____ _ __ __ ___ __ __
| _ \ / \ \ \ / / / _ \ \ \/ /
| |_) |/ _ \ \ \ / / | | | | \ /
| _ <| ___ \ \ V / | |_| | / \
|_| \_\_| \_\ \_/ \___/ /_/\_\
Recon Automated Vulnerability Observation eXecutor
RAVOX is an advanced, automated reconnaissance pipeline designed for Bug Bounty hunters and Penetration Testers. It streamlines the process of asset discovery, chaining together industry-standard tools (ProjectDiscovery suite) and enhancing the results with Generative AI (Mistral AI) to identify potential vulnerabilities like IDOR, SQLi, and XSS automatically.
- ⚡ Automated Pipeline: Seamlessly chains Subdomain Enumeration -> DNS Resolution -> Port Scanning -> Web Probing -> Crawling.
- 🤖 AI-Powered Analysis: Integrated Mistral AI to analyze crawled URLs and highlight high-risk endpoints (IDOR, XSS, SQLi) in a readable text report.
- 📂 Dynamic Organization: Automatically creates output directories based on the target domain and current timestamp.
- 🔶 Proxy Support: Route traffic through Burp Suite or any other HTTP proxy for manual inspection.
- 🎨 Rich UI/UX: Features modern progress bars, status icons, and high-intensity color formatting for better readability.
- 💾 Smart Reporting: Generates both raw data files and a summarized final report.
Before running RAVOX, ensure you have the following tools installed. The script requires Go (Golang) and Python 3.
go install -v [github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest](https://github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest)
go install -v [github.com/projectdiscovery/dnsx/cmd/dnsx@latest](https://github.com/projectdiscovery/dnsx/cmd/dnsx@latest)
go install -v [github.com/projectdiscovery/naabu/v2/cmd/naabu@latest](https://github.com/projectdiscovery/naabu/v2/cmd/naabu@latest)
go install -v [github.com/projectdiscovery/httpx/cmd/httpx@latest](https://github.com/projectdiscovery/httpx/cmd/httpx@latest)
go install -v [github.com/projectdiscovery/katana/cmd/katana@latest](https://github.com/projectdiscovery/katana/cmd/katana@latest)# Kali Linux / Debian / Ubuntu
sudo apt update
sudo apt install python3 jq fonts-noto-color-emoji -yClone the repository and make the script executable:
git clone [https://github.com/yourusername/ravox.git](https://github.com/yourusername/ravox.git)
cd ravox
chmod +x ravox.shYou can use RAVOX in Interactive Mode (Wizard) or CLI Mode (Flags).
Simply run the script without arguments:
./ravox.shThe wizard will ask for the target domain, output directory, proxy settings, and API keys.
For fast, scripted usage:
# Basic Scan
./ravox.sh -d example.com
# Scan with AI Analysis (Requires API Key)
./ravox.sh -d example.com --llm
# Scan with Burp Proxy & AI
./ravox.sh -d example.com -p [http://127.0.0.1:8080](http://127.0.0.1:8080) --llm
# Scan from a list of targets
./ravox.sh -l targets.txt| Flag | Description |
|---|---|
-d, --domain |
Target domain (e.g., tesla.com) |
-l, --list |
Path to a file containing a list of domains |
-o, --output |
Base output directory (Default: ravox_results) |
-p, --proxy |
HTTP Proxy URL (e.g., http://127.0.0.1:8080) |
--llm |
Enable Mistral AI analysis (Prompt for Key) |
--dry-run |
Show commands without executing them |
-h, --help |
Show the help menu |
RAVOX uses the Mistral AI API (mistral-small-latest) to analyze crawled JavaScript files and API endpoints.
- When prompted, enter your Mistral API Key.
- The tool sends the top 50 crawled URLs to the AI.
- The AI analyzes them for keywords and patterns related to IDOR, SQL Injection, and XSS.
- A readable report is saved as
llm_analysis.txtin the output folder.
Tip: You can export your key permanently to avoid typing it every time:
export MISTRAL_API_KEY="your_key_here"
RAVOX keeps your workspace clean. Results are saved in: ravox_results/domain_date_time/
ravox_results/
└── example.com_2025-11-21_12-00/
├── subfinder.txt # All found subdomains
├── dnsx.txt # Active (resolved) subdomains
├── naabu.txt # Open ports
├── httpx.txt # Live web services (URLs)
├── katana.txt # Crawled endpoints and parameters
└── llm_analysis.txt # AI Vulnerability Report 🧠
RAVOX is intended for educational purposes and authorized security testing only. Do not use this tool on targets you do not have explicit permission to test. The author is not responsible for any misuse or damage caused by this tool.
Developed by: [Your Name/Alias] Final Project: Offensive Security Tool Development
Happy Hunting! 🚀