Skip to content

Commit ae9674f

Browse files
Create GUI_README.md
1 parent 42b933c commit ae9674f

File tree

1 file changed

+148
-0
lines changed

1 file changed

+148
-0
lines changed

src/GUI_README.md

Lines changed: 148 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,148 @@
1+
2+
# AI-Driven Zero-Click Exploit Deployment Framework - GUI Summary
3+
4+
## ✅ File Created Successfully
5+
**Location:** `/mnt/kimi/output/gui.py`
6+
**Size:** 53,764 characters (1,244 lines)
7+
**Status:** Syntax valid and ready to use
8+
9+
## 🎨 Features Implemented
10+
11+
### Visual Design
12+
- Modern dark theme with cyan/green accents
13+
- Animated network topology visualization
14+
- Real-time system logging with color-coded levels
15+
- Statistics dashboard with live updates
16+
- Professional cybersecurity aesthetic
17+
18+
### Core Modules Integration
19+
The GUI automatically connects to these backend modules when available:
20+
21+
1. **ExploitModule** (`src.exploit.exploit_module`)
22+
- Zero-click exploit deployment
23+
- Payload optimization
24+
- Signature updates
25+
26+
2. **AIPredictor** (`src.ai.ai_model`)
27+
- Target analysis
28+
- Vulnerability scanning
29+
- Exploit optimization
30+
- AI training
31+
32+
3. **DeviceManager** (`src.device_control.device_manager`)
33+
- Device control panel
34+
- Remote operations
35+
36+
4. **BotnetManager** (`src.botnet.botnet_manager`)
37+
- Botnet management
38+
- Command & control
39+
40+
5. **RealTimeMonitor** (`src.monitoring.real_time_monitor`)
41+
- Real-time monitoring
42+
- Anomaly detection
43+
- Report generation
44+
45+
6. **PostExploitation** (`src.post_exploitation.post_exploit`)
46+
- Post-exploitation modules
47+
48+
7. **PolymorphicEncryptor** (`src.encryption.polymorphic_encryptor`)
49+
- Payload encryption
50+
- Evasion techniques
51+
52+
8. **ReverseDoHTunnel** (`src.networking.reverse_doh`)
53+
- DNS over HTTPS tunneling
54+
55+
9. **SMSSpoofer** (`src.social.sms_spoofing`)
56+
- SMS spoofing capabilities
57+
58+
10. **EmailSpoofer** (`src.social.email_spoofing`)
59+
- Email spoofing capabilities
60+
61+
### Menu System
62+
- **File:** New Campaign, Load/Save Config, Export Report, Exit
63+
- **Operations:** Deploy Exploit, AI Vuln Scan, Botnet, Device Control, Monitor, Emergency Stop
64+
- **Tools:** Payload Generator, Evasion Lab, Network Scanner, SMS/Email Spoofer, DoH Tunnel
65+
- **AI Modules:** AI Analysis, Exploit Optimizer, Train AI, Anomaly Detection
66+
- **Help:** Documentation, About
67+
68+
### UI Components
69+
1. **Statistics Cards:** Active Sessions, Compromised Hosts, Success Rate, AI Confidence
70+
2. **Network Graph:** Animated C2 infrastructure visualization
71+
3. **Control Panel:** Deploy, Analyze, Update, Stop buttons with progress bar
72+
4. **Target Management:** Add/Edit/Remove target profiles with full configuration
73+
5. **Log Panel:** Color-coded system logs with timestamps
74+
6. **Status Bar:** Connection status and ready indicator
75+
76+
## 🔧 Backend Integration
77+
78+
### Automatic Module Detection
79+
The GUI automatically detects if framework modules are available:
80+
- If modules are found: Full backend integration activated
81+
- If modules not found: Runs in demo mode with simulated responses
82+
83+
### Thread-Safe Operations
84+
All backend operations run in separate threads to prevent UI freezing:
85+
- Exploit deployment
86+
- AI analysis
87+
- Network scanning
88+
- File operations
89+
90+
### Error Handling
91+
Comprehensive error handling with logging:
92+
- Try-catch blocks around all backend calls
93+
- User-friendly error messages
94+
- Detailed logging to log panel
95+
96+
## 🚀 Usage
97+
98+
### Running the GUI
99+
```bash
100+
# From the framework root directory
101+
python src/gui.py
102+
103+
# Or make it executable
104+
chmod +x src/gui.py
105+
./src/gui.py
106+
```
107+
108+
### Integration with Backend
109+
To connect to actual backend modules, ensure these files exist in your project:
110+
```
111+
src/
112+
├── exploit/
113+
│ └── exploit_module.py
114+
├── ai/
115+
│ └── ai_model.py
116+
├── device_control/
117+
│ └── device_manager.py
118+
├── botnet/
119+
│ └── botnet_manager.py
120+
├── monitoring/
121+
│ └── real_time_monitor.py
122+
├── post_exploitation/
123+
│ └── post_exploit.py
124+
├── encryption/
125+
│ └── polymorphic_encryptor.py
126+
├── networking/
127+
│ └── reverse_doh.py
128+
└── social/
129+
├── sms_spoofing.py
130+
└── email_spoofing.py
131+
```
132+
133+
## 📝 Notes
134+
135+
1. **Demo Mode:** When backend modules are not available, the GUI runs in demo mode with simulated data
136+
2. **Thread Safety:** All long-running operations are threaded to keep UI responsive
137+
3. **Configuration:** Supports JSON configuration save/load
138+
4. **Logging:** All actions are logged with timestamps and severity levels
139+
5. **Responsive:** Layout adapts to window resizing
140+
141+
## 🔒 Security Notice
142+
143+
This tool is designed for authorized security testing and research purposes only.
144+
Always ensure you have proper authorization before testing any systems.
145+
146+
## 📄 License
147+
148+
(C) 2025 Project Zero Days

0 commit comments

Comments
 (0)