░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
NetTravelerEX Minimal v0.1.0 by COSMIC ZIP 11-APR-2025
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
███╗ ██╗███████╗████████╗████████╗██████╗ █████╗ ██╗ ██╗███████╗██╗ ███████╗██████╗
████╗ ██║██╔════╝╚══██╔══╝╚══██╔══╝██╔══██╗██╔══██╗██║ ██║██╔════╝██║ ██╔════╝██╔══██╗
██╔██╗ ██║█████╗ ██║ ██║ ██████╔╝███████║██║ ██║█████╗ ██║ █████╗ ██████╔╝
██║╚██╗██║██╔══╝ ██║ ██║ ██╔══██╗██╔══██║╚██╗ ██╔╝██╔══╝ ██║ ██╔══╝ ██╔══██╗
██║ ╚████║███████╗ ██║ ██║ ██║ ██║██║ ██║ ╚████╔╝ ███████╗███████╗███████╗██║ ██║
╚═╝ ╚═══╝╚══════╝ ╚═╝ ╚═╝ ╚═╝ ╚═╝╚═╝ ╚═╝ ╚═══╝ ╚══════╝╚══════╝╚══════╝╚═╝ ╚═╝
,----------------, ,---------,
,-----------------------, ," ,"|
," ,"| ," ," |
+-----------------------+ | ," ," |
| .-----------------. | | +---------+ |
| | | | | | -==----'| |
| | COME TO THE | | | | | |
| | PURPLE SIDE | | |/----|`---= | |
| | $ netex.py | | | ,/|==== ooo | ;
| | | | | // |(((( [33]| ,"
| `-----------------' |," .;'| |(((( | ,"
+-----------------------+ ;; | | |,"
/_)______________(_/ //' | +---------+
___________________________/___ `,
/ oooooooooooooooo .o. oooo /, \,"-----------
/ ==ooooooooooooooo==.o. ooo= // ,`\--{)B ,"
/_==__==========__==_ooo__ooo=_/' /___________,"
`-----------------------------'
*art by Cosmic & Kevin Lam
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
NettravelerEX
NettravelerEX is your all-in-one offensive security toolkit. It aggregates powerful tools, serializes their functions, and gives you a single, standardized interface to handle a huge range of tasks—from Wi-Fi hacking and web scanning to OSINT, forensics, and even custom malware building.
It’s built to be smart, automatically generating detailed reports (RBR) and actionable playbooks (RBP) based on rules, OWASP databases, and with a little AI support. Think of it as your central command for testing defenses, whether you're running bug bounties or full-scale purple team exercises.
How It All Hangs Together
At its heart is a "genesis" file. This file registers every command, alias, and function, complete with its documentation and "super-strings" that hold predefined options. This design means the entire system is not only robust and ready for action but also fully extensible. From this single genesis file, a custom-built parser and template engine automatically generate all the interfaces you need: CLI, Web, and an experimental API.
You just interact with these clean interfaces, and NettravelerEX handles the complexity behind the scenes, giving you a consistent way to work with all its native functions, plugins, and extensions.
Built to Last and Easy to Run
We keep it lean and mean. NettravelerEX doesn’t rely on a stack of third-party libraries. It’s pure Python, making it incredibly portable, durable, and a breeze to install. If your system has GNU/coreutils (or something compatible), you’re good to go.
(
)
(
/\\ .-***-. /\\
//\\/ ,,, \//\\ _ _ _ _ _ _______ __
|/\| ,;;;;;, |/\| | \ | | | | | | | | | ___\ \ / /
//\\\;-***-;///\\ | \| | ___| |_| |_ _ __ __ ___ _____| | ___ _ __| |__ \ V /
// \/ . \/ \\ | . ` |/ _ \ __| __| '__/ _` \ \ / / _ \ |/ _ \ '__| __| / \
(| ,-_| \ | / |_-, |) | |\ | __/ |_| |_| | | (_| |\ V / __/ | __/ | | |___/ /^\ \
//`__\.-.-./__`\\ \_| \_/\___|\__|\__|_| \__,_| \_/ \___|_|\___|_| \____/\/ \/
// /.-(() ())-.\ \\
(\ |) '---' (| /) NettravelerEX - The offensive security toolkit.
` (| |) `
\) (/
FEATURES
🌐 WebUI
The WebUI is a clean, simple SPA (Single Page Application) we built from
scratch using HTMX. We chose HTMX over heavier frameworks like React for its simplicity and
because you don’t need to install a whole new ecosystem—just your coreutils and tools like
nmap.
The best part? It’s automatically generated. Run nettraveler build.web and any custom extensions
or modifications you’ve dropped into the data/mod/webui folder are instantly part of your
interface. We built this because sometimes, filling out a form in the terminal just doesn't cut it. Why
not use a proper HTML form and a slick API? The result is a WebUI that’s portable, simple, extensible, and a
joy to use.
🤖 IA
AI-Powered Security
Harness the power of AI to level up your security posture. Our system correlates telemetry from red-team exercises, EDR/XDR logs, and SIEM alerts, enriching them with contextual threat intelligence. This accelerates the validation of your detection rules and automates those repetitive investigative tasks, freeing up your SOC analysts for higher-level threat hunting and purple-team tuning.
We use AI to monitor endpoints, network traffic, cloud workloads, and applications, detecting anomalous patterns caused by offensive activity. This optimizes your system's observability, helps you prioritize critical assets, and delivers the rich telemetry needed for sharp detection engineering and seamless red/blue team coordination.
CARDS
Purple Team Capabilities
| Capability | What You Get |
|---|---|
| Phishing | Design and deliver controlled phishing campaigns. Capture click/credential telemetry to tune mail flow, create rules, and validate SOC detection coverage. |
| Endpoint Compromise | Execute controlled payloads and persistence techniques. Validate your EDR's visibility, process tree logging, and alert fidelity to feed data back into detection engineering. |
| Credential Access | Perform password spraying, credential reuse, and privilege escalation attempts. Measure how well your authentication layers detect and prevent these attacks. |
| Ransomware | Trigger non-destructive encryption activity against decoy data. Validate your containment strategies, backup integrity, and that your alerting thresholds are set correctly. |
| Adversary Emulation | Run chained TTPs mapped to the MITRE ATT&CK® framework. Generate raw telemetry for threat hunting and to validate your detection logic. |
| Threat Intelligence Validation | Inject known threat indicators and TTP patterns. Confirm that your correlation, enrichment, and alerting workflows are functioning as expected. |
| Vulnerability Exploitation | Safely exploit authorized targets to confirm patching, configuration hardening, and monitoring effectiveness. Document any gaps for remediation. |
| Digital Forensics | Collect and analyze artifacts (disk, memory, logs). Reconstruct activity timelines to confirm your forensic readiness and log retention policies are up to the task. |