Metadata-Version: 2.4
Name: raven-vapt
Version: 0.1.0
Summary: Offline-first AI-powered VAPT framework for Linux
Author: RAVEN Contributors
License: MIT
License-File: LICENSE
Keywords: nmap,offline-llm,pentest,security,vapt
Classifier: Development Status :: 3 - Alpha
Classifier: Environment :: Console
Classifier: Intended Audience :: Information Technology
Classifier: Intended Audience :: System Administrators
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: POSIX :: Linux
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.12
Classifier: Topic :: Security
Requires-Python: >=3.12
Requires-Dist: chromadb>=1.5.8
Requires-Dist: jinja2>=3.1.6
Requires-Dist: litellm>=1.83.0
Requires-Dist: markdown>=3.10.2
Requires-Dist: netifaces>=0.11.0
Requires-Dist: psutil>=7.2.2
Requires-Dist: pydantic>=2.0
Requires-Dist: pymetasploit3>=1.0.6
Requires-Dist: pytest-asyncio>=1.3.0
Requires-Dist: pytest>=9.0.3
Requires-Dist: python-dotenv>=1.2.2
Requires-Dist: python-nmap>=0.7.1
Requires-Dist: rich>=15.0.0
Requires-Dist: sentence-transformers>=5.4.1
Requires-Dist: sqlmodel>=0.0.38
Requires-Dist: typer>=0.25.0
Description-Content-Type: text/markdown

# RAVEN

Recon Automation & Vulnerability Enumeration Network (RAVEN) is an offline-first,
AI-assisted VAPT framework for Linux.

## Prerequisites

- Python 3.12+
- `uv` package manager
- `nmap`
- `ollama` with a local model (example: `qwen2.5:14b`)
- Optional for Phase 2: Metasploit (`msfconsole`, `msfrpcd`)

## Installation

```bash
git clone <repo-url>
cd raven
uv sync
cp .env.example .env
```

Set your `.env` for local LLM operation:

```bash
RAVEN_LLM_PROVIDER=ollama
RAVEN_MODEL=qwen2.5:14b
OLLAMA_BASE_URL=http://localhost:11434
RAVEN_AUTHORIZED=true
```

## Quick Start

Show commands:

```bash
uv run raven --help
```

Run reconnaissance:

```bash
uv run raven scan --target 192.168.1.0/24 --profile normal
```

Auto-detect local subnet(s):

```bash
uv run raven scan
```

Resume interrupted scan:

```bash
uv run raven resume --session <session_id>
```

Update local CVE database:

```bash
uv run raven update-cve-db
```

Run exploitation phase on saved recon:

```bash
uv run raven exploit --session <session_id>
```

## Example Output (abbreviated)

```text
RAVEN starting... profile=quick
RAVEN Target Resolution
manual | - | 127.0.0.1 | - | -
Recon complete: live_hosts=1, total_open_ports=49
Saved MD report: ~/.raven/runs/recon-<id>/report.md
Saved HTML report: ~/.raven/runs/recon-<id>/report.html
Saved JSON report: ~/.raven/runs/recon-<id>/report.json
```

## Safety Notes

- Only scan assets you are explicitly authorized to test.
- Use `RAVEN_AUTHORIZED_SCOPE` to restrict allowed targets.
- Exploitation requires HITL approval for each action.
