You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Spectreweb is not an auto scanner – it is an AI-powered assistant for manual penetration testing:
┌─────────────────────────────────────────────────────────────────────┐
│ 🎯 SPECTREWEB AI PHILOSOPHY │
├─────────────────────────────────────────────────────────────────────┤
│ │
│ ❌ Auto scan → Blocked by WAF → Fail │
│ ✅ AI analyzes → Human decides → Smart tests → Success │
│ │
│ "Don’t brute force the target – outsmart it." |
│ │
└─────────────────────────────────────────────────────────────────────┘
🔥 Key Differentiators
Feature
Traditional
Spectreweb AI
Approach
Blind auto-scanning
AI-guided, operator-driven testing
WAF Bypass
Hope it works
Generate 10+ smart bypass variants
Payloads
Static wordlists
Context-aware, mutated payloads
Rate Limits
Get blocked
Detect, adapt, and throttle
False Positives
Many
AI-assisted validation
Logic Bugs
Often missed
AI suggests business-logic test cases
Session
Stateless
Persists findings and context
🧠 Self-Learning AI (NEW in v4.1.0!)
Spectreweb AI includes a self-learning local AI that becomes smarter with your usage:
┌─────────────────────────────────────────────────────────────────────┐
│ 🧠 SELF-LEARNING AI ARCHITECTURE │
├─────────────────────────────────────────────────────────────────────┤
│ │
│ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │
│ │ Your Scans │────▶│ Learning │────▶│ Local AI │ │
│ │ & Feedback │ │ Store (SQL) │ │ Models │ │
│ └──────────────┘ └──────────────┘ └──────────────┘ │
│ │ │ │
│ ▼ ▼ │
│ ┌──────────────────────────────────────┐ │
│ │ AI Orchestrator │ │
│ │ Local AI ←→ Remote AI (hybrid) │ │
│ └──────────────────────────────────────┘ │
│ │
└─────────────────────────────────────────────────────────────────────┘
🎓 What the AI Learns
Model
Learns From
Purpose
SecretClassifier
Your true/false positive feedback
Reduce false positives in secret detection
EndpointRiskScorer
Attack history & results
Prioritize high-risk endpoints
PayloadRanker
Payloads that actually worked
Prefer effective payloads first
🚀 How It Works (Automatic!)
# 1. Just use the tools normally - data is collected automatically!deep_secret_hunt("target.com") # → Secrets saved to learning storeattack_session.run_attack(...) # → Attack results saved to learning store# 2. Label findings to teach the AI (via MCP tools or API)learning_label("secret_abc123", "false_positive")
learning_label("secret_xyz789", "true_positive")
# 3. Auto-train when ready (or manually trigger)ai_auto_train() # → Trains if 50+ labeled samples & 10+ new since last trainai_train() # → Force train immediately# 4. Get smart insights from your historyai_insights()
# → {"attack_effectiveness": {"sqli": 0.15, "xss": 0.08}, "recommendations": [...]}# 5. Future scans use learned models automatically!ai_classify_secret(secret_type="aws_key", entropy=4.8, in_test_file=True)
# → {"is_real": false, "confidence": 0.85, "model_used": "ml"}
🔧 MCP Tools for Self-Learning
Tool
Description
ai_status
Get AI models & learning store status
ai_train
Manually train models
ai_auto_train
Auto-train if enough new data
ai_insights
Get smart recommendations from history
ai_classify_secret
Classify a secret using local AI
ai_score_endpoint
Score endpoint vulnerability risk
learning_stats
View learning store statistics
learning_list_findings
List stored findings
learning_label
Label a finding (feedback loop)
learning_export
Export learning data to JSON
🔄 Hybrid AI Strategy
Local AI (fast, free, personalized):
Secret classification
Endpoint risk scoring
Payload ranking
Remote AI (heavier, for complex reasoning):
Deep vulnerability analysis
Exploit ideation and refinement
Report drafting and polishing
The AI orchestrator automatically chooses the most appropriate backend.
⚡ Core Capabilities
🛡️ WAF Bypass & Evasion
# Generate 10+ bypass variants for any payloadwaf_bypass("<script>alert(1)</script>")
# Output: URL encoded, double encoded, unicode, hex, # mixed case, null byte, comments, etc.
🔀 Payload Mutation
# Mutate payload with multiple techniquesmutate_payload("' OR '1'='1", "case,encode,whitespace,comments")
# Output: 15+ variations to bypass filters
🔑 IDOR Testing
# Generate IDOR test cases for any IDgenerate_idor_tests("12345")
# → decrement, increment, zero, negative, array injectiongenerate_idor_tests("550e8400-e29b-41d4-a716-446655440000")
# → null UUID, modified UUID, etc.
2. Install Security Tools (Recommended on Kali Linux)
# ProjectDiscovery tools
go install github.com/projectdiscovery/httpx/cmd/httpx@latest
go install github.com/projectdiscovery/subfinder/cmd/subfinder@latest
go install github.com/projectdiscovery/katana/cmd/katana@latest
go install github.com/projectdiscovery/naabu/v2/cmd/naabu@latest
# Other tools
go install github.com/tomnomnom/waybackurls@latest
go install github.com/lc/gau/v2/cmd/gau@latest
go install github.com/hahwul/dalfox/v2@latest
# Add to PATH`echo'export PATH="$HOME/go/bin:$PATH"'>>~/.zshrc
3. Start the Spectreweb Server
python server.py
# Output:# 👻 Spectreweb AI v5.3.1 - Starting...# ✅ Server running at http://127.0.0.1:8888
4. Configure MCP (for Windsurf / Claude / MCP-compatible clients)