EVA

agent
SUMMARY

EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, contextual analysis, and multi-backend AI integration.

README.md

EVA Banner

โซป ๐ฃ.๐—ฉ.๐ 

โฎก Exploit Vector Agent


Autonomous offensive security AI for guiding pentest processes

Stars
Watchers
Forks
Repo Views

License
Security
AI

GitHub issues
GitHub pull requests
GitHub contributors
GitHub last commit



Checkout my other project :> NekoCLI!


๐บ Overview

EVA is an AI penetration testing agent that guides users through complete pentest engagements with AI-powered attack strategy, autonomous command generation, and real-time vulnerability analysis based on outputs. The goal is not to replace the pentest professional but to guide and assist and provide faster results.

Main funcionalities

  • ๐Ÿœ‚ Intelligent Reasoning: Advanced AI-driven analysis and attack path identification depending on query.
  • โตข Automated Enumeration: Systematic target reconnaissance and information gathering based on provided target.
  • ๊Žˆ Vulnerability Assessment: AI-powered vulnerability identification and exploitation strategies, suggesting next steps for vulnerability or OSINT.
  • โ‘‡ Multiple AI Backends: Support for Ollama, OpenAI GPT, Anthropic, Gemini, G4F.dev and custom API endpoints
  • ใ„– Session Management: Persistent sessions and chats
  • โ‘… Interactive Interface: Real-time command execution and analysis of output in multi-stage.

โตข EVA Logic & Pentest Process Flow

graph TD
 
    A[๐Ÿœ‚ EVA Launch] --> B{๐Ÿขง Session Selection}
    B -->|Existing Session| C[๐Ÿขง Load Session Data]
    B -->|New Session| D[฿ญ Initialize Session]
    C --> E[ใ„– Select AI Backend]
    D --> E
    
    E --> F[๐Ÿฆ™ Ollama Local]
    E --> G[โฌก OpenAI GPT]
    E --> J1[โœถ Anthropic Claude]
    E --> J2[โœฆ Google Gemini]
    E --> H[โŸ… Custom API]
    E --> I[๐Ÿœ… G4F.dev Provider]
    
    F --> J[Pentest Shell]
    G --> J
    J1 --> J
    J2 --> J
    H --> J
    I --> J
    
    J --> K[โŒ– Target Definition]
    K --> L[๐Ÿง  AI Pentest Strategy]
    
    L --> M[๐Ÿฏ Reconnaissance Phase]
    M --> N[โžค_ Execute Commands]
    N --> O[๊ސ Analyze Results]
    O --> P{แˆ Vulnerabilities Found?}
    
    P -->|Yes| Q[๐Ÿ–ง Exploitation Planning]
    P -->|No| R[โญฏ More Enumeration]
    R --> L
    
    Q --> S[โšก Exploitation Phase]
    Q --> T[Export graphs and mapped networks]
    
    S --> U[โžค_ Execute Exploit]
    U --> V{๐Ÿžœ Access Gained?}
    
    V -->|Yes| W[๐ฑƒ Privilege Escalation]
    V -->|Failed| X[โญฏ Alternative Methods]
    X --> Q
    
    W --> Y[๐ฆ Post-Exploitation]
    Y --> Z{๐Ÿžœ Objectives Met?}
    
    Z -->|Generate Report| AA[๐Ÿ“‹ Generate Report]
    Z -->|Exit and Save| AB[๐Ÿ’พ Save & Exit]
    Z -->|No| AC[๐Ÿ” Continue Pentest]
    AC --> L
    
    AA --> AB
    
    subgraph "๐ŸŽ EVA "
        AD[โฏ Attack Strategy AI]
        AE[๐šต Session Memory]
        AF[แฎ Vulnerability Analysis]
        AG[CVE DATABASE SEARCH]
        AH[๐ฐฌ Output Processing]
    end
    
    L --> AD
    AD --> AE
    O --> AF
    AF --> AG
    AG --> AH
    AH --> L

โžค Quick Start

๐ŸŽ Installation

Ollama for local endpoint (required for local models and eva exploit database)

curl -fsSL https://ollama.ai/install.sh | shr

pip installation

pip install eva-exploit
eva

EVA github installation

git clone https://github.com/ARCANGEL0/EVA.git
cd EVA
chmod +x eva.py
./eva.py 
# Adding it to PATH to be acessible anywhere
sudo mv eva.py /usr/local/bin/eva

โฌข Configuring EVA.

When starting EVA, it will automatically handle:

  • โœ… API key setup (According to Model)
  • โœ… Ollama model download (Default set as whiterabitv2, feel free to change to any other desired model)
  • โœ… Session directory creation
  • โœ… Dependencies installation

If you wish to modify endpoints, ollama models, API Keys or configure EVA, please run:

eva --config

๐Ÿ“ Directory Structure of EVA

~/EVA_data/
โ”œโ”€โ”€ sessions/           # Session storage
โ”‚   โ”œโ”€โ”€ session1.json
โ”‚   โ”œโ”€โ”€ session2.json
โ”‚   โ””โ”€โ”€ ...
โ”œโ”€โ”€ reports/           # Vulnerability reports
โ”‚   โ”œโ”€โ”€ report1.html
โ”‚   โ”œโ”€โ”€ report1.pdf
โ”‚   โ””โ”€โ”€ ...
โ””โ”€โ”€ attack_maps/           # Attack vector maps in HTML/JS
    โ”œโ”€โ”€ attack_surface1.html
    โ”œโ”€โ”€ attack_surface2.html
    โ””โ”€โ”€ ...

๊€ฌ Where to change EVA options

eva --config

Will display the following configuration:

API_ENDPOINT = "NOT_SET" 
G4F_MODEL="gpt-oss-120b"   
G4F_URL="https://api.gpt4free.workers.dev/api/novaai/chat/completions"
OLLAMA_MODEL = "ALIENTELLIGENCE/whiterabbitv2" 
SEARCHVULN_MODEL = "gpt-oss:120b-cloud"
SEARCVULN_URL = "https://ollama.com/api/chat"
OLLAMA_API_KEY = "NOT_SET" 
OPENAI_API_KEY = "NOT_SET" 
ANTHROPIC_API_KEY = "NOT_SET" 
GEMINI_API_KEY = "NOT_SET" 
ANTHROPIC_MODEL = "claude-3-5-sonnet-latest"
GEMINI_MODEL = "gemini-2.0-flash"
OLLAMA_CLOUD_TIMEOUT = 45
CONFIG_DIR = Path.home() / "EVA_data" #
SESSIONS_DIR = CONFIG_DIR / "sessions"
REPORTS_DIR = CONFIG_DIR / "reports"
MAPS_DIR = CONFIG_DIR / "attack_maps"
TERMS_ACCEPTEDTHING = CONFIG_DIR / ".confirm"
CONFIG_DIR.mkdir(parents=True, exist_ok=True)
SESSIONS_DIR.mkdir(parents=True, exist_ok=True)
REPORTS_DIR.mkdir(parents=True, exist_ok=True)
MAPS_DIR.mkdir(parents=True, exist_ok=True)
username = os.getlogin()
MAX_RETRIES = 10 ### maximum retries for fetching requests
RETRY_DELAY = 10 ### delay between requests to avoid rate limit error

๐Ÿ–ด Usage Guide

Initialization

python3 eva.py
# or if installed via pip:
eva

# open config.py in your default editor
eva --config

# deletes all sessions and files
eva --delete

# configure custom api and payload handler
eva --custom-api

# vulnerability / exploit intel search
eva --search i have a wingftp server running on version 4.7.3, find me exploits for it

# run eva default launcher
eva 
  1. Select Session: Choose existing session or create new one
  2. Choose AI Backend:
    • Ollama (Recommended): Local AI with WhiteRabbit-Neo model
    • GPT-5: OpenAI's latest model (requires API key)
    • G4F: Uses g4f.dev endpoints with models running GPT5.2, feel free to change model used.
    • Anthropic: Claude API backend (requires API key)
    • Gemini: Google Gemini API backend (requires API key)
    • Custom API: Your own API endpoint if desired
  3. In the input field of chat, type in your request or what you need assistance with for EVA to help you!

USER > i need help with a CTF machine, ip is 10.10.16.81

After making a request, commands will be provided and the pentest workflow will start, use commands below as reference.

Command Description
/exit / /quit Exit EVA and save session
/model Change AI backend
/rename Rename the current session
/search <query> or search <query> Run exploit/vulnerability intel search inside current chat session and feed results into next analysis
/report Generates a PDF/HTML report with latest findings on session
/map Generates a html file with attack surface map of session
/menu Return to session menu
R Run suggested command
S Skip command
A Ask for next step
Q Quit session

ใ„– Example of chat session

demonstration video.

Demo Usage

USER > I'm on a Windows target at IP 10.10.11.95, what should I enumerate first?

[ANALYSIS] 
Based on the Windows environment, I need to perform comprehensive 
enumeration focusing on:

1. System Information (OS version, patches, architecture)
2. Network Services (ports, services, listening processes)  
3. User Context (current user, groups, privileges)
4. Security Controls (AV, firewall, UAC settings)
5. Potential Attack Vectors (SMB, RDP, IIS, etc.)

Let me start with basic system reconnaissance to understand the target better...

> execute:   nmap -sC -sV -O 10.10.10.10
| [R]un | [S]kip | [A]sk | [G]enerate HTML Report | [V]iew attack map | [Q]uit | 

>  R

ฮž AI Backends

๐Ÿฆ™ Ollama (Recommended)

  • Model: ALIENTELLIGENCE/whiterabbitv2" (best one for OffSec)
    • โœ… Complete offline operation
    • โœ… No API costs
    • โœ… Privacy-focused
    • โŒ Higher CPU/GPU usage, recommended for machines above 8GB+ VRAM/RAM
    • โŒ Heavier model, ~9.8gb model

โฌก OpenAI GPT

  • Models: GPT-5, GPT-4.1 (fallback)
  • About:
    • โœ… Faster reasoning
    • โœ… Extensive knowledge base
    • โœ… Continuous updates
    • โŒ Paid, requires apikey

แ›ƒ G4F.dev

  • Models: GPT-5-1
  • About:
    • โœ… Updated information in real-time (usually)
    • โœ… Quick responses
    • โŒ Might be unstable or down sometimes, low stability.

โŸ… Custom API

  • Endpoint: Configurable API to use your own as you wish. Please run eva --custom-api to set API handler and payload
  • About:
    • โœ… Custom model integration
    • โœ… Modifiable as you wish

โœถ Anthropic

  • Model: Configurable via ANTHROPIC_MODEL
  • About:
    • โœ… Strong reasoning quality
    • โœ… Stable API
    • โŒ Requires ANTHROPIC_API_KEY

โœฆ Gemini

  • Model: Configurable via GEMINI_MODEL
  • About:
    • โœ… Fast response latency
    • โœ… Native JSON output mode and better parsing, usually provides best results
    • โŒ Requires GEMINI_API_KEY

โ‘‡ Roadmap

  • โฌข OpenAI integration: Integrated OpenAI into EVA
  • โฌข G4F.DEV: Added G4F endpoints to free GPT5 usage.
  • โฌข Custom API: Add custom endpoint besides ollama and OpenAI
  • โฌข Automated Reporting: Concise HTML report generation (+ optional PDF via wkhtmltopdf)
  • โฌข CVE Database Integration: Real-time vulnerability data
  • โฌข Visual Attack Maps: Interactive network diagrams such as connections or such, like Kerberos domains and AD devices.
  • โฌก Cloud Integration: AWS/GCP deployment ready
  • โฌก Web Interface: Browser-based EVA dashboard

โจน Legal Notice

๐Ÿšจ IMPORTANT

This tool is for allowed environment only!

โœ… APPROVED USE CASES

CTF (Capture The Flag) competitions

Authorized penetration testing

Security research and laboratory environments

Systems you own or have explicit permission to test

๐Ÿšซ PROHIBITED USE

Unauthorized access to any system

Illegal or malicious activities

Production systems without explicit authorization

Networks you do not own or control

โš ๏ธ DISCLAIMER

I take no responsibility for misuse, illegal activity, or unauthorized use. 
Any and all consequences are the sole responsibility of the user.

โซป License

MIT License

MIT License

Copyright (c) 2026 EVA - Exploit Vector Agent

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

โค๏ธ Support

if you enjoy the project and want to support future development:

Star on GitHub
Follow on GitHub

Buy Me a Coffee at ko-fi.com


Hack the world. Byte by Byte. โ››

๐บ๐—ฟ๐—ฐ๐—ฎ๐—ป๐—ด๐—ฒ๐—น๐—ผ @ 2026

[๊‹ง]


โš ๏ธ Remember: With great power comes great responsibility. Use this tool ethically and legally.

Yorumlar (0)

Sonuc bulunamadi