Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence. Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. Shennina scans a set of input targets for available network services, uses its AI engine to identify recommended exploits for the attacks, and then attempts to test and attack the targets. If the attack succeeds, Shennina proceeds with the post-exploitation phase. The AI engine is initially trained against live targets to learn reliable exploits against remote services. Shennina also supports a "Heuristics" mode for identfying recommended exploits.

Features

  • Automated self-learning approach for finding exploits
  • High performance using managed concurrency design
  • Intelligent exploits clustering
  • Post exploitation capabilities
  • Deception detection
  • Ransomware simulation capabilities

Project Samples

Project Activity

See All Activity >

License

MIT License

Follow Shennina

Shennina Web Site

Other Useful Business Software
Field Sales+ for MS Dynamics 365 and Salesforce Icon
Field Sales+ for MS Dynamics 365 and Salesforce

Maximize your sales performance on the go.

Bring Dynamics 365 and Salesforce wherever you go with Resco’s solution. With powerful offline features and reliable data syncing, your team can access CRM data on mobile devices anytime, anywhere. This saves time, cuts errors, and speeds up customer visits.
Learn More
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Shennina!

Additional Project Details

Programming Language

Python

Related Categories

Python Post-Exploitation Frameworks

Registered

2023-06-07