⚠️ Legal Disclaimer
NeuralMind is intended strictly for educational purposes, ethical hacking, internal testing, and research.
The developer (Dev_Nand) is not responsible for misuse, damage, or unauthorized activities.
Never scan systems or networks without explicit permission
NeuralMind is an extensible, modular security framework designed to centralize Red Team operations.
Unlike monolithic tools, NeuralMind uses a Core + Modules architecture where each capability is a plug-and-play Python script placed inside the /modules directory.
New offensive or defensive modules can be added instantly — no rewrites needed.
| Module | Codename | Classification | Status |
|---|---|---|---|
| Static Analysis | Cortex |
SAST | ✅ Active |
| Steganography | Ghost |
Cryptography | ✅ Active |
| Network Recon | Vision |
Intelligence | ✅ Active |
git clone https://github.com/devnand-47/NeuralMind.git
cd NeuralMind
pip install -r requirements.txt
python main.py📘 Operations Manual
- Cortex — Static Analysis (SAST)
Identifies insecure coding patterns inside Python source files.
Scans for:
Hardcoded credentials
Dangerous calls (exec, eval)
SQL injection patterns
Weak input sanitization
Usage
[NeuralMind] > Select Module: 1
[Cortex] > Enter target file: targets/test.py
[!] ALERT: Hardcoded Password detected.
[!] ALERT: SQL Injection Risk detected.
- Ghost — Steganography (LSB)
Hides encrypted text payloads inside PNG images using Least Significant Bit encoding.
Modes:
E → Embed (Encrypt + Hide)
D → Decode (Reveal hidden data)
Constraints:
Only .png supported (lossless)
Usage
[NeuralMind] > Select Module: 2
[Ghost] > Mode: E
[Ghost] > Target Image: targets/cover.png
[Ghost] > Payload: "Operation starting at midnight."
[+] Success. Output saved to secret_image.png
- Vision — Network Reconnaissance
Maps local subnet and identifies alive hosts with lightweight active scanning.
Techniques:
ICMP Echo Requests
Raw Socket Connections
Demo Limits:
Scans IPs 1–50 in the detected subnet
Usage
[NeuralMind] > Select Module: 3
[Vision] > Enter Target IP: 192.168.1.1
[*] Scanning Subnet...
[+] Host Up: 192.168.1.1 (Gateway)
[+] Host Up: 192.168.1.45 (Workstation)
📂 Architecture Structure
NeuralMind/
├── modules/ # Plug-and-Play Capabilities
│ ├── __init__.py # Package Initialization
│ ├── cortex.py # SAST Logic
│ ├── ghost.py # Stego Logic
│ └── vision.py # Socket Logic
├── targets/ # Firing Range (Test files)
├── main.py # Central CLI Controller
└── requirements.txt # Dependency Manifest
NeuralMind is intended strictly for educational purposes, ethical hacking, internal testing, and research. The developer (Dev_Nand) is not responsible for misuse, damage, or unauthorized activities. Never scan systems or networks without explicit permission.