Quantum-grade offensive security framework for demanding Red Teams. Modular, extensible and brutally efficient. Zero tracking. Zero telemetry. Fully auditable code.
Elite capabilities for reconnaissance, exploitation and automated reporting.
14 attack categories covering injection, server-side, auth bypass, protocol-level, API, infrastructure and more. Standardized run(target, ip, ports, banners) interface.
Native integration with Nmap, Subfinder, Amass, Katana, Nuclei, Shodan, Nikto, WHOIS/RDAP, Traceroute and the entire modern OSINT ecosystem.
Cinematic boot sequence with ASCII art fade-in, typewriter effects, Rich progress bars, Live interactive panel and Security Intel tips during scans.
Automatic reports in PDF (ReportLab), Markdown and JSON with findings categorized by severity β CRITICAL, HIGH, MEDIUM, LOW, INFO.
Armored pipeline: Bandit SAST, CodeQL, Ruff, pip-audit, Semgrep, OpenSSF Scorecard, pre-commit hooks. Pinned dependencies and token permissions.
ANSI escape sanitizer against terminal injection, graceful shutdown (SIGINT/SIGTERM/SIGPIPE), findings correlation and smart deduplication.
85 security plugins organized across 14 specialized attack categories.
| Category | Plugins | Key Techniques |
|---|---|---|
| Injection & Code Execution | 7 | XSS polyglot, SQLi (time/error/union/blind), SSTI multi-engine, RCE, NoSQL ($gt/$ne/$regex), Log4Shell (12 headers + 5 WAF bypass) |
| Server-Side Attacks | 4 | SSRF (IMDSv2, DNS rebinding, gopher://), XXE OOB exfiltration, LFI wrapper protocols, Path Traversal encoding bypass |
| Authentication & Authorization | 6 | JWT none/key confusion/JWKS, OAuth PKCE/state/redirect, CSRF SameSite, IDOR sequential/UUID, Session Fixation |
| Protocol-Level Attacks | 4 | HTTP Smuggling (CL-TE/TE-CL/TE-TE), HTTP/2 desync + HPACK injection, WebSocket CSWSH, gRPC reflection |
| Defense Analysis & Bypass | 7 | CORS wildcard/null origin, CSP unsafe-inline/eval bypass, Clickjacking, Host Header, Cache Poison, Rate Limit, WAF bypass |
| API Security | 4 | GraphQL introspection/batch/alias overload, API endpoint discovery, version detection, OpenAPI exposure |
| Advanced Web Attacks | 6 | Mass Assignment isAdmin, Race Condition TOCTOU, Prototype Pollution __proto__, Deserialization multi-lang, Open Redirect, CRLF |
| Infrastructure Exposure | 8 | Docker 2375/2376, K8s API/etcd/kubelet, Redis unauth RCE, MongoDB no-auth, Elastic/Kibana, CI/CD artifacts, Cloud IMDS |
| Reconnaissance & OSINT | 11 | Subdomains CT/DNS brute/zone transfer, DNS deep (12 record types), WHOIS/RDAP, Shodan, Wayback, Email spoof SPF/DKIM/DMARC, Traceroute |
| Information Gathering | 7 | Tech fingerprint Wappalyzer-style, JS API key extraction, Param miner, Info disclosure (.env/.git), Secrets scraper regex, Git dumper |
| Web Scanning | 7 | Dir bruteforce wordlist, Nikto integration, Katana deep crawler, HTTP methods (OPTIONS/TRACE/PUT), WordPress, Nuclei templates |
| Cloud & Storage | 2 | S3 bucket public ACL misconfiguration, SAML signature wrapping + assertion injection |
| Analysis & Profiling | 5 | SSL/TLS cert + cipher audit, WAF fingerprint 30+ products, Nmap advanced scripts + OS fingerprint, Auto exploit CVE matching |
| Brute Force & Auth Testing | 6 | SSH/FTP/SMB/SMTP brute force, Heartbleed CVE-2014-0160, DNS zone transfer AXFR |
Designed with defensive security principles at every layer.
Anti-terminal injection: strips OSC/DCS/cursor sequences, preserves SGR colors
Graceful shutdown SIGINT/SIGTERM/SIGPIPE with async-signal-safe os.write()
Standard run(target, ip, ports, banners) β dict interface with validated schema
Fade-in logo with 256-color ramp, TTY detection, pipe/CI fallback
Auto lib check on import, friendly error messages, zero crash
Version-pinned deps, pip-audit CI, pre-commit hooks, Scorecard 10/10
5 levels β CRITICAL π HIGH π΄ MEDIUM π‘ LOW π΅ INFO βͺ with visual icons
40+ threat intelligence tips and facts shown during scan waits
External tools with native integration for maximum attack surface coverage.
Integrated intelligence engine β 40+ tips and facts displayed during scans in real time.
Setup in 60 seconds. Requires Python 3.10+. Compatible with Linux, macOS and WSL.
# Clone and configure
git clone https://github.com/glferreira-devsecops/Cascavel.git
cd Cascavel
python3 -m venv venv && source venv/bin/activate
pip install -r requirements.txt
# Run
python3 cascavel.py --help
python3 cascavel.py -t target.com
Automated installer available: bash install.sh β 15+ environment checks including Python version, venv, external tools, connectivity.
Zero tracking. Zero data collection. Zero telemetry. 100% auditable code. MIT License.
Technical direction β open to contributions and community feedback.
Open-source project with transparent governance, full compliance and community-driven development.