Nebula is an AI-powered penetration testing assistant that automates reconnaissance, vulnerability analysis, and note-taking to enhance security workflows.
AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.
Nebula is designed for cybersecurity professionals, ethical hackers, and developers to streamline penetration testing by integrating advanced AI models directly into the CLI. It automates vulnerability assessments, provides real-time insights, and supports seamless integration with existing security tools to improve efficiency and accuracy during engagements.
Nebula requires substantial system resources (minimum 16GB RAM) for local AI model inference and Python 3.11+. Users should install Ollama for local model usage or set up OpenAI API keys for cloud models. Docker usage requires allowing local X server connections (xhost +local:docker). The tool supports multiple AI models and seamless integration with CLI-based security tools, enhancing automation and real-time analysis during penetration testing engagements.
Ensure system has at least 16GB RAM and Python 3.11 or higher
Install Ollama for local model inference (optional, supports GPU)
Run command: python -m pip install nebula-ai --upgrade
Download preferred AI models using Ollama (e.g., ollama pull mistral)
Set OpenAI API key in environment variable for OpenAI model usage (export OpenAI_API_KEY="your_key")
nebula
Launches the Nebula AI-powered penetration testing CLI interface
ollama pull mistral
Downloads the Mistral AI model for local inference via Ollama
export OpenAI_API_KEY="sk-blah-blaj"
Sets the OpenAI API key environment variable for using OpenAI models
docker run --rm -it -e DISPLAY=$DISPLAY -v /home/YOUR_HOST_NAME/.local/share/nebula/logs:/root/.local/share/nebula/logs -v YOUR_ENGAGEMENT_FOLDER_ON_HOST_MACHINE:/engagements -v /tmp/.X11-unix:/tmp/.X11-unix berylliumsec/nebula:latest
Runs Nebula inside a Docker container with GUI support and volume mounts for logs and engagements
! write a python script to scan the ports of a remote system
Example input to interact with the AI model to generate a port scanning script; '!' prefix invokes AI mode