> cat /dev/github | grep security-tools
discovered 30 Mar 2026

redamon

Python โ˜… 1672 via github-topic
โ†’ View on GitHub

AI Summary: RedAmon is an autonomous AI framework designed for seamless cybersecurity operations that integrate reconnaissance, exploitation, and post-exploitation processes into a streamlined pipeline. It stands out by automatically triaging findings, applying code fixes, and generating pull requests in repositories, ensuring human oversight at critical junctures. Its notable features include support for over 38 security tools, integration with major vulnerability scanners, and configurable autonomy to adapt to various security assessment needs.


README

RedAmon Logo
RedAmon
Unmask the hidden before the world does

An autonomous AI framework that chains reconnaissance, exploitation, and post-exploitation into a single pipeline, then goes further by triaging every finding, implementing code fixes, and opening pull requests on your repository. From first packet to merged patch, with human oversight at every critical step.


GitHub Stars Version 3.1.4 Security Tool Warning MIT License End-to-End Pipeline AI Powered Configurable Autonomy Kali Powered Docker IP/CIDR Targeting 38+ Security Tools 185,000+ Detection Rules 196+ Settings 400+ AI Models Local Models Support Metasploit Framework OpenVAS Scanner Nmap Scanner Nuclei Scanner SQLMap Hydra Credential Testing CypherFix Auto Remediation AI Pentest Reports RoE Guardrails Wiki Documentation

LEGAL DISCLAIMER: This tool is intended for authorized security testing, educational purposes, and research only. Never use this system to scan, probe, or attack any system you do not own or have explicit written permission to test. Unauthorized access is illegal and punishable by law. By using this tool, you accept full responsibility for your actions. Read Full Disclaimer

RedAmon Agent Demo

Watch Demo

Three AI agents test in parallel โ€” one validates credential policies via Hydra, one verifies a CVE exploit path through privilege escalation, one maps XSS vulnerabilities across the frontend.


Offense meets defense โ€” one pipeline, full visibility.

Reconnaissance โžœ Exploitation โžœ Post-Exploitation โžœ AI Triage โžœ CodeFix Agent โžœ GitHub PR

RedAmon doesn't stop at finding vulnerabilities, it fixes them. The pipeline starts with a 6-phase reconnaissance engine that maps your target's entire attack surface, then hands control to an autonomous AI agent that validates CVE exploitability, tests credential policies, and maps lateral movement paths. Every finding is recorded in a Neo4j knowledge graph. When the offensive phase completes, CypherFix takes over: an AI triage agent correlates hundreds of findings, deduplicates them, and ranks them by exploitability. Then a CodeFix agent clones your repository, navigates the codebase with 11 code-aware tools, implements targeted fixes, and opens a GitHub pull request, ready for review and merge.

CypherFix demo


Roadmap & Community Contributions

We maintain a public Project Board with upcoming features open for community contributions. Pick a task and submit a PR!

Want to contribute? See CONTRIBUTING.md for how to get started.

Maintainers

Samuele Giampieri
Samuele Giampieri โ€” Creator, Maintainer & AI Platform Architect

AI Platform Architect & Full-Stack Lead with 15+ years of freelancing experience and more than 30 projects shipped to production, including enterprise-scale AI agentic systems. AWS-certified (DevOps Engineer, ML Specialty) and IBM-certified AI Engineer. Designs end-to-end ML solutions spanning deep learning, NLP, Computer Vision, and AI Agent systems with LangChain/LangGraph.

LinkedIn ยท GitHub ยท Devergo Labs
Ritesh Gohil
Ritesh Gohil โ€” Maintainer & Lead Security Researcher

Cyber Security Engineer at Workday with over 7 years of experience in Web, API, Mobile, Network, and Cloud penetration testing. Published 11 CVEs in MITRE, with security acknowledgements from Google (4ร—) and Apple (6ร—). Secured 200+ web and mobile applications and contributed to Exploit Database, Google Hacking Database, and the AWS Community. Holds AWS Security Specialty, eWPTXv2, eCPPTv2, CRTP, and CEH certifications with expertise in red teaming, cloud security, CVE research, and security architecture review.

LinkedIn ยท GitHub

Quick Start

Prerequisites

That’s it. No Node.js, Python, or security tools needed on your host.

Minimum System Requirements

ResourceWithout OpenVASWith OpenVAS (full stack)
CPU2 cores4 cores
RAM4 GB8 GB (16 GB recommended)
Disk20 GB free50 GB free

Without OpenVAS runs 6 containers: webapp, postgres, neo4j, agent, kali-sandbox, recon-orchestrator. With OpenVAS adds 4 more runtime containers (gvmd, ospd-openvas, gvm-postgres, gvm-redis) plus ~8 one-shot data-init containers for vulnerability feeds (~170K+ NVTs). First launch takes ~30 minutes for GVM feed synchronization. Dynamic recon and scan containers are spawned on-demand during operations and require additional resources.

1. Clone & Install

git clone https://github.com/samugit83/redamon.git
cd redamon

# Without GVM (lighter, faster startup):
./redamon.sh install

# With GVM / OpenVAS (full stack, ~30 min first run):
./redamon.sh install --gvm

The script builds all images and starts the services. When done, open http://localhost:3000.

2. Configure

Open http://localhost:3000/settings (gear icon in the header) to configure everything. No .env file is needed.

  • LLM Providers – add API keys for OpenAI, Anthropic, OpenRouter, AWS Bedrock, or any OpenAI-compatible endpoint (Ollama, vLLM, Groq, etc.). Each provider can be tested before saving. The model selector in project settings dynamically fetches available models from configured providers.
  • API Keys – Tavily, Shodan, SerpAPI, NVD, Vulners, URLScan, and threat intelligence keys (Censys, FOFA, OTX, Netlas, VirusTotal, ZoomEye, CriminalIP) to enable extended agent capabilities (web search, OSINT, CVE lookups, passive threat intel). Supports key rotation – configure multiple keys per tool with automatic round-robin rotation to avoid rate limits.
  • Tunneling – configure ngrok or chisel for reverse shell tunneling. Changes apply immediately without container restarts.

All settings are stored per-user in the database. See the AI Model Providers wiki page for detailed setup instructions.

3. Open the Webapp

Go to http://localhost:3000 – create a project, configure your target, and start scanning.

For a detailed walkthrough of every feature, check the Wiki.

Having issues? See the Troubleshooting guide or the Wiki Troubleshooting page.

Management Commands

All lifecycle management is handled by a single script:

CommandDescription
./redamon.sh installBuild + start without GVM
./redamon.sh install --gvmBuild + start with GVM/OpenVAS
./redamon.sh updatePull latest version, smart-rebuild only changed services
./redamon.sh upStart services (auto-detects GVM mode)
./redamon.sh downStop services (preserves data)
./redamon.sh statusShow running services, version, GVM mode
./redamon.sh cleanRemove containers + images, keep data
./redamon.sh purgeRemove everything including all data

Updating to a New Version

Just run:

./redamon.sh update

The script pulls the latest code from GitHub, detects which Dockerfiles and source files changed, rebuilds only the affected images, and restarts the updated services. Your databases, scan results, and reports are preserved – volumes are never deleted.

The webapp also checks for updates automatically and shows a notification in the UI when a new version is available.

Development Mode

For contributors and active development with Next.js fast refresh:

Build tool images:

docker compose --profile tools build

Start dev environment (without GVM):

docker compose -f docker-compose.yml -f docker-compose.dev.yml up -d postgres neo4j recon-orchestrator kali-sandbox agent webapp

Start dev environment (with GVM):

docker compose -f docker-compose.yml -f docker-compose.dev.yml up -d

The dev override swaps the production webapp image for a dev container with your source code volume-mounted. Every file save triggers instant hot-reload in the browser.

When to Rebuild vs Restart

What changedAction needed
webapp/src/ (frontend code)Nothing – Next.js hot-reload handles it in dev mode
agentic/*.py (agent Python code)docker compose restart agent
recon_orchestrator/*.pydocker compose restart recon-orchestrator
mcp/servers/*.py (MCP servers)docker compose restart kali-sandbox
agentic/Dockerfile or agentic/requirements.txtdocker compose build agent && docker compose up -d agent
recon_orchestrator/Dockerfile or its requirements.txtdocker compose build recon-orchestrator && docker compose up -d recon-orchestrator
mcp/kali-sandbox/Dockerfiledocker compose build kali-sandbox && docker compose up -d kali-sandbox
webapp/Dockerfile or webapp/package.jsondocker compose build webapp && docker compose up -d webapp
recon/Dockerfiledocker compose --profile tools build recon
gvm_scan/Dockerfiledocker compose --profile tools build vuln-scanner
github_secret_hunt/Dockerfiledocker compose --profile tools build github-secret-hunter
trufflehog_scan/Dockerfiledocker compose --profile tools build trufflehog-scanner
docker-compose.ymldocker compose up -d (re-creates affected containers)
prisma/schema.prismadocker compose exec webapp npx prisma db push

Rebuild a single service:

docker compose build <service>                    # Rebuild one image
docker compose up -d --no-deps <service>          # Restart only that service

Common dev commands:

docker compose ps                                 # Check service status
docker compose logs -f <service>                  # Follow logs for a service
docker compose down                               # Stop all (preserves volumes)
docker compose --profile tools down --rmi local   # Remove built images
docker compose --profile tools down --rmi local --volumes --remove-orphans  # Full cleanup

For a complete development reference – hot-reload rules, common commands, important rules, and AI-assisted coding guidelines – see the Developer Guide.


Table of Contents


Overview

RedAmon is a modular, containerized penetration testing framework that chains automated reconnaissance, AI-driven exploitation, and graph-powered intelligence into a single, end-to-end offensive security pipeline. Every component runs inside Docker โ€” no tools installed on your host โ€” and communicates through well-defined APIs so each layer can evolve independently.

The platform is built around six pillars:

PillarWhat it does
Reconnaissance PipelineA parallelized fan-out / fan-in scanning pipeline that maps your target’s entire attack surface โ€” starting from a domain or IP addresses / CIDR ranges โ€” from subdomain discovery (5 concurrent tools) through port scanning, Nmap service detection and NSE vulnerability scripts, HTTP probing, resource enumeration, and vulnerability detection. Independent modules run concurrently via ThreadPoolExecutor, graph DB updates happen in a background thread, and results are stored as a rich, queryable graph. Complemented by standalone GVM network scanning, GitHub secret hunting, and TruffleHog deep secret scanning modules.
AI Agent OrchestratorA LangGraph-based autonomous agent that reasons about the graph, selects security tools via MCP, transitions through informational / exploitation / post-exploitation phases, and can be steered in real-time via chat.
Attack Surface GraphA Neo4j knowledge graph with 17 node types and 20+ relationship types that serves as the single source of truth for every finding โ€” and the primary data source the AI agent queries before every decision.
EvoGraphA persistent, evolutionary attack chain graph in Neo4j that tracks every step, finding, decision, and failure across the attack lifecycle โ€” bridging the recon graph and enabling cross-session intelligence accumulation.
CypherFixAutomated vulnerability remediation pipeline โ€” an AI triage agent correlates and prioritizes findings from the graph, then a CodeFix agent clones the target repository, implements fixes using a ReAct loop with 11 code tools, and opens a GitHub pull request.
Project Settings Engine196+ per-project parameters โ€” exposed through the webapp UI โ€” that control every tool’s behavior, from Naabu thread counts to Nuclei severity filters to agent approval gates.

Feature Highlights

Reconnaissance Pipeline

A fully automated, parallelized scanning engine running inside a Kali Linux container. Given a root domain, subdomain list, or IP/CIDR ranges, it maps the complete external attack surface using a fan-out / fan-in pipeline architecture: subdomain discovery (crt.sh, HackerTarget, Subfinder, Amass, Knockpy โ€” all 5 tools run concurrently), puredns wildcard filtering (validates subdomains against public DNS resolvers and removes wildcard/poisoned entries), parallel DNS resolution (20 workers), Shodan + port scanning (Masscan / Naabu โ€” both run in parallel), passive threat intelligence enrichment (7 tools: Censys, FOFA, OTX, Netlas, VirusTotal, ZoomEye, CriminalIP โ€” all run in parallel with port scanning) in parallel, Nmap service version detection and NSE vulnerability scripts on discovered ports, HTTP probing with technology fingerprinting (httpx + Wappalyzer), resource enumeration (Katana, Hakrawler, GAU, ParamSpider, Kiterunner โ€” internally parallel, followed by jsluice JavaScript analysis, FFuf directory fuzzing with custom wordlist support, and Arjun hidden parameter discovery with multi-method parallel execution), and vulnerability scanning (Nuclei with 9,000+ templates + DAST fuzzing). Neo4j graph updates run in a dedicated background thread so the main pipeline is never blocked. Results are stored as JSON and imported into the Neo4j graph.

Wiki: Running Reconnaissance | Technical: README.RECON.md

RedAmon Reconnaissance Pipeline

Settings TabPhaseToolsTypeExecution
Discovery & OSINTSubdomain Discoverycrt.sh, HackerTarget, Subfinder, Amass, KnockpyPassive*5 tools parallel
Wildcard FilteringPurednsActiveSequential
WHOIS + URLScanpython-whois, URLScan.io APIPassiveParallel
DNS ResolutiondnspythonPassive20 parallel workers
OSINT EnrichmentShodan / InternetDBPassiveParallel with port scan
Threat Intel EnrichmentCensys, FOFA, OTX (AlienVault), Netlas, VirusTotal, ZoomEye, CriminalIPPassive7 tools parallel (GROUP 3b)
Port ScanningPort ScanningMasscan, NaabuActiveBoth parallel
Nmap Service DetectionService Version DetectionNmap (-sV, –script vuln)ActiveSequential per target
HTTP ProbingHTTP ProbinghttpxActiveInternal parallel
Tech DetectionWappalyzerPassiveSequential (post-probe)
Banner GrabbingCustom (Python sockets: SSH, FTP, SMTP, MySQL, etc.)ActiveParallel workers
Resource EnumWeb CrawlingKatana, HakrawlerActiveParallel
Archive DiscoveryGAU (Wayback, CommonCrawl, OTX)PassiveParallel with crawlers
Parameter MiningParamSpider (Wayback CDX)PassiveParallel with crawlers
JS AnalysisjsluicePassiveSequential (post-crawl)
Directory FuzzingFFufActiveSequential (post-jsluice)
Parameter DiscoveryArjunActiveMethods parallel (GET/POST/JSON/XML)
API DiscoveryKiterunnerActiveSequential per wordlist
Vulnerability ScanningVulnerability ScanningNuclei (9,000+ templates + DAST + custom template upload)ActiveInternal parallel
Security ChecksSecurity ChecksWAF bypass, direct IP access, TLS expiry, missing headers, cache-controlActiveParallel workers
CVE & MITRECVE EnrichmentNVD API, Vulners APIPassiveSequential
MITRE EnrichmentCWE / CAPEC mappingPassiveSequential

*Amass can run in active mode when configured. Knockpy performs active DNS probing.

GVM Vulnerability Scanner

GVM/OpenVAS performs deep network-level vulnerability assessment with 170,000+ NVTs โ€” probing services at the protocol layer for misconfigurations, outdated software, default credentials, and known CVEs. Complements Nuclei’s web-layer findings. Seven pre-configured scan profiles from quick host discovery (~2 min) to exhaustive deep scanning (~8 hours). Findings are stored as Vulnerability nodes in Neo4j alongside the recon graph.

Wiki: GVM Vulnerability Scanning | Technical: README.GVM.md

AI Agent Orchestrator

A LangGraph-based autonomous agent implementing the ReAct pattern. It progresses through three phases โ€” Informational (intelligence gathering, graph queries, Shodan, Google dorking), Exploitation (Metasploit, Hydra credential testing, social engineering simulation), and Post-Exploitation (enumeration, lateral movement). The agent executes 13 security tools via MCP servers inside a Kali sandbox, supports parallel tool execution via Wave Runner, and provides real-time chat interaction with guidance, stop/resume, and approval workflows. Deep Think mode enables structured strategic analysis before acting.

Wiki: AI Agent Guide | Technical: README.PENTEST_AGENT.md

RedAmon Exploitation Demo

AI Model Providers

Supports 5 providers and 400+ models: OpenAI (GPT-5.2, GPT-5, GPT-4.1), Anthropic (Claude Opus 4.6, Sonnet 4.5), OpenRouter (300+ models), AWS Bedrock, and any OpenAI-compatible endpoint (Ollama, vLLM, LM Studio, Groq, etc.). Models are dynamically fetched โ€” no hardcoded lists.

Wiki: AI Model Providers

Attack Surface Graph

A Neo4j knowledge graph with 17 node types and 20+ relationship types โ€” the single source of truth for the target’s attack surface. The agent queries it before every decision via natural language โ†’ Cypher translation.

Wiki: Attack Surface Graph | Technical: GRAPH.SCHEMA.md

EvoGraph โ€” Attack Chain Evolution

A persistent, evolutionary graph tracking everything the AI agent does โ€” tool executions, discoveries, failures, and strategic decisions. Structured chain context replaces flat execution traces, improving agent efficiency by 25%+. Cross-session memory means the agent never starts from zero.

Wiki: EvoGraph | Technical: README.PENTEST_AGENT.md

Multi-Session Parallel Attack Chains

Launch multiple concurrent agent sessions against the same project. Each session creates its own AttackChain in EvoGraph. New sessions automatically load findings and failure lessons from all prior sessions, avoiding redundant work.

Wiki: AI Agent Guide

Reverse Shells

Unified view of active sessions โ€” meterpreter, reverse/bind shells, and listeners. Built-in terminal with a Command Whisperer that translates plain English into shell commands.

Wiki: Reverse Shells

RedAmon Terminal

Full interactive PTY shell access to the Kali sandbox container directly from the graph page via xterm.js. Access all pre-installed pentesting tools (Metasploit, Nmap, Nuclei, Hydra, sqlmap) without leaving the browser. Features dark terminal theme, connection status indicator, auto-reconnect with exponential backoff, fullscreen mode, and browser-side keepalive.

Wiki: The Graph Dashboard

CypherFix โ€” Automated Vulnerability Remediation

Two-agent pipeline: a Triage Agent runs 9 hardcoded Cypher queries then uses an LLM to correlate, deduplicate, and prioritize findings. A CodeFix Agent clones the target repo, explores the codebase with 11 tools, implements fixes, and opens a GitHub PR โ€” replicating Claude Code’s agentic design.

Wiki: CypherFix | Technical: README.CYPHERFIX_AGENTS.md

Agent Skills

An LLM-powered Intent Router classifies user requests into agent skills: CVE (MSF), SQL Injection, Credential Testing, Social Engineering, Availability Testing, or custom user-defined skills uploaded as Markdown files. Ready-to-use community skills are available for API testing, XSS, SQLi, and SSRF – download the .md file and upload it via Global Settings > Agent Skills to activate it for your user. You can also contribute your own by opening a PR.

Wiki: Agent Skills | Community Skills

GitHub Secret Hunter

Scans GitHub repositories, gists, and commit history for exposed secrets using 40+ regex patterns and Shannon entropy analysis.

Wiki: GitHub Secret Hunting

TruffleHog Deep Secret Scanner

Scans GitHub repositories for leaked credentials using 700+ detectors with automatic verification of whether discovered secrets are still active. Powered by the TruffleHog engine (trufflesecurity/trufflehog), it detects API keys, passwords, tokens, certificates, and more across full commit history. Results are stored as TrufflehogScan โ†’ TrufflehogRepository โ†’ TrufflehogFinding nodes in the Neo4j graph. Both GitHub Hunt and TruffleHog are accessible from the “Other Scans” modal in the graph toolbar.

Project Settings

196+ configurable parameters across 14 tabs controlling every tool’s behavior โ€” from scan modules to agent approval gates. Managed through the webapp UI.

Wiki: Project Settings Reference

RedAmon Project Settings

Rules of Engagement (RoE)

Upload a RoE document (PDF, TXT, MD, DOCX) to auto-configure project settings and enforce engagement constraints. Enforcement at both the recon pipeline (excluded hosts, rate limits, time windows) and AI agent (prompt injection, severity phase cap, tool restrictions) layers.

Wiki: Rules of Engagement

Insights Dashboard

30+ interactive charts across 4 sections โ€” attack chains & exploits, attack surface, vulnerabilities & CVE intelligence, and graph overview. All data pulled live from Neo4j and PostgreSQL.

Wiki: Insights Dashboard

RedAmon Insights Dashboard

Target Guardrail

LLM-based guardrail preventing targeting of unauthorized domains โ€” blocks government sites, major tech companies, financial institutions, and social media platforms. Operates at both project creation and agent initialization. Government, military, educational, and international organization domains (.gov, .mil, .edu, .int) are permanently blocked by a deterministic hard guardrail that cannot be disabled.

Wiki: Creating a Project

Tool Confirmation

Per-tool human-in-the-loop gate for dangerous operations. When enabled, the agent pauses before executing high-impact tools (Nmap, Nuclei, Metasploit, Hydra, Kali shell, code execution) and presents an inline Allow / Deny prompt in the chat timeline. Supports both single-tool and parallel-wave (plan) confirmation modes. Users can approve, reject, or modify tool arguments before execution proceeds. Disabled via the Require Tool Confirmation toggle in Project Settings.

Wiki: Pentest Agent โ€” Tool Confirmation

Pentest Reports

Professional, client-ready HTML reports with 11 sections. When an AI model is configured, 6 sections receive LLM-generated narratives including executive summary, risk analysis, and prioritized remediation triage. View example report.

Wiki: Pentest Reports

Data Export & Import

Full project backup and restore through the web interface โ€” settings, conversations, graph data, recon/GVM/GitHub hunt results as a portable ZIP archive.

Wiki: Data Export & Import


System Architecture

flowchart TB
    subgraph User["๐Ÿ‘ค User Layer"]
        Browser[Web Browser]
        CLI[Terminal/CLI]
    end

    subgraph Frontend["๐Ÿ–ฅ๏ธ Frontend Layer"]
        Webapp[Next.js Webapp<br/>:3000]
    end

    subgraph Backend["โš™๏ธ Backend Layer"]
        Agent[AI Agent Orchestrator<br/>FastAPI + LangGraph<br/>:8090]
        ReconOrch[Recon Orchestrator<br/>FastAPI + Docker SDK<br/>:8010]
    end

    subgraph Tools["๐Ÿ”ง MCP Tools Layer"]
        NetworkRecon[Network Recon Server<br/>Curl + Naabu<br/>:8000]
        Nuclei[Nuclei Server<br/>:8002]
        Metasploit[Metasploit Server<br/>:8003]
        Nmap[Nmap Server<br/>:8004]
    end

    subgraph Scanning["๐Ÿ” Scanning Layer"]
        Recon[Recon Pipeline<br/>Docker Container]
        GVM[GVM/OpenVAS Scanner<br/>Network Vuln Assessment]
        GHHunt[GitHub Secret Hunter<br/>Credential Scanning]
        TruffleHog[TruffleHog Scanner<br/>700+ Secret Detectors]
    end

    subgraph Data["๐Ÿ’พ Data Layer"]
        Neo4j[(Neo4j Graph DB<br/>:7474/:7687)]
        Postgres[(PostgreSQL<br/>Project Settings<br/>:5432)]
    end

    subgraph LLMProviders["๐Ÿง  LLM Providers"]
        OpenAI[OpenAI]
        Anthropic[Anthropic]
        LocalLLM[Local Models<br/>Ollama ยท vLLM ยท LM Studio]
        OpenRouter[OpenRouter<br/>300+ Models]
        Bedrock[AWS Bedrock]
    end

    subgraph External["๐ŸŒ External APIs"]
        GitHubAPI[GitHub API<br/>Repos & Code Search]
    end

    subgraph Targets["๐ŸŽฏ Target Layer"]
        Target[Target Systems]
        GuineaPigs[Guinea Pigs<br/>Test VMs]
    end

    Browser --> Webapp
    CLI --> Recon
    Webapp <-->|WebSocket| Agent
    Webapp -->|REST + SSE| ReconOrch
    Webapp --> Neo4j
    Webapp --> Postgres
    ReconOrch -->|Docker SDK| Recon
    ReconOrch -->|Docker SDK| GVM
    ReconOrch -->|Docker SDK| GHHunt
    ReconOrch -->|Docker SDK| TruffleHog
    Recon -->|Fetch Settings| Webapp
    GHHunt -->|GitHub API| GitHubAPI
    TruffleHog -->|GitHub API| GitHubAPI
    TruffleHog --> Neo4j
    Agent -->|API| OpenAI
    Agent -->|API| Anthropic
    Agent -->|API| LocalLLM
    Agent -->|API| OpenRouter
    Agent -->|API| Bedrock
    Agent --> Neo4j
    Agent -->|MCP Protocol| NetworkRecon
    Agent -->|MCP Protocol| Nuclei
    Agent -->|MCP Protocol| Metasploit
    Agent -->|MCP Protocol| Nmap
    Recon --> Neo4j
    GVM -->|Reads Recon Output| Recon
    GVM --> Neo4j
    GVM --> Target
    GVM --> GuineaPigs
    NetworkRecon --> Target
    Nuclei --> Target
    Metasploit --> Target
    Nmap --> Target
    NetworkRecon --> GuineaPigs
    Nuclei --> GuineaPigs
    Metasploit --> GuineaPigs
    Nmap --> GuineaPigs

Full architecture diagrams (data flow, Docker containers, recon pipeline, agent workflow, MCP integration): ARCHITECTURE.md

Technology stack (70+ technologies across frontend, backend, AI, databases, security tools): TECH_STACK.md


Components

ComponentDescriptionDocumentation
Reconnaissance PipelineParallelized fan-out/fan-in OSINT and vulnerability scanning pipelineREADME.RECON.md
Recon OrchestratorContainer lifecycle management via Docker SDKREADME.RECON_ORCHESTRATOR.md
Graph DatabaseNeo4j attack surface mapping with multi-tenant supportREADME.GRAPH_DB.md ยท GRAPH.SCHEMA.md
MCP Tool ServersSecurity tools via Model Context Protocol (Kali sandbox)README.MCP.md
AI Agent OrchestratorLangGraph-based autonomous agent with ReAct patternREADME.PENTEST_AGENT.md
CypherFix AgentsAutomated triage + code fix + GitHub PRREADME.CYPHERFIX_AGENTS.md
Web ApplicationNext.js dashboard for visualization and AI interactionREADME.WEBAPP.md
GVM ScannerGreenbone/OpenVAS network vulnerability scanner (170K+ NVTs)README.GVM.md
TruffleHog ScannerDeep secret scanning with 700+ detectors and credential verificationโ€”
PostgreSQL DatabaseProject settings, user accounts, configuration dataREADME.POSTGRES.md
Test EnvironmentsIntentionally vulnerable Docker containers for safe testingREADME.GPIGS.md

Documentation

ResourceLink
Full Wiki (user guide)github.com/samugit83/redamon/wiki
AI-Assisted DevelopmentWiki: Ship Perfect PRs with AI
Developer Guidereadmes/README.DEV.md
Architecture Diagramsreadmes/ARCHITECTURE.md
Technology Stackreadmes/TECH_STACK.md
Troubleshootingreadmes/TROUBLESHOOTING.md
ChangelogCHANGELOG.md
Full DisclaimerDISCLAIMER.md
Third-Party LicensesTHIRD-PARTY-LICENSES.md
LicenseLICENSE

Troubleshooting

RedAmon is fully Dockerized and runs on any OS with Docker Compose v2+. For OS-specific fixes (Linux, Windows, macOS), see Troubleshooting Guide or the Wiki.


Community Showcase

Videos, writeups, and real-world experiences from security professionals using RedAmon in the field. Want to be featured? See the Content Creator track in CONTRIBUTING.md.

Videos

TitleLink
RedAmon v2.2.0 โ€” Social Engineering Test: Payload Delivery to Shell AccessWatch
AI Agent CVE Validation โ€” Beyond Standard ToolingWatch
RedAmon 2.0 โ€” From 0 to 1000 GitHub Stars in 10 Days: Multi-Agent Parallel AttacksWatch
Build an Autonomous AI Red Team Agent from Scratch โ€” LangGraph + Metasploit + Neo4j Full TutorialWatch

Real-World Case Studies

WhoWhatLink
Nipun DinudayaDeployed RedAmon on a company website โ€” identified a critical SQL injection vulnerability that could have caused significant data exposureRead on LinkedIn
Venkata Bhargav CH SUsed RedAmon during an internship at Ascent e-Digit Solutions โ€” hands-on reconnaissance, DNS analysis, and attack surface mappingRead on LinkedIn

Community Guides

WhoWhatLink
MrGoodMastering Redamon: A Comprehensive Guide to Installation on Kali Linux โ€” addressing Kali-specific Docker challenges and security postureRead on Medium
Bogdan CaramanHow to Install RedAmon on Debian 13 (Trixie) with OpenRouter โ€” step-by-step guide with Docker setup, static IP, and systemd automationRead on Blog

Contributing

Contributions are welcome! Please read CONTRIBUTING.md for guidelines on how to get started, code style conventions, and the pull request process.


Maintainers

Samuele Giampieri โ€” creator, maintainer & AI platform architect ยท LinkedIn ยท GitHub ยท Devergo Labs

Ritesh Gohil โ€” maintainer & lead security researcher ยท LinkedIn ยท GitHub


Contact

For questions, feedback, or collaboration inquiries: devergo.sam@gmail.com


This project is released under the MIT License.

RedAmon integrates several third-party tools under their own licenses (AGPL-3.0, GPL, BSD, and others). Source code for all AGPL-licensed components is available at their upstream repositories. See THIRD-PARTY-LICENSES.md for the complete list.

See DISCLAIMER.md for full terms of use, acceptable use policy, and legal compliance requirements.


Use responsibly. Test ethically. Defend better.