Your AI-powered cybersecurity assistant for ethical hacking, penetration testing, and security research.
CyberQueryAI transforms natural language into precise cybersecurity commands, scripts, and insights using advanced AI language models. Designed specifically for cybersecurity professionals, ethical hackers, and security researchers, this tool dramatically increases productivity while fostering learning and growth within the cybersecurity community.
Important: Ollama must be running locally on your system for this application to function.
See CyberQueryAI in action! These screenshots showcase the intuitive interface and powerful capabilities that make cybersecurity tasks faster and more accessible. Experience natural language command generation, comprehensive tool explanations, and seamless workflow integration - all designed to accelerate your security research and testing.
- Why CyberQueryAI?
- Key Features
- Web Application Pages
- Getting Started
- Technology Stack
- Documentation
- Security Policy & Ethics
- License
Traditional cybersecurity work often involves memorizing complex command syntax, researching tool parameters, and manually crafting scripts for specific scenarios. CyberQueryAI eliminates these productivity bottlenecks by providing:
- Instant Code Generation: Convert natural language descriptions into precise CLI commands or multi-language scripts (Python, Bash, PowerShell, etc.) for tools like nmap, metasploit, john, hydra, and more
- Educational Value: Learn how security tools work through detailed explanations and examples
- Vulnerability Research: Discover known exploits and attack vectors relevant to specific targets
- Time Savings: Reduce command lookup time from minutes to seconds
- Knowledge Transfer: Bridge the gap between experienced professionals and newcomers to cybersecurity
Whether you're conducting authorized penetration tests, participating in CTF competitions, or learning cybersecurity fundamentals, CyberQueryAI accelerates your workflow while maintaining ethical standards.
- Primary interaction method for natural, context-aware assistance
- Full conversation history maintained across your session
- Ask questions, request commands/scripts, and get explanations in one place
- Perfect for learning workflows and iterative problem-solving
- Code block rendering with syntax highlighting and copy functionality
- Natural language to code translation (CLI commands or scripts in Python, Bash, PowerShell, JavaScript, etc.)
- Context-aware parameter suggestions optimized for Kali Linux environments
- Support for network scanning, vulnerability assessment, password cracking, and more
- Tailored for cybersecurity use cases including exploit development, data parsing, and tool automation
- Complete with explanations to help you understand and modify the code
- Rate-limited API (5 requests/minute) to ensure responsible usage
- Detailed breakdowns of complex commands and scripts with their parameters
- Security risk assessment and potential impact analysis
- Educational explanations to build your cybersecurity knowledge
- Find known vulnerabilities and CVEs for specific targets
- Suggest attack vectors based on service descriptions
- Link to relevant exploit databases and proof-of-concept code
- Severity ratings and impact assessments
- All inputs and outputs are sanitized using
bleachto prevent injection attacks - Rate limiting prevents abuse and ensures fair usage
- CORS protection and secure API design
- Clear ethical guidelines and usage policies
CyberQueryAI's intuitive web interface provides specialized tools for different cybersecurity workflows:
The primary interface for interacting with CyberQueryAI - a conversational AI assistant with full chat history:
- Conversational Experience: Natural back-and-forth dialogue with context awareness
- Universal Capability: Can handle all types of requests (commands, scripts, explanations, exploit research)
- Learning-Friendly: Perfect for asking follow-up questions and iterative problem-solving
- Code Rendering: Beautiful syntax-highlighted code blocks with copy functionality
- Example: "How do I scan a network with nmap?" → Detailed explanation + follow-up questions like "Can you show me the stealth scan version?"
Tip: Start here for most tasks - the AI Assistant provides the most natural and flexible interaction model.
Focused interface for converting natural language into executable security code. The AI automatically infers whether to generate a command or a script:
- Command Example: "Scan a network for open ports" →
nmap -sS -O 192.168.1.0/24 - Script Example: "Create a port scanner in Python" → Complete Python script with threading and error handling
- Supports multiple programming languages: Python, Bash, PowerShell, JavaScript, and more
- Includes explanations to help you understand the generated code
Understand complex security commands and scripts through detailed analysis. The AI automatically detects the code type:
- Parameter-by-parameter breakdowns for commands
- Line-by-line code analysis for scripts
- Security implications and risks
- Alternative approaches and variations
- Optimization suggestions and best practices
- Command Example:
nmap -sS -O 192.168.1.0/24→ Detailed explanation of SYN scan, OS detection, and target specification - Script Example: Analyze a privilege escalation script to understand its methodology
Research known vulnerabilities and attack vectors:
- CVE lookups and exploit databases
- Attack vector suggestions for specific targets
- Severity assessments and impact analysis
- Links to proof-of-concept code and patches
- Example: "WordPress 5.4.2 with outdated plugins" → List of relevant CVEs and exploit techniques
Comprehensive information about the application, including:
- Detailed feature explanations
- Security policies and ethical guidelines
- Usage best practices and safety reminders
- Technical implementation details
- Ollama: Download and install from ollama.ai
- Python 3.12+: Required for the backend application
- AI Model: Pull a compatible model using Ollama (e.g.,
ollama pull mistral)
Note: You can configure the LLMs used in the application by editing the config.json file.
- Download the latest release from GitHub Releases
- Extract the archive
- Run the installer:
- Linux/macOS:
./install_cyber_query_ai.sh - Windows:
install_cyber_query_ai.bat
- Linux/macOS:
# Clone the repository
git clone https://github.com/javidahmed64592/cyber-query-ai.git
cd cyber-query-ai
# Install using uv (recommended)
uv sync --extra dev
# Or using pip
pip install -e .
# Build and run the frontend (optional for development)
cd cyber-query-ai-frontend
npm install
npm run dev-
Start Ollama: Ensure Ollama is running locally:
ollama serve
-
Configure the model: Edit
config.jsonto specify your preferred AI model:{ "model": "mistral", "embedding_model": "bge-m3", "host": "localhost", "port": 8000 }Note: This
config.jsonfile is the single source of truth for all configuration settings, including server host/port and AI model selection. -
Launch the application:
cyber-query-ai
-
Access the web interface: Open your browser to
http://localhost:8000
- FastAPI: High-performance async web framework with automatic API documentation
- LangChain: LLM integration and prompt management
- Ollama: Local AI model hosting and inference
- Pydantic: Data validation and serialization
- SlowAPI: Rate limiting for responsible usage
- Bleach: Input/output sanitization for security
- Next.js 16: Modern React framework with App Router
- TypeScript: Type-safe development
- Tailwind CSS: Utility-first styling framework
- Framer Motion: Smooth animations and transitions
- DOMPurify: Client-side sanitization
- pytest: Comprehensive backend testing
- Jest: Frontend unit testing
- Ruff: Python code formatting and linting
- ESLint/Prettier: JavaScript/TypeScript code quality
- GitHub Actions: Automated CI/CD pipeline
- uv: Fast Python package management
Detailed documentation is available in the docs/ directory:
- API.md: Complete API endpoint documentation with examples
- ARCHITECTURE.md: Technical architecture and component overview
- SMG.md: Software maintenance guide for developers
- WORKFLOWS.md: CI/CD pipeline and development workflows
Additional resources:
- Security Policy: Vulnerability reporting and security guidelines
- Release Notes: Deployment and installation instructions
CyberQueryAI is designed exclusively for ethical cybersecurity research, authorized penetration testing, and educational purposes.
- Authorization Required: Only use on systems you own or have explicit written permission to test
- Educational Focus: Designed to accelerate learning and skill development
- Responsible Disclosure: Follow proper vulnerability reporting procedures
- Community Growth: Foster knowledge sharing and collaboration
- Unauthorized access to computer systems
- Real-world exploitation or malicious activities
- Violation of computer crime laws or regulations
- Any activity that could cause harm to individuals or organizations
By using CyberQueryAI, you agree to use it responsibly and ethically. Users are solely responsible for their actions and compliance with applicable laws.
This project is licensed under the MIT License - see the LICENSE file for details.
Ready to supercharge your cybersecurity workflow? Install CyberQueryAI today and join the growing community of security professionals using AI to enhance their capabilities while maintaining the highest ethical standards.


