - Storage Location: 
uploads/kasm_profiles/kali-root/on host system 
Troubleshooting:
- HTTP 401 Error: Ensure you're using HTTPS (not HTTP) and correct credentials
 - Connection Refused: Verify container is running via Docker Dashboard
 - SSL Warning: Accept the self-signed certificate to proceed
 - Slow Loading: Allow 2-3 minutes for complete container initialization
 - Permission Issues: Container runs with root privileges for full access
 
Setup:
- Upload your Burp Suite Professional .jar file via the Burp Suite page
 - Optionally upload your license file for full functionality
 - Choose between GUI mode (VNC access) or headless mode (API only)
 - Access via the application's integrated interface
 
Access Methods:
- GUI Mode: Web-based VNC interface for full Burp Suite desktop
 - Headless Mode: API integration for automated scanning
 
## ๐ค AI Agent Configuration
### OpenAI Integration
1. Obtain OpenAI API key from [OpenAI Platform](https://platform.openai.com/)
2. Add to `.env` file: `OPENAI_API_KEY=your_key_here`
3. Configure in the AI Agents section
### Anthropic Claude
1. Get Anthropic API key from [Anthropic Console](https://console.anthropic.com/)
2. Add to `.env` file: `ANTHROPIC_API_KEY=your_key_here`
3. Configure in the AI Agents section
## ๐ Dashboard Overview
The main dashboard provides:
- **Operation Statistics**: Active operations, vulnerabilities, and success metrics
- **AI Agent Status**: Real-time status of connected AI agents
- **Recent Activity**: Latest operations and findings
- **Vulnerability Trends**: Historical analysis and trending data
- **Quick Actions**: Rapid access to common tasks
## ๐ Security Features
- **Secure Authentication**: Google OAuth integration with fallback
- **Session Management**: Secure session handling with PostgreSQL storage
- **File Upload Security**: Validated file uploads with size limits
- **Input Validation**: Comprehensive input validation using Zod
- **SQL Injection Prevention**: ORM-based queries with parameterization
- **XSS Protection**: Content Security Policy and input sanitization
## ๐ก๏ธ Best Practices
### Development
- Use TypeScript for type safety
- Follow React best practices
- Implement proper error handling
- Use environment variables for configuration
- Regular dependency updates
### Security
- Keep API keys secure
- Use strong session secrets
- Implement proper authentication
- Regular security audits
- Monitor for vulnerabilities
### Operations
- Regular database backups
- Monitor application logs
- Set up proper monitoring
- Use Docker for isolation
- Implement proper CI/CD
## ๐ Documentation
- [Deployment Guide](DEPLOYMENT_GUIDE.md) - Detailed deployment instructions
- [API Documentation](docs/api.md) - API endpoint documentation
- [Contributing Guide](CONTRIBUTING.md) - How to contribute to the project
- [Security Policy](SECURITY.md) - Security guidelines and reporting
## ๐ค Contributing
We welcome contributions! Please see our [Contributing Guide](CONTRIBUTING.md) for details on:
- Code of conduct
- Development setup
- Pull request process
- Coding standards
## ๐ License
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
## ๐ Support
### Getting Help
- Check the [Deployment Guide](DEPLOYMENT_GUIDE.md) for setup issues
- Review the application logs for error details
- Ensure all environment variables are correctly set
- Verify database connectivity
### Common Issues
- **Database Connection**: Check PostgreSQL service and credentials
- **Port Conflicts**: Ensure port 5000 is available
- **AI Integration**: Verify API keys are valid and have sufficient credits
- **Docker Issues**: Ensure Docker daemon is running
### Community
- Create an issue for bug reports
- Submit feature requests via GitHub issues
- Join discussions in the repository
## ๐ฎ Roadmap
### Upcoming Features
- **Advanced Reporting**: Enhanced report generation and export
- **Team Collaboration**: Multi-user operations and collaboration
- **API Integrations**: Extended third-party tool integrations
- **Mobile App**: Mobile companion application
- **Cloud Deployment**: One-click cloud deployment options
### Future Enhancements
- **Machine Learning**: Predictive analytics and pattern recognition
- **Advanced AI**: Custom AI model training and deployment
- **Enterprise Features**: SSO, RBAC, and enterprise security
- **Plugin System**: Extensible plugin architecture
---
**Attack Node** - Empowering red team operations with intelligent automation and seamless tool integration.
*Built with โค๏ธ by the security community*