LuaN1aoAgent
LuaN1ao (้ธพ้ธ) is an autonomous penetration testing agent based on state awareness and causal reasoning.
Stars: 271
LuaN1aoAgent is a next-generation Autonomous Penetration Testing Agent powered by Large Language Models (LLMs). It breaks through the limitations of traditional automated scanning tools by integrating the P-E-R Agent Collaboration Framework with Causal Graph Reasoning technology. LuaN1ao simulates the thinking patterns of human security experts, elevating penetration testing from automated tools to an autonomous agent. The tool offers core innovations like the P-E-R Agent Collaboration Framework, Causal Graph Reasoning, and Plan-on-Graph Dynamic Task Planning. It provides capabilities for tool integration, knowledge enhancement, web visualization, and Human-in-the-Loop mode. LuaN1aoAgent is designed for authorized security testing and educational purposes only, with strict usage restrictions and technical risk warnings.
README:
Cognitive-Driven AI Hackers
๐ง Think Like Human Experts โข ๐ Dynamic Graph Planning โข ๐ Learn From Failures โข ๐ฏ Evidence-Driven Decisions
๐ Quick Start โข โจ Core Innovations โข ๐๏ธ System Architecture โข ๐๏ธ Roadmap
LuaN1ao (้ธพ้ธ) is a next-generation Autonomous Penetration Testing Agent powered by Large Language Models (LLMs).
Traditional automated scanning tools rely on predefined rules and struggle with complex real-world scenarios. LuaN1ao breaks through these limitations by innovatively integrating the P-E-R (Planner-Executor-Reflector) Agent Collaboration Framework with Causal Graph Reasoning technology.
LuaN1ao simulates the thinking patterns of human security experts:
- ๐ฏ Strategic Planning: Dynamically plan attack paths based on global situational awareness
- ๐ Evidence-Driven: Build rigorous "Evidence-Hypothesis-Validation" logical chains
- ๐ Continuous Evolution: Learn from failures and autonomously adjust tactical strategies
- ๐ง Cognitive Loop: Form a complete cognitive cycle of planning-execution-reflection
From information gathering to vulnerability exploitation, LuaN1ao elevates penetration testing from "automated tools" to an "autonomous agent".
https://github.com/user-attachments/assets/f717f725-f4a6-4508-8806-c5a66027aae5
๐ก More demos coming soon!
LuaN1ao decouples penetration testing thinking into three independent yet collaborative cognitive roles, forming a complete decision-making loop:
-
๐ง Planner
- Strategic Brain: Dynamic planning based on global graph awareness
- Adaptive Capability: Identify dead ends and automatically generate alternative paths
- Graph Operation Driven: Output structured graph editing instructions rather than natural language
- Parallel Scheduling: Automatically identify parallelizable tasks based on topological dependencies
-
โ๏ธ Executor
- Tactical Execution: Focus on single sub-task tool invocation and result analysis
- Tool Orchestration: Unified scheduling of security tools via MCP (Model Context Protocol)
- Context Compression: Intelligent message history management to avoid token overflow
- Fault Tolerance: Automatic handling of network transient errors and tool invocation failures
-
โ๏ธ Reflector
- Audit Analysis: Review task execution and validate artifact effectiveness
- Failure Attribution: L1-L4 level failure pattern analysis to prevent repeated errors
- Intelligence Generation: Extract attack intelligence and build knowledge accumulation
- Termination Control: Judge goal achievement or task entrapment
Key Advantages: Role separation avoids the "split personality" problem of single agents. Each component focuses on its core responsibilities and collaborates via event bus.
LuaN1ao rejects blind guessing and LLM hallucinations, constructing explicit causal graphs to drive testing decisions:
graph LR
E[๐ Evidence<br/>Evidence Node] -->|Support| H[๐ญ Hypothesis<br/>Hypothesis Node]
H -->|Validation| V[โ ๏ธ Vulnerability<br/>Vulnerability Node]
V -->|Exploitation| X[๐ฅ Exploit<br/>Exploit Node]Core Principles:
- Evidence First: Any hypothesis requires explicit prior evidence support
- Confidence Quantification: Each causal edge has a confidence score to avoid blind advancement
- Traceability: Complete recording of reasoning chains for failure tracing and experience reuse
- Hallucination Prevention: Mandatory evidence validation, rejecting unfounded attacks
Example Scenario:
Evidence: Port scan discovers 3306/tcp open
โ (Confidence 0.8)
Hypothesis: Target runs MySQL service
โ (Validation successful)
Vulnerability: MySQL weak password/unauthorized access
โ (Attempt exploitation)
Exploit: mysql -h target -u root -p [brute-force/empty password]
Say goodbye to static task lists. LuaN1ao models penetration testing plans as dynamically evolving Directed Acyclic Graphs (DAGs):
Core Features:
-
Graph Operation Language: Planner outputs standardized graph editing operations (
ADD_NODE,UPDATE_NODE,DEPRECATE_NODE) -
Real-time Adaptation: Task graphs deform in real-time with testing progress
- Discover new ports โ Automatically mount service scanning subgraphs
- Encounter WAF โ Insert bypass strategy nodes
- Path blocked โ Automatically prune or branch planning
- Topological Dependency Management: Automatically identify and parallelize independent tasks based on DAG topology
-
State Tracking: Each node contains a state machine (
pending,in_progress,completed,failed,deprecated)
Comparison with Traditional Planning:
| Feature | Traditional Task List | Plan-on-Graph |
|---|---|---|
| Structure | Linear list | Directed graph |
| Dependency Management | Manual sorting | Topological auto-sorting |
| Parallel Capability | None | Auto-identify parallel paths |
| Dynamic Adjustment | Regenerate | Local graph editing |
| Visualization | Difficult | Native support (Web UI) |
Visualization Example: Start the Web Server to view the task graph evolution in real-time in the browser.
LuaN1ao achieves unified integration and scheduling of tools through the Model Context Protocol (MCP):
- HTTP/HTTPS Requests: Support for custom headers, proxies, timeout control
- Shell Command Execution: Securely encapsulated system command invocation (containerized execution recommended)
- Python Code Execution: Dynamic execution of Python scripts for complex logic processing
-
Metacognitive Tools:
think(deep thinking),hypothesize(hypothesis generation),reflect(experience summarization) -
Task Control:
halt_task(early task termination)
๐ก Extensibility: New tools can be easily integrated via
mcp.json(e.g., Metasploit, Nuclei, Burp Suite API)
- Vector Retrieval: Efficient knowledge base retrieval based on FAISS
- Domain Knowledge: Integration of PayloadsAllTheThings and other open-source security knowledge bases
- Dynamic Learning: Continuous addition of custom knowledge documents
The Web UI is now a standalone service powered by a database, enabling persistent task monitoring and management.
- Real-time Monitoring: Browser view of dynamic task graph evolution and live logs.
- Node Details: Click nodes to view execution logs, artifacts, state transitions.
- Task Management: Create, abort, and delete historical tasks.
-
Data Persistence: All task data is stored in SQLite (
luan1ao.db), preserving history across restarts.
LuaN1ao Agent supports a Human-in-the-Loop (HITL) mode, allowing experts to supervise and intervene in the decision-making process.
-
Enable: Set
HUMAN_IN_THE_LOOP=truein.env. - Approval: The agent pauses after generating a plan (initial or dynamic), waiting for human approval via Web UI or CLI.
- Modification: Experts can reject or directly modify the plan (JSON editing) before execution.
- Injection: Supports real-time injection of new sub-tasks via the Web UI ("Active Intervention").
Interaction Methods:
- Web UI: Approval modal pops up automatically. Use "Modify" to edit plans or "Add Task" button to inject tasks.
-
CLI: Prompts with
HITL >. Typeyto approve,nto reject, ormto modify (opens system editor).
-
[ ] Experience Self-Evolution
- Cross-task long-term memory
- Automatic extraction of successful attack patterns into vector library
- Intelligent recommendations based on historical experience
-
[x] Human-in-the-Loop Mode
- Pre-high-risk operation confirmation mechanism
- Runtime task graph editing interface (Graph Injection)
- Expert intervention and strategy injection
-
[ ] Tool Ecosystem Expansion
- Integration of Metasploit RPC interface
- Support for Nuclei, Xray, AWVS scanners
- Docker sandboxed tool execution environment
-
[ ] Multimodal Capabilities
- Image recognition (CAPTCHA, screenshot analysis)
- Traffic analysis (PCAP file parsing)
- [ ] Collaborative Agent Network: Multi-agent distributed collaboration
- [ ] Reinforcement Learning Integration: Autonomous optimization of attack strategies through environmental interaction, achieving self-evolution and strategy convergence of agents in complex scenarios
- [ ] Compliance Report Generation: Automatic generation of compliant penetration testing reports
| Component | Requirements | Notes |
|---|---|---|
| Operating System | Linux (recommended) / macOS / Windows (WSL2) | Recommended to run in isolated environments |
| Python | 3.10+ | Requires support for asyncio and type hints |
| LLM API | OpenAI compatible format | Supports GPT-4o, DeepSeek, Claude-3.5, etc. |
| Memory | Minimum 4GB, recommended 8GB+ | RAG services and LLM inference require memory |
| Network | Internet connection | Access to LLM APIs and knowledge base updates |
โ ๏ธ Security Notice: LuaN1ao includes high-privilege tools likeshell_execandpython_exec. Strongly recommend running in Docker containers or virtual machines to avoid potential risks to the host system.
# Clone repository
git clone https://github.com/SanMuzZzZz/LuaN1aoAgent.git
cd LuaN1aoAgent
# Create virtual environment (recommended)
python3 -m venv venv
source venv/bin/activate # Linux/macOS
# Windows: venv\Scripts\activate
# Install dependencies
pip install -r requirements.txt# Copy configuration template
cp .env.example .env
# Edit .env file
nano .env # or use your preferred editorCore Configuration Items:
# LLM API Configuration (required)
LLM_API_KEY=sk-xxxxxxxxxxxxxxxxxxxxxxxx
LLM_API_BASE_URL=https://api.openai.com/v1
# Recommended to use powerful models for better results
LLM_DEFAULT_MODEL=gpt-4o
LLM_PLANNER_MODEL=gpt-4o # Planner requires strong reasoning capability
LLM_EXECUTOR_MODEL=gpt-4o
LLM_REFLECTOR_MODEL=gpt-4o
OUTPUT_MODE=default # simple/default/debugLuaN1ao relies on the RAG (Retrieval-Augmented Generation) system to obtain the latest security knowledge. The knowledge base needs to be initialized before the first run:
# 1. Clone PayloadsAllTheThings knowledge base
mkdir -p knowledge_base
git clone https://github.com/swisskyrepo/PayloadsAllTheThings \
knowledge_base/PayloadsAllTheThings
# 2. Build vector index (takes a few minutes)
cd rag
python -m rag_kdprepareKnowledge Base Description: PayloadsAllTheThings contains rich attack payloads, bypass techniques, and vulnerability exploitation methods, making it a valuable resource for penetration testing.
The system now runs as two separate processes: the Web Server (dashboard) and the Agent (worker). They communicate via a local SQLite database (luan1ao.db).
Start the persistent web interface first. This process should remain running.
python -m web.serverOpen your browser and visit: http://localhost:8088
Open a new terminal window and run the agent. The agent will execute the task, write logs to the database, and exit when finished. The Web UI will update in real-time.
# Basic usage
python agent.py \
--goal "Perform comprehensive web security testing on http://testphp.vulnweb.com" \
--task-name "demo_test"
# Enable --web flag to print the task URL
python agent.py \
--goal "Scan localhost" \
--task-name "local_scan" \
--web- Real-time: Use the Web UI (http://localhost:8088) to monitor progress.
-
Archives: Task history is persisted in the database. Logs and metrics are also saved in
logs/TASK-NAME/TIMESTAMP/:
logs/demo_test/20250204_120000/
โโโ run_log.json # Complete execution log (includes all P-E-R interactions)
โโโ metrics.json # Performance metrics and statistics
โโโ console_output.log # Formatted console output
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ User Goal โ
โ "Perform comprehensive penetration testing" โ
โโโโโโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โผ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ P-E-R Cognitive Layer โ
โ โโโโโโโโโโโโ โโโโโโโโโโโโ โโโโโโโโโโโโ โ
โ โ Planner โ โโโ> โ Executor โ โโโ> โReflector โ โ
โ โ โ โ โ โ โ โ
โ โโโโโโโโโโโโ โโโโโโโโโโโโ โโโโโโโโโโโโ โ
โ โ โ โ โ
โ โโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโ โ
โ โฒ โ
โ โ LLM API Calls โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Core Engine โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ GraphManager โ โ
โ โ โข Task Graph Management (DAG) โ โ
โ โ โข State Tracking and Updates โ โ
โ โ โข Topological Sorting and Dependency Resolutionโ โ
โ โ โข Parallel Task Scheduling โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ Database Layer (SQLite) โ โ
โ โ โข Persistence for Tasks, Graphs, Logs โ โ
โ โ โข Decoupled State Management โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ EventBroker (Global) โ โ
โ โ โข Inter-component Communication โ โ
โ โ โข Event Publishing/Subscription โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Capability Layer โ
โ โโโโโโโโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ โ RAG Knowledge โ โ MCP Tool Server โ โ
โ โ Service โ โ โ โ
โ โ โข FAISS Vector Retrievalโ โข http_request โ โ
โ โ โข Knowledge Document Parsingโ โข shell_exec โ โ
โ โ โข Similarity Search โ โข python_exec โ โ
โ โ โ โข think/hypothesize โ โ
โ โโโโโโโโโโโโโโโโโโโโโโ โ โข halt_task โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
sequenceDiagram
participant U as User
participant P as Planner
participant G as GraphManager
participant E as Executor
participant R as Reflector
participant DB as SQLite DB
participant W as Web UI
U->>P: Input Goal
P->>G: Initialize Task Graph
G->>DB: Persist Initial State
W->>DB: Poll for Updates (SSE)
loop P-E-R Cycle
P->>G: Analyze graph, generate graph edit operations
G->>G: Update graph structure
G->>DB: Sync Updates
G->>E: Assign pending sub-tasks
E->>E: Execute Tools
E->>DB: Log Events
E->>R: Request reflection
R->>R: Analyze success/failure
R->>G: Update node status
G->>DB: Sync Updates
endLuaN1aoAgent/
โโโ agent.py # Main entry point, P-E-R cycle control
โโโ requirements.txt # Project dependencies
โโโ pyproject.toml # Project configuration and code quality tool settings
โโโ mcp.json # MCP tool service configuration
โโโ .env # Environment variables configuration (manual creation required)
โ
โโโ conf/ # Configuration module
โ โโโ config.py # Core configuration items (LLM, scenarios, parameters)
โ โโโ __init__.py
โ
โโโ core/ # Core engine
โ โโโ planner.py # Planner implementation
โ โโโ executor.py # Executor implementation
โ โโโ reflector.py # Reflector implementation
โ โโโ graph_manager.py # Graph manager
โ โโโ events.py # Event bus
โ โโโ console.py # Console output management
โ โโโ data_contracts.py # Data contract definitions
โ โโโ tool_manager.py # Tool manager
โ โโโ intervention.py # Human-in-the-Loop manager
โ โโโ database/ # Database persistence layer
โ โ โโโ models.py # SQLAlchemy models
โ โ โโโ utils.py # DB utilities
โ โโโ prompts/ # Prompt template system
โ
โโโ llm/ # LLM abstraction layer
โ โโโ llm_client.py # LLM client (unified interface)
โ โโโ __init__.py
โ
โโโ rag/ # RAG knowledge enhancement
โ โโโ knowledge_service.py # FastAPI knowledge service
โ โโโ rag_client.py # RAG client
โ โโโ rag_kdprepare.py # Knowledge base index construction
โ โโโ markdown_chunker.py # Document chunking
โ โโโ model_manager.py # Embedding model management
โ
โโโ tools/ # Tool integration layer
โ โโโ mcp_service.py # MCP service implementation
โ โโโ mcp_client.py # MCP client
โ โโโ __init__.py
โ
โโโ web/ # Web UI
โ โโโ server.py # Web dashboard server
โ โโโ static/ # Frontend assets
โ โโโ templates/ # HTML templates
โ
โโโ knowledge_base/ # Knowledge base directory (manual creation required)
โ โโโ PayloadsAllTheThings/ # Security knowledge base (clone required)
โ
โโโ logs/ # Runtime logs and metrics
โโโ TASK-NAME/
โโโ TIMESTAMP/
โโโ run_log.json
โโโ metrics.json
โโโ console_output.log
By using LuaN1ao, you acknowledge and agree to the following terms:
- Explicit Authorization Required: You MUST obtain explicit written authorization from system owners before testing any systems, networks, or applications.
- Scope Limitation: Testing activities must be strictly limited to the authorized scope and must not exceed authorized boundaries.
- Educational & Research Use: This tool is suitable for cybersecurity education, academic research, and authorized security assessments.
- Comply with Laws: You are solely responsible for ensuring that your use of this tool complies with all applicable local, national, and international laws and regulations.
- Legal Consequences: Unauthorized penetration testing is ILLEGAL and may result in criminal prosecution, civil lawsuits, and substantial fines.
- Personal Liability: Users assume full responsibility for all legal consequences arising from improper use of this tool.
- Responsible Disclosure: Discovered security vulnerabilities should follow Responsible Disclosure principles.
- Professional Standards: Use of this tool must comply with professional security research standards and industry best practices.
- Confidentiality Obligations: Respect the privacy and confidentiality of any vulnerabilities discovered during testing; do not disclose or exploit them without authorization.
This software MUST NOT be used for:
- โ Unauthorized access to computer systems, networks, or data
- โ Malicious attacks, destruction, or service disruption
- โ Theft, tampering, or destruction of data
- โ Any illegal or criminal activities
- โ Privacy violations or breach of confidentiality agreements
- โ Corporate espionage or unfair competition
-
High-Privilege Tools: LuaN1ao includes high-privilege tools such as
shell_execandpython_execwith the capability to execute arbitrary system commands and code. -
Potential Destructiveness: Improper use may cause irreversible damage to target systems, including but not limited to:
- System crashes or service interruptions
- Data loss or corruption
- Configuration file modifications
- Security mechanism compromise
-
Mandatory Isolation: Strongly recommended to run in the following isolated environments:
- Docker containers (recommended)
- Dedicated virtual machines (VMware, VirtualBox, KVM, etc.)
- Completely isolated sandbox environments
- Network Isolation: Test environments should be physically or logically isolated from production networks.
- Data Isolation: Do not run on systems containing real user data or sensitive information.
- No Production Use: Never run LuaN1ao on production environments, critical business systems, or systems containing sensitive data.
- Test Environments Only: Use only in dedicated test, development, or sandbox environments.
- Provided "AS IS": This software is provided "AS IS" without warranty of any kind, express or implied.
- No Fitness Warranty: No warranty of merchantability, fitness for a particular purpose, or non-infringement.
- No Results Guarantee: No guarantee that the software will discover all vulnerabilities or achieve expected results.
THE AUTHORS AND CONTRIBUTORS EXPRESSLY DISCLAIM ALL LIABILITY FOR MISUSE OF THIS SOFTWARE.
Under no circumstances shall developers, contributors, or copyright holders be liable for:
- โ Any direct, indirect, incidental, special, punitive, or consequential damages arising from use or inability to use this software
- โ Unauthorized system access or data breaches
- โ System damage, data loss, or business interruption
- โ Legal proceedings, fines, or other legal consequences
- โ Loss of goodwill, profits, or other economic losses
- โ Even if advised of the possibility of such damages
- Independent Judgment: Users have complete autonomy and judgment in the decision to use this tool.
- Assumption of Risk: All risks of using this software are assumed by the user.
- Full Responsibility: Users assume full responsibility for all actions using this tool and their consequences.
By downloading, installing, configuring, or using LuaN1ao, you expressly represent that:
- โ You have completely read and fully understand all terms of this disclaimer
- โ You agree to be bound by this disclaimer
- โ You commit to use this tool only within authorized scope
- โ You understand and accept all risks of using this tool
- โ You acknowledge that developers are not liable for any of your usage actions
If you do not agree to any of the above terms, immediately cease using this software and delete all related files.
We welcome all forms of contributions! Whether reporting bugs, suggesting new features, improving documentation, or submitting code.
- Report Issues: Submit bug reports or feature requests on the Issues page
- Submit Code: Fork the repository, create a branch, and submit a Pull Request
- Improve Documentation: Correct errors, supplement explanations, add examples
- Share Experience: Share usage experiences and best practices in Discussions
For detailed contribution processes and code standards, please refer to CONTRIBUTING.md.
This project is licensed under the Apache License 2.0.
Copyright 2025 LuaN1ao (้ธพ้ธ) Project Contributors
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
- GitHub Issues: Submit Issues
- GitHub Discussions: Join Discussions
- Email: [email protected]
- WeChat: SanMuzZzZzZz
If LuaN1ao has been helpful to you, please give us a Star โญ!
- English (Default)
- ็ฎไฝไธญๆ
For Tasks:
Click tags to check more tools for each tasksFor Jobs:
Alternative AI tools for LuaN1aoAgent
Similar Open Source Tools
LuaN1aoAgent
LuaN1aoAgent is a next-generation Autonomous Penetration Testing Agent powered by Large Language Models (LLMs). It breaks through the limitations of traditional automated scanning tools by integrating the P-E-R Agent Collaboration Framework with Causal Graph Reasoning technology. LuaN1ao simulates the thinking patterns of human security experts, elevating penetration testing from automated tools to an autonomous agent. The tool offers core innovations like the P-E-R Agent Collaboration Framework, Causal Graph Reasoning, and Plan-on-Graph Dynamic Task Planning. It provides capabilities for tool integration, knowledge enhancement, web visualization, and Human-in-the-Loop mode. LuaN1aoAgent is designed for authorized security testing and educational purposes only, with strict usage restrictions and technical risk warnings.
OpenScribe
OpenScribe is an open-source AI medical scribe tool designed to assist clinicians in recording patient encounters, transcribing audio, and generating structured draft clinical notes using large language models (LLMs). The tool offers a default web deployment path with local Whisper transcription and Anthropic Claude note generation. It is currently in early development (v0.x) and not suitable for clinical practice yet, intended for evaluation, testing, and development purposes only. The project aims to provide a local-first, privacy-conscious, and modular alternative to cloud-dependent clinical documentation tools.
Shannon
Shannon is a battle-tested infrastructure for AI agents that solves problems at scale, such as runaway costs, non-deterministic failures, and security concerns. It offers features like intelligent caching, deterministic replay of workflows, time-travel debugging, WASI sandboxing, and hot-swapping between LLM providers. Shannon allows users to ship faster with zero configuration multi-agent setup, multiple AI patterns, time-travel debugging, and hot configuration changes. It is production-ready with features like WASI sandbox, token budget control, policy engine (OPA), and multi-tenancy. Shannon helps scale without breaking by reducing costs, being provider agnostic, observable by default, and designed for horizontal scaling with Temporal workflow orchestration.
helix
HelixML is a private GenAI platform that allows users to deploy the best of open AI in their own data center or VPC while retaining complete data security and control. It includes support for fine-tuning models with drag-and-drop functionality. HelixML brings the best of open source AI to businesses in an ergonomic and scalable way, optimizing the tradeoff between GPU memory and latency.
ClawX
ClawX bridges the gap between powerful AI agents and everyday users by providing a desktop interface for OpenClaw AI agents. It offers an accessible, beautiful desktop experience for automating workflows, managing AI-powered channels, and scheduling intelligent tasks. ClawX comes pre-configured with best-practice model providers, supports multi-language settings, and allows fine-tuning of advanced configurations via Settings โ Advanced โ Developer Mode.
QodeAssist
QodeAssist is an AI-powered coding assistant plugin for Qt Creator, offering intelligent code completion and suggestions for C++ and QML. It leverages large language models like Ollama to enhance coding productivity with context-aware AI assistance directly in the Qt development environment. The plugin supports multiple LLM providers, extensive model-specific templates, and easy configuration for enhanced coding experience.
cordum
Cordum is a control plane for AI agents designed to close the Trust Gap by providing safety, observability, and control features. It allows teams to deploy autonomous agents with built-in governance mechanisms, including safety policies, workflow orchestration, job routing, observability, and human-in-the-loop approvals. The tool aims to address the challenges of deploying AI agents in production by offering visibility, safety rails, audit trails, and approval mechanisms for sensitive operations.
pasal
Pasal.id is the first open, AI-native platform for Indonesian law, providing access to real Indonesian legal data through a REST API and a web app. It offers full-text legal search, structured reading, grounded AI tools, public JSON endpoints, crowd-sourced corrections, amendment tracking, and a bilingual UI. The platform is powered by Opus 4.6, ensuring accuracy through a self-improving correction flywheel. Key features include a grounded legal access server, multimodal verification agent, self-improving feedback loop, human-in-the-loop safety, and Claude Code as a development tool. The technical depth includes SQL migrations, search optimization, append-only revision audit trail, transaction-safe mutations, row-level security, input sanitization, ISR with on-demand revalidation, atomic job claiming, and coverage of 11 regulation types from 1945 to 2026.
open-computer-use
Open Computer Use is an open-source platform that enables AI agents to control computers through browser automation, terminal access, and desktop interaction. It is designed for developers to create autonomous AI workflows. The platform allows agents to browse the web, run terminal commands, control desktop applications, orchestrate multi-agents, stream execution, and is 100% open-source and self-hostable. It provides capabilities similar to Anthropic's Claude Computer Use but is fully open-source and extensible.
aichildedu
AICHILDEDU is a microservice-based AI education platform for children that integrates LLMs, image generation, and speech synthesis to provide personalized storybook creation, intelligent conversational learning, and multimedia content generation. It offers features like personalized story generation, educational quiz creation, multimedia integration, age-appropriate content, multi-language support, user management, parental controls, and asynchronous processing. The platform follows a microservice architecture with components like API Gateway, User Service, Content Service, Learning Service, and AI Services. Technologies used include Python, FastAPI, PostgreSQL, MongoDB, Redis, LangChain, OpenAI GPT models, TensorFlow, PyTorch, Transformers, MinIO, Elasticsearch, Docker, Docker Compose, and JWT-based authentication.
Memoh
Memoh is a multi-member, structured long-memory, containerized AI agent system platform that allows users to create AI bots for communication via platforms like Telegram, Discord, and Lark. Each bot operates in its own isolated container with a memory system for file editing, command execution, and self-building. Memoh offers a secure, flexible, and scalable solution for multi-bot management, distinguishing and remembering requests from multiple users and bots.
mesh
MCP Mesh is an open-source control plane for MCP traffic that provides a unified layer for authentication, routing, and observability. It replaces multiple integrations with a single production endpoint, simplifying configuration management. Built for multi-tenant organizations, it offers workspace/project scoping for policies, credentials, and logs. With core capabilities like MeshContext, AccessControl, and OpenTelemetry, it ensures fine-grained RBAC, full tracing, and metrics for tools and workflows. Users can define tools with input/output validation, access control checks, audit logging, and OpenTelemetry traces. The project structure includes apps for full-stack MCP Mesh, encryption, observability, and more, with deployment options ranging from Docker to Kubernetes. The tech stack includes Bun/Node runtime, TypeScript, Hono API, React, Kysely ORM, and Better Auth for OAuth and API keys.
CoWork-OS
CoWork-OS is an open-source AI assistant platform designed for security-hardened, local-first runtime. It offers 30+ LLM providers, 14 messaging channels, and over 100 built-in skills. Users can create tasks, choose execution modes, monitor real-time execution, and approve actions. The platform emphasizes security, extensibility, and privacy by keeping data and API keys on the user's machine. CoWork-OS is suitable for individuals and teams looking for an independent AI assistant solution with advanced features and customizable workflows.
gpt-all-star
GPT-All-Star is an AI-powered code generation tool designed for scratch development of web applications with team collaboration of autonomous AI agents. The primary focus of this research project is to explore the potential of autonomous AI agents in software development. Users can organize their team, choose leaders for each step, create action plans, and work together to complete tasks. The tool supports various endpoints like OpenAI, Azure, and Anthropic, and provides functionalities for project management, code generation, and team collaboration.
OpenFlux
OpenFlux is an open-source AI Agent desktop client that offers multi-LLM support, long-term memory capabilities, browser automation, and tool orchestration. It features multi-agent routing, support for various LLM models, long-term memory with conversation distillation, browser automation using Playwright, a MCP tool ecosystem, voice interaction, sandbox isolation for safe code execution, desktop control, and remote access. The tool is built on Tauri v2 with a Rust backend and TypeScript frontend, providing high performance and a small footprint. It serves as the desktop entry point in the Enterprise AI Assistant ecosystem, working alongside NexusAI to create a complete AI workflow system.
lihil
Lihil is a performant, productive, and professional web framework designed to make Python the mainstream programming language for web development. It is 100% test covered and strictly typed, offering fast performance, ergonomic API, and built-in solutions for common problems. Lihil is suitable for enterprise web development, delivering robust and scalable solutions with best practices in microservice architecture and related patterns. It features dependency injection, OpenAPI docs generation, error response generation, data validation, message system, testability, and strong support for AI features. Lihil is ASGI compatible and uses starlette as its ASGI toolkit, ensuring compatibility with starlette classes and middlewares. The framework follows semantic versioning and has a roadmap for future enhancements and features.
For similar tasks
LuaN1aoAgent
LuaN1aoAgent is a next-generation Autonomous Penetration Testing Agent powered by Large Language Models (LLMs). It breaks through the limitations of traditional automated scanning tools by integrating the P-E-R Agent Collaboration Framework with Causal Graph Reasoning technology. LuaN1ao simulates the thinking patterns of human security experts, elevating penetration testing from automated tools to an autonomous agent. The tool offers core innovations like the P-E-R Agent Collaboration Framework, Causal Graph Reasoning, and Plan-on-Graph Dynamic Task Planning. It provides capabilities for tool integration, knowledge enhancement, web visualization, and Human-in-the-Loop mode. LuaN1aoAgent is designed for authorized security testing and educational purposes only, with strict usage restrictions and technical risk warnings.
For similar jobs
ciso-assistant-community
CISO Assistant is a tool that helps organizations manage their cybersecurity posture and compliance. It provides a centralized platform for managing security controls, threats, and risks. CISO Assistant also includes a library of pre-built frameworks and tools to help organizations quickly and easily implement best practices.
PurpleLlama
Purple Llama is an umbrella project that aims to provide tools and evaluations to support responsible development and usage of generative AI models. It encompasses components for cybersecurity and input/output safeguards, with plans to expand in the future. The project emphasizes a collaborative approach, borrowing the concept of purple teaming from cybersecurity, to address potential risks and challenges posed by generative AI. Components within Purple Llama are licensed permissively to foster community collaboration and standardize the development of trust and safety tools for generative AI.
vpnfast.github.io
VPNFast is a lightweight and fast VPN service provider that offers secure and private internet access. With VPNFast, users can protect their online privacy, bypass geo-restrictions, and secure their internet connection from hackers and snoopers. The service provides high-speed servers in multiple locations worldwide, ensuring a reliable and seamless VPN experience for users. VPNFast is easy to use, with a user-friendly interface and simple setup process. Whether you're browsing the web, streaming content, or accessing sensitive information, VPNFast helps you stay safe and anonymous online.
taranis-ai
Taranis AI is an advanced Open-Source Intelligence (OSINT) tool that leverages Artificial Intelligence to revolutionize information gathering and situational analysis. It navigates through diverse data sources like websites to collect unstructured news articles, utilizing Natural Language Processing and Artificial Intelligence to enhance content quality. Analysts then refine these AI-augmented articles into structured reports that serve as the foundation for deliverables such as PDF files, which are ultimately published.
NightshadeAntidote
Nightshade Antidote is an image forensics tool used to analyze digital images for signs of manipulation or forgery. It implements several common techniques used in image forensics including metadata analysis, copy-move forgery detection, frequency domain analysis, and JPEG compression artifacts analysis. The tool takes an input image, performs analysis using the above techniques, and outputs a report summarizing the findings.
h4cker
This repository is a comprehensive collection of cybersecurity-related references, scripts, tools, code, and other resources. It is carefully curated and maintained by Omar Santos. The repository serves as a supplemental material provider to several books, video courses, and live training created by Omar Santos. It encompasses over 10,000 references that are instrumental for both offensive and defensive security professionals in honing their skills.
AIMr
AIMr is an AI aimbot tool written in Python that leverages modern technologies to achieve an undetected system with a pleasing appearance. It works on any game that uses human-shaped models. To optimize its performance, users should build OpenCV with CUDA. For Valorant, additional perks in the Discord and an Arduino Leonardo R3 are required.
admyral
Admyral is an open-source Cybersecurity Automation & Investigation Assistant that provides a unified console for investigations and incident handling, workflow automation creation, automatic alert investigation, and next step suggestions for analysts. It aims to tackle alert fatigue and automate security workflows effectively by offering features like workflow actions, AI actions, case management, alert handling, and more. Admyral combines security automation and case management to streamline incident response processes and improve overall security posture. The tool is open-source, transparent, and community-driven, allowing users to self-host, contribute, and collaborate on integrations and features.
