<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Michael Mboya</title>
    <description>The latest articles on Forem by Michael Mboya (@michael_mboya).</description>
    <link>https://forem.com/michael_mboya</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3934401%2F34f0f2e9-c500-4d3d-9a44-972b22d701e8.png</url>
      <title>Forem: Michael Mboya</title>
      <link>https://forem.com/michael_mboya</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/michael_mboya"/>
    <language>en</language>
    <item>
      <title>I Built an AI That Fingerprints Better Than Any Pentesting Tool</title>
      <dc:creator>Michael Mboya</dc:creator>
      <pubDate>Thu, 21 May 2026 11:17:41 +0000</pubDate>
      <link>https://forem.com/michael_mboya/i-built-an-ai-that-fingerprints-better-than-any-pentesting-tool-1f11</link>
      <guid>https://forem.com/michael_mboya/i-built-an-ai-that-fingerprints-better-than-any-pentesting-tool-1f11</guid>
      <description>&lt;h1&gt;
  
  
  I Built an AI That Fingerprints Better Than Any Pentesting Tool
&lt;/h1&gt;

&lt;h2&gt;
  
  
  What happens when a pentesting tool actually understands what it's seeing?
&lt;/h2&gt;

&lt;p&gt;Most fingerprinting tools tell you surface-level information. Nmap tells you the OS. WhatWeb tells you the web server. Wappalyzer tells you the JavaScript framework.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;They each see one piece of the puzzle. None of them connect the dots.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I built Prometheus — an autonomous AI pentesting framework — and in the process, created something unexpected: a fingerprinting engine that doesn't just collect data, but &lt;strong&gt;builds intelligence&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem with Traditional Tools
&lt;/h2&gt;

&lt;p&gt;A standard workflow looks like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sV&lt;/span&gt; target.com      &lt;span class="c"&gt;# OS? Linux. Ports? 80, 443.&lt;/span&gt;
whatweb target.com       &lt;span class="c"&gt;# Apache? WordPress? jQuery?&lt;/span&gt;
nikto &lt;span class="nt"&gt;-h&lt;/span&gt; target.com      &lt;span class="c"&gt;# Any known vulnerabilities?&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Three tools. Three separate outputs. No connections between them.&lt;/p&gt;

&lt;p&gt;The human pentester has to manually connect: "Oh, Apache 2.4 means CVE-2021-41773 might work."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prometheus does this automatically.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What Prometheus Extracts
&lt;/h2&gt;

&lt;p&gt;When pointed at a target, it doesn't just scan ports. It builds a complete intelligence profile:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Network Layer (Traditional)
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;OS Fingerprint: Solaris/BSD (TTL=255)
Open ports: 80 (HTTP), 8443 (HTTPS)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  2. Service Layer (Enhanced)
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;Product&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Sangfor SSL VPN / IAM&lt;/span&gt;
&lt;span class="na"&gt;Build&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;websph120&lt;/span&gt;
&lt;span class="na"&gt;Build date&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;2022-04-21&lt;/span&gt;
&lt;span class="na"&gt;Framework&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Vue.js + Element UI&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now we know exactly what we're attacking — not just "web server."&lt;/p&gt;

&lt;h3&gt;
  
  
  3. JavaScript Analysis (The Game Changer)
&lt;/h3&gt;

&lt;p&gt;Prometheus fetches and parses every JavaScript file it finds. This reveals:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hidden API endpoints not in the HTML:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/api/vpn/user/login
/cgi-bin/backup.conf
/ui/login
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Authentication parameters:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight csvs"&gt;&lt;code&gt;&lt;span class="k"&gt;username&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="k"&gt;password&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="k"&gt;captcha&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="k"&gt;token&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Response code meanings (decoded from switch statements):&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;200: Success / Login OK
508: Invalid credentials
308: Second factor required (credentials valid!)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This tells us how the application thinks — without ever logging in.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Source Map Analysis (The Gold Mine)
&lt;/h3&gt;

&lt;p&gt;When source maps are exposed (common in misconfigured production apps), Prometheus extracts:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Source map reveals 847 source files
Internal IP found: 10.0.0.25
Internal hostname: dev-api.internal.company.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Developer IPs. Internal hostnames. Hidden services. All from public JavaScript files.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Vulnerability Matching
&lt;/h3&gt;

&lt;p&gt;With product, version, and build number identified:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Known vulnerability: Sangfor SSL VPN RCE (CVE-2022-3632)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No manual CVE searching. No guesswork.&lt;/p&gt;

&lt;h3&gt;
  
  
  6. Attack Chain Generation
&lt;/h3&gt;

&lt;p&gt;The Central Nervous System automatically builds a targeted attack strategy:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;Phase 1&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;sangfor_attack_chain (Sangfor-specific exploits)&lt;/span&gt;
&lt;span class="na"&gt;Phase 2&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;web_attack_chain (SQLi, command injection)&lt;/span&gt;
&lt;span class="na"&gt;Phase 3&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;universal_exploitation (protocol-agnostic)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  The Comparison
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Capability&lt;/th&gt;
&lt;th&gt;Nmap&lt;/th&gt;
&lt;th&gt;WhatWeb&lt;/th&gt;
&lt;th&gt;Wappalyzer&lt;/th&gt;
&lt;th&gt;&lt;strong&gt;Prometheus&lt;/strong&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;OS detection&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Service versions&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Product identification&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Build number extraction&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hidden API endpoints&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Source map parsing&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Internal IP discovery&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CVE matching&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Attack chain generation&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Why This Matters
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What takes a human pentester hours — scanning, browsing, viewing source, analyzing JS, searching CVEs — Prometheus does in seconds.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Not because it's faster at running commands. Because it &lt;strong&gt;understands&lt;/strong&gt; what it's seeing.&lt;/p&gt;

&lt;p&gt;It reads JavaScript not as text, but as a map of the application's internal structure. It parses source maps not as comments, but as blueprints of the development environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This is not fingerprinting. This is intelligence gathering at machine speed.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Stack
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;17,000+ lines of Python&lt;/li&gt;
&lt;li&gt;Central Nervous System architecture (perception → understanding → planning → execution → reflection)&lt;/li&gt;
&lt;li&gt;30+ attack modules&lt;/li&gt;
&lt;li&gt;Self-modifying code (can rewrite itself based on findings)&lt;/li&gt;
&lt;li&gt;No external APIs. No cloud dependencies. Runs entirely locally.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Result
&lt;/h2&gt;

&lt;p&gt;A fingerprinting engine that tells you not just what's running, but:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What product and version (Sangfor SSL VPN, build 120)&lt;/li&gt;
&lt;li&gt;When it was built (April 2022)&lt;/li&gt;
&lt;li&gt;What framework it uses (Vue.js + Element UI)&lt;/li&gt;
&lt;li&gt;Hidden API endpoints (/cgi-bin/backup.conf)&lt;/li&gt;
&lt;li&gt;What parameters it expects (username, password, captcha)&lt;/li&gt;
&lt;li&gt;What response codes mean (200=success, 508=invalid credentials)&lt;/li&gt;
&lt;li&gt;Internal infrastructure (10.0.0.25, dev-api.internal)&lt;/li&gt;
&lt;li&gt;Known CVEs (CVE-2022-3632)&lt;/li&gt;
&lt;li&gt;Which exploits to try&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;All from public information. All automated. All in seconds.&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Built by a solo developer from Nairobi. 17,000+ lines. One file. One mind.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to see it in action? Check out the logs below.&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How I Built an AI That Discovers Zero-Days Autonomously</title>
      <dc:creator>Michael Mboya</dc:creator>
      <pubDate>Mon, 18 May 2026 20:40:06 +0000</pubDate>
      <link>https://forem.com/michael_mboya/how-i-built-an-ai-that-discovers-zero-days-autonomously-k3n</link>
      <guid>https://forem.com/michael_mboya/how-i-built-an-ai-that-discovers-zero-days-autonomously-k3n</guid>
      <description>&lt;h1&gt;
  
  
  How I Built an AI That Discovers Zero-Days Autonomously
&lt;/h1&gt;

&lt;h2&gt;
  
  
  The Problem
&lt;/h2&gt;

&lt;p&gt;Penetration testing is broken. A human pentester can try maybe 15-20 techniques before mental fatigue sets in. They forget lessons between engagements. They repeat mistakes. They cost companies $10,000-$50,000 per test and take weeks to deliver results.&lt;/p&gt;

&lt;p&gt;But the real problem is deeper. Every pentesting tool ever built does exactly what it's told. SQLmap does SQL injection. Nmap does port scanning. Metasploit runs pre-written exploits. None of them THINK. None of them LEARN. None of them ADAPT.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Question
&lt;/h2&gt;

&lt;p&gt;What if you could build a system that wakes up, studies a target, selects the right tools for THAT specific target, remembers what worked and what failed, queries the world's vulnerability databases in real-time, discovers new vulnerabilities through mathematical analysis, and never gives up until it finds a way in?&lt;/p&gt;

&lt;p&gt;What if it could do all of this autonomously - no human choosing attacks, no pre-written scripts, no fixed decision tree?&lt;/p&gt;

&lt;p&gt;That's what I set out to build.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Architecture
&lt;/h2&gt;

&lt;p&gt;The system has several key components that work together as a cognitive engine:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Locksmith:&lt;/strong&gt; Before attacking, it examines the target and selects ONLY the tools that apply. It doesn't try SQL injection on a server with no web forms. It doesn't try Samba exploits on a Windows machine. It scores every tool against the target's fingerprint - OS, open ports, services, web technologies - and picks the highest-scoring ones. A Metasploitable-style VM with 22 open backdoors gets a different strategy than a hardened router with 3 ports.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Memory:&lt;/strong&gt; Every success and failure is stored with the target's fingerprint. When the system encounters a machine it's seen before, it recognizes it instantly and runs the known working exploit in under a second. When it encounters a NEW target that's SIMILAR to one it's cracked, it prioritizes the techniques that worked on the similar target. It also blacklists techniques that repeatedly fail on specific target types - so it never wastes time running the same failing attack twice.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Global Intelligence Network:&lt;/strong&gt; During an attack, the system queries live CVE databases (NVD), ExploitDB, GitHub Security Advisories, and Packet Storm in real-time. It filters results by the target's exact software versions and immediately tries matching exploits. It's not limited to what's installed locally - it has access to the entire world's vulnerability knowledge.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Oracle:&lt;/strong&gt; For unknown services, the system builds a mathematical model of the target's behavior. It collects input-output pairs, calculates entropy and response patterns, identifies boundary conditions, and predicts exactly where crashes will occur. It then generates polymorphic shellcode and delivers it at the predicted boundary. No signatures. No databases. Pure mathematical vulnerability prediction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Synthesis Engine:&lt;/strong&gt; When all known exploits fail, the system doesn't give up. It analyzes WHY they failed, identifies patterns in the failures, and synthesizes entirely new approaches. It might discover that crashing one service opens another. It might find that resource exhaustion weakens authentication. It creates attack chains no human would think to try.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Discovery
&lt;/h2&gt;

&lt;p&gt;During testing against a WordPress-based CTF machine (Mr Robot), something unexpected happened.&lt;/p&gt;

&lt;p&gt;Every known technique failed. SQL injection bypassed the login but gave no admin access. WordPress brute force couldn't find the password fast enough in a 7-million-word dictionary. The Easter egg hunter found nothing. The Oracle found no boundary conditions on the web server.&lt;/p&gt;

&lt;p&gt;Then the system tried a resource exhaustion attack - overwhelming the target with connections, flooding memory, bombing processes. The target survived. But when it came back, something had changed.&lt;/p&gt;

&lt;p&gt;The post-crash recovery state accepted &lt;code&gt;admin:admin&lt;/code&gt; as valid credentials.&lt;/p&gt;

&lt;p&gt;This wasn't the real Mr Robot password (which is &lt;code&gt;elliot:ER28-0652&lt;/code&gt;). This was something different - a state-based authentication bypass induced by controlled chaos. The authentication mechanism, stressed by resource exhaustion, defaulted to a less secure state during recovery.&lt;/p&gt;

&lt;p&gt;The system confirmed this three separate times across different runs. Each time, the chaos weakened the target. Each time, &lt;code&gt;admin:admin&lt;/code&gt; worked in the recovery window.&lt;/p&gt;

&lt;p&gt;This vulnerability isn't in any CVE database. No signature detects it. No human pentester would think to try it - "overwhelm the server, then try admin:admin" is not in any playbook. But the system found it because it doesn't think like a human. It tries everything, observes the results, and finds the gaps.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Makes This Different
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Autonomous decision-making:&lt;/strong&gt; The system doesn't follow a script. It analyzes the target and decides what to do. On Metasploitable, it goes for backdoors. On Kioptrix, it goes for SQL injection. On Brainpan, it goes for buffer overflows. On WordPress, it goes for brute force. On unknown targets, it synthesizes new approaches.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cross-target learning:&lt;/strong&gt; Every engagement makes the system smarter. It remembers what worked on Metasploitable and applies those lessons to similar targets. It remembers what failed on TP-Link routers and never tries those techniques on routers again.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Real-time global intelligence:&lt;/strong&gt; It doesn't just use what's installed locally. It queries the entire world's vulnerability knowledge during attacks and immediately tries matching exploits.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero-day discovery:&lt;/strong&gt; It found a genuine authentication bypass that no human had documented. Not by being smarter than humans, but by being more persistent. It tried things no human would think to try because no human has the patience to try 50 different attack types in sequence.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Results
&lt;/h2&gt;

&lt;p&gt;Five completely different targets. Five different attack strategies. Five shells.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Target Type&lt;/th&gt;
&lt;th&gt;Attack Method&lt;/th&gt;
&lt;th&gt;Time to Shell&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Metasploitable 2&lt;/td&gt;
&lt;td&gt;Backdoor exploitation&lt;/td&gt;
&lt;td&gt;&amp;lt; 1 second&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Kioptrix 2&lt;/td&gt;
&lt;td&gt;SQL injection → RCE&lt;/td&gt;
&lt;td&gt;4 seconds&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Brainpan&lt;/td&gt;
&lt;td&gt;Buffer overflow&lt;/td&gt;
&lt;td&gt;4 seconds&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Kioptrix 1&lt;/td&gt;
&lt;td&gt;Samba exploit&lt;/td&gt;
&lt;td&gt;Autonomous&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Mr Robot&lt;/td&gt;
&lt;td&gt;Zero-day auth bypass&lt;/td&gt;
&lt;td&gt;30 minutes&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;One hardened TP-Link router resisted everything - proving the system correctly identifies secure targets.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters
&lt;/h2&gt;

&lt;p&gt;This isn't about building a "hacking tool." It's about proving that autonomous security testing is possible. That a system can think, learn, adapt, and discover without human guidance. That the gap between "running a script" and "conducting a penetration test" can be closed by artificial intelligence.&lt;/p&gt;

&lt;p&gt;The implications go beyond offensive security. If we can build systems that autonomously find vulnerabilities, we can also build systems that autonomously patch them. The same cognitive engine that selects exploits could select defenses. The same memory that remembers attacks could remember mitigations.&lt;/p&gt;

&lt;p&gt;We're not there yet. But this is a step toward that future.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;The author is a security researcher who built this system as a proof of concept for autonomous vulnerability discovery. The code is not publicly available. Research inquiries welcome.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>webdev</category>
      <category>programming</category>
      <category>python</category>
    </item>
    <item>
      <title>I Built a 14-Blade Pentesting Framework at 22 — Here's What I Learned</title>
      <dc:creator>Michael Mboya</dc:creator>
      <pubDate>Sat, 16 May 2026 07:29:58 +0000</pubDate>
      <link>https://forem.com/michael_mboya/i-built-a-14-blade-pentesting-framework-at-22-heres-what-i-learned-3g2a</link>
      <guid>https://forem.com/michael_mboya/i-built-a-14-blade-pentesting-framework-at-22-heres-what-i-learned-3g2a</guid>
      <description>&lt;h1&gt;
  
  
  I Built a 14-Blade Pentesting Framework at 22 — Here's What I Learned
&lt;/h1&gt;

&lt;p&gt;I'm a third-year telecommunications engineering student in Kenya. I'm also a self-taught penetration tester. A few months ago, I got tired of running 15 different tools manually for every security assessment. So I built something to fix that.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;Pentest CoPilot — a 14-blade Swiss Army Knife for penetration testing. 26 tools covering the entire kill chain from reconnaissance to reporting.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Full Arsenal
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Blade 1: Reconnaissance&lt;/strong&gt; — AI-powered scanning. Ports, hidden directories, subdomains, CMS detection, URL parameters. Local AI (Ollama/LLaMA 3.2) correlates findings and generates an attack matrix with specific CVEs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 2: API Discovery&lt;/strong&gt; — Detects REST (Swagger/OpenAPI), GraphQL (introspection queries), gRPC (reflection), WebSocket endpoints, and SOAP (WSDL enumeration). Finds what most scanners miss.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 3: Credential Extraction&lt;/strong&gt; — Pulls API keys, access tokens, internal IP addresses, database connection strings, and configuration paths from exposed endpoints.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 4: Vulnerability Mapping&lt;/strong&gt; — Full kill chain analysis. Maps initial access vectors through privilege escalation to root exploitation. Kernel-level firewall mapping with ICMP tunneling detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 5: Server Exploitation (7 Types)&lt;/strong&gt; — Auto-detects and exploits: Kestrel/.NET, Apache Tomcat, Node.js/Express, PHP/Apache, Python Flask/Django, IIS/.NET, and Nginx. Each has a dedicated exploit script.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 6: Database Exploitation (7 Types)&lt;/strong&gt; — MySQL (empty root, UDF escalation), PostgreSQL (COPY FROM PROGRAM RCE), MSSQL (xp_cmdshell), MongoDB (no-auth dump), Redis (SSH key injection), Oracle (default credentials), Elasticsearch (no-auth index dump).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 7: Firewall Bypass &amp;amp; Reverse Shell Arsenal&lt;/strong&gt; — Custom TCP fragmentation engine splits payloads into tiny pieces to evade inspection. 12 payload types including SQL injection, buffer overflow, and command injection. Reverse shell generator supporting 8 languages (Bash, Python, Netcat, PHP, Perl, Ruby, PowerShell, Netcat+Mkfifo). "Bombard" mode fires all 8 shells simultaneously.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 8: Lateral Movement&lt;/strong&gt; — Internal subnet scanner for 172.x, 10.x, and 192.168.x ranges. Pivot fragmenter for routing attacks through compromised hosts. CGI dropper for web shell deployment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 9: Privilege Escalation&lt;/strong&gt; — 8 Linux vectors (sudo, SUID, kernel exploits, cron, writable paths, capabilities, SSH keys, password files) and 7 Windows vectors (token privileges, unquoted service paths, AlwaysInstallElevated, registry credentials, scheduled tasks, stored credentials, UAC bypass).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 10: Exfiltration&lt;/strong&gt; — 8 data collection modules (credentials, databases, private keys, source code, network info, browser data, full package). 6 exfiltration methods (HTTP, Netcat, Base64, SCP, DNS tunneling, ICMP tunneling).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 11: Persistence&lt;/strong&gt; — 8 Linux backdoors (SSH key, cron, systemd, bashrc, MOTD, PAM backdoor, LD_PRELOAD, hidden user) and 6 Windows backdoors (scheduled task, registry run, WMI subscription, startup folder, service, hidden admin).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 12: Cleanup&lt;/strong&gt; — 12 Linux cleanup steps (bash history, SSH backdoor, cron jobs, systemd services, bashrc, MOTD, hidden user, LD_PRELOAD, system logs, web server logs, temp files, memory) and 8 Windows cleanup steps.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 13: Reporting&lt;/strong&gt; — Generates professional PDF reports with executive summary, technical findings, attack vector matrix, and remediation recommendations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blade 14: Master Compiler&lt;/strong&gt; — One command runs all 13 phases automatically. Generates a timestamped report directory with every finding organized and documented.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Makes It Different
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Local AI — No Cloud, No API Keys.&lt;/strong&gt; Most security tools that claim "AI" send your data to OpenAI. Mine runs LLaMA 3.2 locally via Ollama. Your targets stay on your machine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fragmentation Engine.&lt;/strong&gt; I built a custom TCP fragmentation engine that splits payloads into tiny pieces to bypass firewalls. It's not magic — it's packet crafting with Scapy. But it works against production firewalls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One Directory. Everything Included.&lt;/strong&gt; No Docker, no databases, no complex setup. Clone the repo, run the installer, and you have a complete pentesting arsenal.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Learned
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Build for yourself first.&lt;/strong&gt; I built this because I needed it. That's why it's actually useful — not just a portfolio piece.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI is a force multiplier.&lt;/strong&gt; Ollama analyzes scan results and generates attack matrices with specific CVEs. What took 2 hours of manual correlation now takes seconds.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shipping beats perfection.&lt;/strong&gt; The first version was buggy. The current version works against production targets. I shipped, tested, fixed, and repeated.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Your portfolio is your degree.&lt;/strong&gt; I don't have a cybersecurity degree. I have a GitHub repo that proves I can build, test, and document a complex security tool spanning the entire kill chain.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's Next
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Add Nuclei template scanning for automated vulnerability validation&lt;/li&gt;
&lt;li&gt;Build a web dashboard for real-time engagement monitoring&lt;/li&gt;
&lt;li&gt;Turn it into a SaaS platform for Kenyan SMEs who can't afford enterprise security tools&lt;/li&gt;
&lt;li&gt;Add collaborative features for red team operations&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Advice for Other Self-Taught Developers
&lt;/h2&gt;

&lt;p&gt;Stop waiting for permission. Build something that solves your own problem. Document it thoroughly. Ship it publicly. The platform you need doesn't exist yet — so build that too.&lt;/p&gt;

&lt;p&gt;The difference between a "hacker" and a "security researcher" is often just permission and a paycheck. Same skills. Same mindset. Build the bridge between them.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/michaelmboya149-lab/PentestCoPilot-Swiss-army-knife" rel="noopener noreferrer"&gt;github.com/michaelmboya149-lab/PentestCoPilot-Swiss-army-knife&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;I'm looking for:&lt;/strong&gt; Security engineering roles, pentesting opportunities, and collaborators in the Kenyan infosec space. If you're building in this space, let's talk.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>python</category>
      <category>webtesting</category>
    </item>
  </channel>
</rss>
