Give your AI the power of 400+ pentesting tools. Let it hack (legally).
Quick Start β’ Why AIDA β’ Installation β’ User Guide β’ Architecture
AIDA connects AI assistants to a real pentesting environment. Instead of just talking about security testing, your AI can actually do it.
Here's the deal:
- Your choice of pentesting container β use the built-in
aida-pentest(~2 GB, starts automatically, covers all the essential tools) or bring your own Exegol container (400+ tools, ~20-40 GB). You pick at first launch β and can switch anytime. - MCP integration that works with any AI client (Claude, Gemini, GPT, Antigravity...)
- Web dashboard to track findings, commands, and progress
- Structured workflow from recon to exploitation
Think of it as giving your AI a fully-equipped hacking lab and a notebook to document everything.
Modern AI assistants know pentesting tools, techniques, and vulnerability classesβbut they can't execute them.
Without execution capabilities, security testing becomes a tedious back-and-forth: you ask the AI for a command, copy it to your terminal, wait for results, paste the output back, and repeat. Traditional scanners like Burp Suite run fixed patterns and can't adapt to specific tech stacks or chain multi-step exploits.
AIDA changes this by connecting AI directly to a professional pentesting environment:
- π§ Direct Execution - Built-in pentesting environment (nmap, sqlmap, ffuf, nuclei...)
- π§ Persistent Memory - Full context maintained across sessions in structured database
- π Auto Documentation - Findings tracked as cards with severity, proof, and technical analysis
- βοΈ Attack Chains - AI connects dots between discoveries to build multi-step exploits
- π― Adaptive Testing - Methodology adjusts based on findings, not fixed patterns
Result: Your AI becomes an autonomous security researcher, not just a consultant.
- macOS (Intel & Apple Silicon)
- Linux (Ubuntu, Debian, RHEL, Fedora, Arch, and derivatives)
- Windows (Untested)
- Docker Desktop - To run the platform
- An AI Client - Claude Desktop, Claude Code, Gemini CLI, Antigravity... pick your favorite
# Clone & start
git clone https://github.com/Vasco0x4/AIDA.git
cd AIDA
./start.sh
# Open the dashboard
open http://localhost:31337Contributors: use
./start.sh --devfor Vite hot reload onlocalhost:5173. LAN access: use./start.sh --lanto share with your team.
Now hook up your AI client.
Recommended: AIDA CLI (Claude Code or Kimi)
The easiest way to get started is using the AIDA CLI wrapper, which supports both Claude Code and Kimi CLI:
# Auto-detect available CLI (Claude or Kimi)
python3 aida.py --assessment "test"
# Force a specific CLI
python3 aida.py --assessment "test" --cli claude
python3 aida.py --assessment "test" --cli kimi
# Auto-approve all actions
python3 aida.py --assessment "test" --yesYou can also use your own API keys (Claude only).
Alternative: Import MCP tools into your AI client
Here's Claude Desktop as an example:
Default config path (macOS):
~/Library/Application Support/Claude/claude_desktop_config.json
MCP config:
{
"mcpServers": {
"aida-mcp": {
"command": "/bin/bash",
"args": [
"/absolute/path/to/AIDA/start_mcp.sh"
]
}
}
}Full setup for all AI clients β INSTALLATION.md
- Create an assessment in the web UI
- Start your AI client
- Inject the pre prompt.
- Tell it: "Load assessment 'Acme' and start it"
- Watch it go
AIDA uses the Model Context Protocol (MCP) - an open standard. If your AI client supports MCP, it works with AIDA.
| AI Client | Status | Setup |
|---|---|---|
| Claude Code | Recommended | Via aida.py (automatic) |
| Kimi CLI | Recommended | Via aida.py (automatic) |
| External API | Recommended | Via aida.py --base-url |
| Claude Desktop | Works | Manual MCP import |
| ChatGPT Desktop | Works | Manual MCP import |
| Gemini CLI | Works | Manual MCP import |
| Antigravity | Works | Manual MCP import |
Full setup for all AI clients β INSTALLATION.md
The AI gets access to specialized tools:
ASSESSMENT
load_assessment - Load and start working
update_phase - Document progress
CARDS
add_card - Create findings/observations/info
list_cards - View all cards
update_card - Modify cards
delete_card - Remove cards
RECON
add_recon_data - Track discovered assets
list_recon - View recon data
EXECUTION
execute - Run any command in the pentesting container
scan - Quick scans (nmap, gobuster, ffuf...)
subdomain_enum - Find subdomains
ssl_analysis - Check SSL/TLS
tech_detection - Identify tech stack
tool_help - Get tool documentation
CREDENTIALS
credentials_add - Store credentials
credentials_list - List stored creds
Full tool documentation β MCP_TOOLS.md
AIDA/
βββ backend/ # FastAPI + MCP Server
β βββ api/ # REST endpoints
β βββ mcp/ # MCP server + tools
β βββ models/ # Database models
β βββ services/ # Business logic
βββ frontend/ # React dashboard
β βββ src/pages/ # Dashboard, Assessments, Settings...
β βββ src/components/ # Reusable UI components
βββ pentest/ # Built-in pentesting container (aida-pentest)
β βββ Dockerfile # Ubuntu 22.04 + nmap, ffuf, gobuster, sqlmap...
βββ Docs/ # Documentation and AI methodology
βββ aida.py # CLI launcher
βββ start.sh # Start the platform (prod default, --dev, --lan)
βββ stop.sh # Stop all services (data preserved)
βββ restart.sh # Restart all services
βββ docker-compose.yml # Dev infrastructure
βββ docker-compose.prod.yml # Prod overrides (Nginx reverse proxy)
βββ docker-compose.hub.yml # Standalone β pre-built Docker Hub images
| Document | Description |
|---|---|
| INSTALLATION.md | Complete setup guide - all AI clients |
| USER_GUIDE.md | How to use the platform |
| ARCHITECTURE.md | Technical deep dive + diagrams |
| MCP_TOOLS.md | All MCP tools explained |
- Full authentication system β JWT-based auth, admin/user roles, first-run setup wizard, API key for CLI/MCP
- PDF report generation β Export assessments as professional reports with one click
- CVSS 4.0 scoring β Automatic score calculation directly on findings cards
- Attack timeline β Auto-generated event timeline per assessment
- Notifications β Telegram, Slack, and Email alerts with optional PDF attachment
- Assessment templates β Start from predefined methodologies
aida-pentestcontainer β Built-in lightweight pentesting environment (~2 GB), no Exegol required- LAN / production mode β Nginx reverse proxy, Docker Hub images (
./start.sh --lan) - New MCP tools β
python_execandhttp_requestfor advanced AI workflows - Security hardening β Docker socket proxy, path traversal prevention,
shlex.quotesanitization, PostgreSQL bound to localhost only, auto-generated secret key - Cross-assessment findings view β Aggregate and filter all findings across every assessment
β οΈ Deployment note: Run locally or on your LAN. Do NOT expose the web interface to the public internet without additional hardening (HTTPS, firewall, strong credentials in.env).
Report bugs and request features: GitHub Issues
AIDA is actively developed. Want to contribute?
Planned Features:
- Frontend redesign with flat, professional UI
- OWASP testing guidelines integration
- Enhanced phase workflow system
- Advanced CLI wrapper capabilities
Need help? Contact vasco0x4 on Discord.
AGPL v3 - Free and open source.
You can use, modify, and distribute AIDA freely. If you modify and deploy it (including as a network service), you must open source your changes under AGPL v3.
Commercial licensing available for organizations that need proprietary modifications. Contact: Vasco0x4@proton.me
- Anthropic MCP - The protocol that makes this possible
- The security community for all the amazing open-source tools
- Exegol - Supported as an alternative container for advanced users
β Star on GitHub β’ Report Bug β’ Contact

