IVExES - Intelligent Vulnerability Extraction & Exploit Synthesis
IVExES is an advanced Python framework for cybersecurity vulnerability analysis and exploitation using multi-agent AI systems. It combines comprehensive knowledge bases (CWE, CAPEC, MITRE ATT&CK) with dynamic analysis capabilities to provide automated, intelligent security assessment.
Overview
IVExES transforms vulnerability analysis from a manual, time-intensive process into an automated, AI-driven workflow. By leveraging multiple specialized AI agents, the framework can analyze complex codebases, identify vulnerabilities, understand exploitation techniques, and generate comprehensive security reports.
Key Features
Multi-Agent Architecture
Specialized AI agents work collaboratively to analyze different aspects of security vulnerabilities, from code analysis to exploitation strategy development.
Knowledge Base Integration
Seamlessly integrates with industry-standard security frameworks including MITRE ATT&CK, CWE (Common Weakness Enumeration), CAPEC (Common Attack Pattern Enumeration), and CVE databases.
Dynamic Code Analysis
Container-based sandbox environments with Neovim LSP integration provide safe, intelligent code examination and analysis.
Automated Reporting
Generates structured vulnerability reports with detailed exploitation procedures, risk assessments, and remediation guidance.
What Makes IVExES Unique
- AI-First Approach: Built from the ground up to leverage large language models for security analysis
- Extensible Architecture: Modular design allows easy integration of custom agents and analysis tools
- Safe Execution: Containerized environments ensure secure analysis of potentially malicious code
- Comprehensive Coverage: Analyzes vulnerabilities from multiple perspectives using specialized knowledge bases
Quick Start
Get started with IVExES in minutes:
# Clone and setup
git clone https://github.com/LetsDrinkSomeTea/ivexes.git
cd ivexes
make setup
# Configure API key
echo "LLM_API_KEY=your_openai_api_key" > .secrets.env
# Run analysis
python -c "
from ivexes.agents import SingleAgent
agent = SingleAgent()
await agent.run_interactive()
"
For detailed setup instructions, see the Quick Start Guide.
Core Components
🤖 AI Agents
IVExES provides multiple specialized agents for different analysis scenarios:
- SingleAgent: Individual vulnerability assessment with focused analysis
- MultiAgent: Orchestrated multi-agent analysis for complex vulnerabilities
- HTBChallengeAgent: Specialized for Hack The Box challenge analysis
- MVPAgent: Minimal viable product for quick vulnerability checks
🔍 Code Analysis
Advanced code analysis capabilities through multiple integrated systems:
- Code Browser: Neovim LSP integration for intelligent code navigation
- Sandbox System: Docker-based execution environments for safe analysis
- Tree-sitter Parsing: Deep code structure understanding and analysis
📊 Knowledge Integration
Comprehensive cybersecurity knowledge base integration:
- Vector Database: ChromaDB-powered semantic search across security frameworks
- CVE Search: Real-time vulnerability database integration
- MITRE ATT&CK: Threat intelligence and attack pattern correlation
- CWE/CAPEC: Weakness and attack pattern classification
⚙️ Configuration & Tools
Flexible configuration and utility systems:
- Settings Management: Environment-based configuration with validation
- Shared Tools: Utilities for token management, container operations, and formatting
- Logging & Monitoring: Comprehensive observability and debugging capabilities
Use Cases
🏢 Enterprise Security Assessment
- Large Codebase Analysis: Multi-agent orchestration for comprehensive security reviews
- Vulnerability Prioritization: AI-driven risk assessment and remediation planning
- Compliance Reporting: Automated generation of security compliance documentation
🎓 Educational Security Research
- CTF Challenge Analysis: Specialized agents for capture-the-flag competitions
- Vulnerability Research: Deep analysis of security weaknesses and exploitation techniques
- Security Training: Interactive learning through guided vulnerability analysis
🔬 Research & Development
- Novel Vulnerability Discovery: AI-assisted identification of previously unknown weaknesses
- Exploitation Technique Development: Automated generation of proof-of-concept exploits
- Security Tool Development: Framework for building custom security analysis tools
Architecture Overview
graph TB
User[User Interface] --> Agent[AI Agents]
Agent --> CodeBrowser[Code Browser]
Agent --> Sandbox[Sandbox Environment]
Agent --> VectorDB[Vector Database]
Agent --> CVE[CVE Search]
CodeBrowser --> Neovim[Neovim LSP]
CodeBrowser --> TreeSitter[Tree-sitter Parser]
Sandbox --> Docker[Docker Containers]
Sandbox --> Kali[Kali Linux Tools]
VectorDB --> ChromaDB[ChromaDB]
VectorDB --> MITRE[MITRE ATT&CK]
VectorDB --> CWE[CWE Database]
VectorDB --> CAPEC[CAPEC Database]
CVE --> NIST[NIST NVD]
CVE --> GitHub[GitHub Security]
Getting Started
1. Installation
Follow the installation guide to set up IVExES with all dependencies.
2. Configuration
Configure IVExES for your environment using the configuration guide.
3. Basic Usage
Learn fundamental workflows with the usage guide.
4. Examples
Explore practical examples in our examples collection.
5. Development
Extend IVExES with custom agents using the development guide.
Community & Support
- Documentation: Comprehensive guides and API references
- Examples: Real-world usage examples and tutorials
- GitHub: Source code, issues, and contributions
- Research: Academic papers and research publications
License & Ethics
IVExES is licensed under the GNU General Public License v3.0. This framework is designed for:
- ✅ Educational purposes and security research
- ✅ Authorized penetration testing and security assessments
- ✅ Defensive security tool development
- ❌ Unauthorized access or malicious activities
Users are responsible for ensuring compliance with applicable laws and regulations.
Ready to get started? Jump to the Quick Start Guide or explore our comprehensive documentation.