Welcome to Cybersecurity Lab Automation — an intelligent Python-powered system that transforms the way you complete cybersecurity labs on Kali Linux. Say goodbye to repetitive tasks and hello to smart, streamlined automation with multi-agent teamwork handling everything from strategy to reporting.
This system doesn’t just automate commands—it thinks for you. Leveraging a multi-agent architecture, it reads your lab instructions, plans a strategy, selects intelligent commands, explains why they matter, and compiles evidence into a detailed report. All on autopilot.
Whether you’re tackling passive reconnaissance or complex exploitation, this tool accelerates your workflow while keeping you in control.
A fleet of specialized agents collaborate behind the scenes:
- Lab Instruction Parser: Understands the entire lab document—goals, tasks, and requirements.
- Lab Strategy Planner: Maps out the smartest plan of attack.
- Context Analyzer: Extracts key details like targets, ports, and protocols.
- Command Generator: Crafts and customizes the best commands for the job.
- Explanation Generator: Tells you why each move matters.
- Output Analyzer: Makes sense of the results through a security lens.
- Evidence Collector: Gathers proof and critical findings.
- Report Generator: Delivers polished, professional reports—ready for submission or review.
-
Install the dependencies:
pip install -r requirements.txt
-
On macOS? Add Microsoft Remote Desktop for RDP (if needed):
brew install --cask microsoft-remote-desktop
-
Check your
config.py:- SSH/RDP connection details for your Kali VM
- OpenAI API key for intelligent language processing
- Flexible command templates you can tweak anytime
-
Launch the automation:
python main.py
-
Feed it your lab instructions:
- Paste a full lab document (preferred)
- Or enter step-by-step instructions interactively
-
Sit back as the system: ✅ Connects to your Kali VM
✅ Analyzes the lab and defines goals
✅ Plans and executes commands dynamically
✅ Collects evidence and interprets outputs
✅ Generates comprehensive reports (Markdown)
✅ Takes screenshots along the way
✅ Saves everything neatly inlab_logs/
- Full Lab Document Analysis: Understands and processes entire lab scenarios.
- Smart Strategy Planning: Crafts a logical, efficient approach for lab completion.
- Context-Aware Commands: Generates commands tailored to your exact setup.
- Real-Time Explanations: Understand the why behind every action.
- Intelligent Output Analysis: Reviews command results with a security-first mindset.
- Evidence Gathering: Collects proof and insights at every step.
- Auto-Generated Reports: Beautifully structured reports with all findings.
- Customizable Templates: Adaptable commands for any lab style.
- Reliable SSH Connections: Robust error-handling keeps you connected.
- Organized Logs: Comprehensive, structured logs and screenshots.
Here's a sample lab document to show what the system can handle:
# Lab 2: Identifying a Target Host on the Lumon Industries Network
## Scenario
Your team at Lumon Industries suspects insider threats. Passive network monitoring will help you track suspicious browsing activity and identify the culprit.
### Objective
- Monitor DNS queries
- Profile HTTP/S behavior
- Pinpoint the rogue host
### Goals
✅ Observe DNS and HTTP/S traffic
✅ Correlate browsing behavior
✅ Identify the suspicious IP Want to try it out without a VM?
Run the simulation:
python test.pyIt’ll walk through command generation, document parsing, and report creation—no VM required.
Check out all the logs, screenshots, and reports in the lab_logs/ directory. Your findings, command history, and a professional lab report await!
Got ideas to make it better? Open an issue or submit a pull request!
Security pros and Pythonistas welcome. 🎉