๐ด RedAmon 2.0: From 0 to 1000 Github Stars in 10 Days โ Now With Multi-Agent Parallel Attacks
Skills:
Defensive AI90%
What happens when you unleash THREE autonomous AI agents against a target at the same time?
One brute-forces SSH credentials with Hydra. One chains a CVE to escalate to root and defaces the homepage. One hunts down every XSS vulnerability on the frontend. All running in parallel. All thinking independently. Zero human intervention.
This is RedAmon 2.0 โ and it changes everything.
Github: https://github.com/samugit83/redamon/tree/master
๐ WHAT'S NEW IN 2.0:
โโโโโโโโโโโโโโโโโโโโโ
โข Multi-Session Parallel Agents โ launch multiple independent attack sessions concurrently, each with its own reasoning loop, WebSocket stream, and tool access
โข EvoGraph โ real-time evolutionary attack chain visualization that grows live as agents discover, exploit, and pivot
โข Hydra Brute Force Path โ dedicated credential-guessing attack path supporting 50+ protocols (SSH, FTP, RDP, SMB, MySQL, HTTP formsโฆ) with massive performance gains over Metasploit auxiliary modules
โข Unclassified Attack Paths โ the agent now handles attack vectors beyond CVE exploits and brute force, including XSS hunting, logic flaws, and more
โข Chat Persistence & Conversation History โ every agent thought, tool call, and decision is saved and restorable across sessions
โข Project Export & Import โ full project portability via ZIP archives including Neo4j graph data, conversations, and artifacts
โข Data Table View โ tabular attack surface visualization with sorting, filtering, and Excel export
โข OpenAI-Compatible Provider โ plug in Ollama, LM Studio, vLLM, or any local model via a single endpoint
โข Cross-Session Awareness โ agents know what previous sessions already tried, avoiding redundant work
โข Per-Session Graph Controls โ toggle attack chain visibility per session on the graph canvas
๐ WHAT YOU'LL SEE IN THIS VIDEO:
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โข Three AI agents launched simultaneously against the same target
โข Agent 1: Hydra SSH brute force โ credential discovery โ shell access
โข Agent 2: CVE exploitat
Watch on YouTube โ
(saves to browser)
Sign in to unlock AI tutor explanation ยท โก30
More on: Defensive AI
View skill โRelated AI Lessons
โก
โก
โก
โก
Inside Consumer DVRs โ Hardware, Firmware & Network Security Evaluation
Medium ยท Cybersecurity
Cรณmo construimos un SOC con honeypot e IA local
Dev.to ยท Yoandy Ramirez Delgado
Credentials in web applications: how to store them properly
Dev.to ยท Ian Johnson
XSS Nedir ve Neden Hรขlรข Tehlikeli? | Bir Siber Gรผvenlik รฤrencisinin Notlarฤฑ
Medium ยท Cybersecurity
๐
Tutor Explanation
DeepCamp AI