# Project Sentient
**Project Sentient** is an AI-powered command-line assistant designed for cybersecurity, automation, and digital forensics. First of its kind, Sentient acts as a helpful hacking AI, capable of understanding user commands and providing intelligent, conversational responses. It is modular, highly extensible, and leverages the Gemini API for advanced conversational AI—while giving the AI direct access to powerful cybersecurity, OSINT, and automation modules. This hybrid approach enables Sentient to not just chat, but to act, analyze, and automate complex security tasks far beyond standard AI assistants.
---
## Features
- **Conversational AI:** Uses Gemini API for natural, context-aware chat, but with direct access to all modules and system actions.
- **File Analysis:** Examine, edit, and understand files for suspicious content, malware, or improvements.
- **Virus Scanning:** Scan files or directories for potential malware or viruses.
- **PDF & Image Analysis:** Extract text, metadata, and scan for hidden or malicious content in PDFs and images.
- **SQL & Website Vulnerability Testing:** Scan websites for SQL injection, XSS, sensitive files, and interesting paths.
- **Traffic Sending & Imitation:** Send traffic or imitate real human traffic to websites.
- **Phishing Simulation:** Copy entire websites to demonstrate phishing attacks.
- **Malware & Virus Reverse Engineering:** Analyze and deconstruct malware or viruses.
- **Password & Key Encryption/Decryption:** Encrypt, decrypt, and crack passwords and keys.
- **Password Strength & Breach Checks:** Test password strength and check for breaches using public databases.
- **Google Dorking & OSINT:** Perform advanced search and open-source intelligence gathering.
- **Phone, Email, and Username Lookup:** Lookup and track phone numbers, emails, and usernames across platforms.
- **WHOIS, DNS, and Subdomain Enumeration:** Gather domain intelligence and enumerate subdomains.
- **Port Scanning & Directory Brute Forcing:** Scan ports and brute-force directories for hidden resources.
- **SSL/TLS Security Checks:** Analyze SSL/TLS configurations for vulnerabilities.
- **Log File Analysis:** Analyze log files for anomalies or security events.
- **Hash Generation, Identification, and Cracking:** Work with hashes for security and forensics.
- **GeoIP & Reverse IP Lookup:** Find the geographical location of IPs and enumerate domains on an IP.
- **Shodan & VirusTotal Integration:** Search Shodan and scan files/URLs with VirusTotal.
- **Username Checks & OSINT:** Check username availability and gather OSINT.
- **Packet Capture & Analysis:** Analyze network packet captures (pcap files).
- **Subdomain Takeover Detection:** Detect vulnerable subdomains.
- **CVE Search:** Search for recent vulnerabilities (CVEs) for any software or technology.
- **JWT Decoding & Analysis:** Decode and analyze JWT tokens.
- **URL Expansion & Shortening:** Expand shortened URLs and check for malicious redirects.
- **File Type Identification:** Identify file types based on content, not just extension.
- **Custom Wordlist Generation:** Generate wordlists for brute-forcing.
- **Threat Intelligence Feeds:** Pull and search latest threat intel from public feeds.
- **YARA Rule Scanning:** Scan files with YARA rules for malware detection.
- **Automated Report Generation:** Generate detailed PDF/HTML reports for scans and analyses.
- **Scheduling & Automation:** Schedule scans and recurring tasks.
- **Slack/Discord/Webhook Integration:** Send alerts or results to Slack, Discord, or via webhooks.
- **Plugin System:** Easily add your own Python modules for new features.
- **Auto-Update:** Self-update from the official repository.
- **And much more—constantly evolving to meet new threats and challenges!**
---
## Memory & Persistence
Sentient uses a MongoDB connection string (URI) to remember and store analysis results, file content, and other persistent data across sessions.
**You will be prompted to enter your MongoDB connection string when starting Sentient.**
If you do not have a MongoDB URI or are unsure how to set one up, you can request access or assistance by emailing:
**muhammadhuzaifakhalidaziz@gmail.com**
---
## Getting Started
1. **Clone the repository:**
```sh
git clone https://github.com/yourusername/sentient.git
cd sentient
```
2. **Install dependencies:**
```sh
pip install -r requirements.txt
```
3. **Run the assistant:**
```sh
python Sentient.py
```
4. **Configure your API key:**
- Open `Sentient.py` and add your API key when prompted.
---
## Usage
Interact with Sentient through the command line. Type your cybersecurity or automation queries and receive intelligent responses. Type `exit` or `quit` to end the session.
**Access Key:** Google Gemini API Token.
if needed email muhammadhuzaifakhalidaziz@gmail.com for a Premium Api key/Token.
---
## Example Commands
- `scan website example.com`
- `analyze file C:\path\to\file.exe`
- `email lookup test@example.com`
- `phone lookup +1234567890`
- `geoip lookup 8.8.8.8`
- `shodan search apache`
- `virustotal scan C:\path\to\file.exe`
- `jwt decode <token>`
- `cve search apache`
- `subdomain takeover example.com`
- `packet analyze C:\path\to\capture.pcap`
- `export last scan scan_results.txt`
- ...and many more!
---
## Disclaimer
This project is intended for educational and ethical cybersecurity purposes only.
**The creator is not responsible for any misuse, illegal activity, or damage caused by the use of this software.**
Users are solely responsible for ensuring their actions comply with all applicable laws and regulations.
---
## License
This project is licensed under the **Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0)**.
- **You may not use the material for commercial purposes.**
- **You may not distribute modified versions of the project.**
- **You must give appropriate credit if you share the project.**
For more details, see [CC BY-NC-ND 4.0 License](https://creativecommons.org/licenses/by-nc-nd/4.0/)
Raw data
{
"_id": null,
"home_page": "https://github.com/x0as/Sentient",
"name": "sentient-ai",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.7",
"maintainer_email": null,
"keywords": "cybersecurity, automation, ai, hacking, penetration-testing, osint",
"author": "x0as",
"author_email": "muhammadhuzaifakhalidaziz@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/6b/b3/33a658088259f67df358f62ef32ecf62c967e17efc6913a4a03067e832ad/sentient_ai-1.0.3.tar.gz",
"platform": null,
"description": "# Project Sentient\r\n\r\n**Project Sentient** is an AI-powered command-line assistant designed for cybersecurity, automation, and digital forensics. First of its kind, Sentient acts as a helpful hacking AI, capable of understanding user commands and providing intelligent, conversational responses. It is modular, highly extensible, and leverages the Gemini API for advanced conversational AI\u00e2\u20ac\u201dwhile giving the AI direct access to powerful cybersecurity, OSINT, and automation modules. This hybrid approach enables Sentient to not just chat, but to act, analyze, and automate complex security tasks far beyond standard AI assistants.\r\n\r\n---\r\n\r\n## Features\r\n\r\n- **Conversational AI:** Uses Gemini API for natural, context-aware chat, but with direct access to all modules and system actions.\r\n- **File Analysis:** Examine, edit, and understand files for suspicious content, malware, or improvements.\r\n- **Virus Scanning:** Scan files or directories for potential malware or viruses.\r\n- **PDF & Image Analysis:** Extract text, metadata, and scan for hidden or malicious content in PDFs and images.\r\n- **SQL & Website Vulnerability Testing:** Scan websites for SQL injection, XSS, sensitive files, and interesting paths.\r\n- **Traffic Sending & Imitation:** Send traffic or imitate real human traffic to websites.\r\n- **Phishing Simulation:** Copy entire websites to demonstrate phishing attacks.\r\n- **Malware & Virus Reverse Engineering:** Analyze and deconstruct malware or viruses.\r\n- **Password & Key Encryption/Decryption:** Encrypt, decrypt, and crack passwords and keys.\r\n- **Password Strength & Breach Checks:** Test password strength and check for breaches using public databases.\r\n- **Google Dorking & OSINT:** Perform advanced search and open-source intelligence gathering.\r\n- **Phone, Email, and Username Lookup:** Lookup and track phone numbers, emails, and usernames across platforms.\r\n- **WHOIS, DNS, and Subdomain Enumeration:** Gather domain intelligence and enumerate subdomains.\r\n- **Port Scanning & Directory Brute Forcing:** Scan ports and brute-force directories for hidden resources.\r\n- **SSL/TLS Security Checks:** Analyze SSL/TLS configurations for vulnerabilities.\r\n- **Log File Analysis:** Analyze log files for anomalies or security events.\r\n- **Hash Generation, Identification, and Cracking:** Work with hashes for security and forensics.\r\n- **GeoIP & Reverse IP Lookup:** Find the geographical location of IPs and enumerate domains on an IP.\r\n- **Shodan & VirusTotal Integration:** Search Shodan and scan files/URLs with VirusTotal.\r\n- **Username Checks & OSINT:** Check username availability and gather OSINT.\r\n- **Packet Capture & Analysis:** Analyze network packet captures (pcap files).\r\n- **Subdomain Takeover Detection:** Detect vulnerable subdomains.\r\n- **CVE Search:** Search for recent vulnerabilities (CVEs) for any software or technology.\r\n- **JWT Decoding & Analysis:** Decode and analyze JWT tokens.\r\n- **URL Expansion & Shortening:** Expand shortened URLs and check for malicious redirects.\r\n- **File Type Identification:** Identify file types based on content, not just extension.\r\n- **Custom Wordlist Generation:** Generate wordlists for brute-forcing.\r\n- **Threat Intelligence Feeds:** Pull and search latest threat intel from public feeds.\r\n- **YARA Rule Scanning:** Scan files with YARA rules for malware detection.\r\n- **Automated Report Generation:** Generate detailed PDF/HTML reports for scans and analyses.\r\n- **Scheduling & Automation:** Schedule scans and recurring tasks.\r\n- **Slack/Discord/Webhook Integration:** Send alerts or results to Slack, Discord, or via webhooks.\r\n- **Plugin System:** Easily add your own Python modules for new features.\r\n- **Auto-Update:** Self-update from the official repository.\r\n- **And much more\u00e2\u20ac\u201dconstantly evolving to meet new threats and challenges!**\r\n\r\n---\r\n\r\n## Memory & Persistence\r\n\r\nSentient uses a MongoDB connection string (URI) to remember and store analysis results, file content, and other persistent data across sessions. \r\n**You will be prompted to enter your MongoDB connection string when starting Sentient.**\r\n\r\nIf you do not have a MongoDB URI or are unsure how to set one up, you can request access or assistance by emailing: \r\n**muhammadhuzaifakhalidaziz@gmail.com**\r\n\r\n---\r\n\r\n## Getting Started\r\n\r\n1. **Clone the repository:**\r\n ```sh\r\n git clone https://github.com/yourusername/sentient.git\r\n cd sentient\r\n ```\r\n\r\n2. **Install dependencies:**\r\n ```sh\r\n pip install -r requirements.txt\r\n ```\r\n\r\n3. **Run the assistant:**\r\n ```sh\r\n python Sentient.py\r\n ```\r\n\r\n4. **Configure your API key:**\r\n - Open `Sentient.py` and add your API key when prompted.\r\n\r\n---\r\n\r\n## Usage\r\n\r\nInteract with Sentient through the command line. Type your cybersecurity or automation queries and receive intelligent responses. Type `exit` or `quit` to end the session.\r\n\r\n**Access Key:** Google Gemini API Token. \r\nif needed email muhammadhuzaifakhalidaziz@gmail.com for a Premium Api key/Token.\r\n\r\n---\r\n\r\n## Example Commands\r\n\r\n- `scan website example.com`\r\n- `analyze file C:\\path\\to\\file.exe`\r\n- `email lookup test@example.com`\r\n- `phone lookup +1234567890`\r\n- `geoip lookup 8.8.8.8`\r\n- `shodan search apache`\r\n- `virustotal scan C:\\path\\to\\file.exe`\r\n- `jwt decode <token>`\r\n- `cve search apache`\r\n- `subdomain takeover example.com`\r\n- `packet analyze C:\\path\\to\\capture.pcap`\r\n- `export last scan scan_results.txt`\r\n- ...and many more!\r\n\r\n---\r\n\r\n## Disclaimer\r\n\r\nThis project is intended for educational and ethical cybersecurity purposes only. \r\n**The creator is not responsible for any misuse, illegal activity, or damage caused by the use of this software.** \r\nUsers are solely responsible for ensuring their actions comply with all applicable laws and regulations.\r\n\r\n---\r\n\r\n## License\r\n\r\nThis project is licensed under the **Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0)**.\r\n\r\n- **You may not use the material for commercial purposes.**\r\n- **You may not distribute modified versions of the project.**\r\n- **You must give appropriate credit if you share the project.**\r\n\r\nFor more details, see [CC BY-NC-ND 4.0 License](https://creativecommons.org/licenses/by-nc-nd/4.0/)\r\n",
"bugtrack_url": null,
"license": null,
"summary": "AI-powered cybersecurity and automation toolkit",
"version": "1.0.3",
"project_urls": {
"Bug Reports": "https://github.com/x0as/Sentient/issues",
"Homepage": "https://github.com/x0as/Sentient",
"Source": "https://github.com/x0as/Sentient"
},
"split_keywords": [
"cybersecurity",
" automation",
" ai",
" hacking",
" penetration-testing",
" osint"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "5acca226907fe3fc48baf2212ac3065129458a169ea9cf31fac5a9ca5b4d6c21",
"md5": "b5f81f61200908af04c482b0c59c322d",
"sha256": "6e0a15d6c86523b3d4996fc9ee05f5a2d9a53fa84640596521b39b2f280e2088"
},
"downloads": -1,
"filename": "sentient_ai-1.0.3-py3-none-any.whl",
"has_sig": false,
"md5_digest": "b5f81f61200908af04c482b0c59c322d",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.7",
"size": 30330,
"upload_time": "2025-08-23T10:28:56",
"upload_time_iso_8601": "2025-08-23T10:28:56.139406Z",
"url": "https://files.pythonhosted.org/packages/5a/cc/a226907fe3fc48baf2212ac3065129458a169ea9cf31fac5a9ca5b4d6c21/sentient_ai-1.0.3-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "6bb333a658088259f67df358f62ef32ecf62c967e17efc6913a4a03067e832ad",
"md5": "37b043972cc978fb6ae0b7a4ae7df2a7",
"sha256": "966c4f2c595ac8ce8a933c8b73da2257dd9f333752e5f55691a8675692968f52"
},
"downloads": -1,
"filename": "sentient_ai-1.0.3.tar.gz",
"has_sig": false,
"md5_digest": "37b043972cc978fb6ae0b7a4ae7df2a7",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.7",
"size": 26117,
"upload_time": "2025-08-23T10:28:57",
"upload_time_iso_8601": "2025-08-23T10:28:57.687373Z",
"url": "https://files.pythonhosted.org/packages/6b/b3/33a658088259f67df358f62ef32ecf62c967e17efc6913a4a03067e832ad/sentient_ai-1.0.3.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-08-23 10:28:57",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "x0as",
"github_project": "Sentient",
"github_not_found": true,
"lcname": "sentient-ai"
}