Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
<!DOCTYPE html>
< html lang = "en" >
< head >
< meta charset = "UTF-8" >
< meta name = "viewport" content = "width=device-width, initial-scale=1.0" >
< title > {% block title %}AUTARCH{% endblock %}< / title >
< link rel = "stylesheet" href = "{{ url_for('static', filename='css/style.css') }}" >
{% block extra_head %}{% endblock %}
< / head >
< body >
{% if session.get('user') %}
< div class = "layout" >
< nav class = "sidebar" >
< div class = "sidebar-header" >
< h2 > AUTARCH< / h2 >
< span class = "subtitle" > Security Platform< / span >
< / div >
< div class = "nav-section" >
< ul class = "nav-links" >
< li > < a href = "{{ url_for('dashboard.index') }}" class = "{% if request.endpoint == 'dashboard.index' %}active{% endif %}" > Dashboard< / a > < / li >
< li > < a href = "{{ url_for('targets.index') }}" class = "{% if request.blueprint == 'targets' %}active{% endif %}" > Targets< / a > < / li >
< / ul >
< / div >
< div class = "nav-section" >
< div class = "nav-section-title" > Categories< / div >
< ul class = "nav-links" >
Add Threat Monitor with drill-down popups, Hal agent mode, Windows defense, LLM trainer
- Threat Monitor: 7-tab monitoring page (live, connections, network intel,
threats, packet capture, DDoS mitigation, counter-attack) with real-time
SSE streaming and optimized data collection (heartbeat, cached subprocess
calls, bulk process name cache)
- Drill-down popups: Every live monitor stat is clickable, opening a popup
with detailed data (connections list with per-connection detail view,
GeoIP lookup, process kill, bandwidth, ARP spoof, port scan, DDoS status)
- Hal agent mode: Chat routes rewritten to use Agent system with
create_module tool, SSE streaming of thought/action/result steps
- Windows defense module with full security audit
- LLM trainer module and routes
- Defense landing page with platform-specific sub-pages
- Clean up stale files (get-pip.py, download.png, custom_adultsites.json)
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-02 21:08:11 -08:00
< li > < a href = "{{ url_for('defense.index') }}" class = "{% if request.blueprint == 'defense' and request.endpoint not in ('defense.linux_index', 'defense.windows_index', 'defense.monitor_index') %}active{% endif %}" > Defense< / a > < / li >
< li > < a href = "{{ url_for('defense.linux_index') }}" class = "{% if request.endpoint == 'defense.linux_index' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Linux< / a > < / li >
< li > < a href = "{{ url_for('defense.windows_index') }}" class = "{% if request.endpoint == 'defense.windows_index' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Windows< / a > < / li >
< li > < a href = "{{ url_for('defense.monitor_index') }}" class = "{% if request.endpoint == 'defense.monitor_index' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Threat Monitor< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('offense.index') }}" class = "{% if request.blueprint == 'offense' %}active{% endif %}" > Offense< / a > < / li >
< li > < a href = "{{ url_for('counter.index') }}" class = "{% if request.blueprint == 'counter' %}active{% endif %}" > Counter< / a > < / li >
< li > < a href = "{{ url_for('analyze.index') }}" class = "{% if request.blueprint == 'analyze' and request.endpoint != 'analyze.hash_detection' %}active{% endif %}" > Analyze< / a > < / li >
< li > < a href = "{{ url_for('analyze.hash_detection') }}" class = "{% if request.endpoint == 'analyze.hash_detection' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Hash Toolkit< / a > < / li >
Add Threat Monitor with drill-down popups, Hal agent mode, Windows defense, LLM trainer
- Threat Monitor: 7-tab monitoring page (live, connections, network intel,
threats, packet capture, DDoS mitigation, counter-attack) with real-time
SSE streaming and optimized data collection (heartbeat, cached subprocess
calls, bulk process name cache)
- Drill-down popups: Every live monitor stat is clickable, opening a popup
with detailed data (connections list with per-connection detail view,
GeoIP lookup, process kill, bandwidth, ARP spoof, port scan, DDoS status)
- Hal agent mode: Chat routes rewritten to use Agent system with
create_module tool, SSE streaming of thought/action/result steps
- Windows defense module with full security audit
- LLM trainer module and routes
- Defense landing page with platform-specific sub-pages
- Clean up stale files (get-pip.py, download.png, custom_adultsites.json)
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-02 21:08:11 -08:00
< li > < a href = "{{ url_for('llm_trainer.index') }}" class = "{% if request.blueprint == 'llm_trainer' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ LLM Trainer< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('osint.index') }}" class = "{% if request.blueprint == 'osint' %}active{% endif %}" > OSINT< / a > < / li >
< li > < a href = "{{ url_for('simulate.index') }}" class = "{% if request.blueprint == 'simulate' and request.endpoint != 'simulate.legendary_creator' %}active{% endif %}" > Simulate< / a > < / li >
< li > < a href = "{{ url_for('simulate.legendary_creator') }}" class = "{% if request.endpoint == 'simulate.legendary_creator' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Legendary Creator< / a > < / li >
< / ul >
< / div >
< div class = "nav-section" >
< div class = "nav-section-title" > Tools< / div >
< ul class = "nav-links" >
< li > < a href = "{{ url_for('encmodules.index') }}" class = "{% if request.blueprint == 'encmodules' %}active{% endif %}" style = "color:var(--danger,#f55)" > 🔒 Enc Modules< / a > < / li >
< li > < a href = "{{ url_for('wireshark.index') }}" class = "{% if request.blueprint == 'wireshark' %}active{% endif %}" > Wireshark< / a > < / li >
< li > < a href = "{{ url_for('hardware.index') }}" class = "{% if request.blueprint == 'hardware' %}active{% endif %}" > Hardware< / a > < / li >
< li > < a href = "{{ url_for('android_exploit.index') }}" class = "{% if request.blueprint == 'android_exploit' %}active{% endif %}" > Android Exploit< / a > < / li >
< li > < a href = "{{ url_for('iphone_exploit.index') }}" class = "{% if request.blueprint == 'iphone_exploit' %}active{% endif %}" > iPhone Exploit< / a > < / li >
< li > < a href = "{{ url_for('android_protect.index') }}" class = "{% if request.blueprint == 'android_protect' %}active{% endif %}" > Shield< / a > < / li >
< li > < a href = "{{ url_for('revshell.index') }}" class = "{% if request.blueprint == 'revshell' %}active{% endif %}" > Reverse Shell< / a > < / li >
< li > < a href = "{{ url_for('archon.index') }}" class = "{% if request.blueprint == 'archon' %}active{% endif %}" > Archon< / a > < / li >
< / ul >
< / div >
< div class = "nav-section" >
< div class = "nav-section-title" > System< / div >
< ul class = "nav-links" >
< li > < a href = "{{ url_for('upnp.index') }}" class = "{% if request.blueprint == 'upnp' %}active{% endif %}" > UPnP< / a > < / li >
< li > < a href = "{{ url_for('wireguard.index') }}" class = "{% if request.blueprint == 'wireguard' %}active{% endif %}" > WireGuard< / a > < / li >
< li > < a href = "{{ url_for('msf.index') }}" class = "{% if request.blueprint == 'msf' %}active{% endif %}" > MSF Console< / a > < / li >
Add Threat Monitor with drill-down popups, Hal agent mode, Windows defense, LLM trainer
- Threat Monitor: 7-tab monitoring page (live, connections, network intel,
threats, packet capture, DDoS mitigation, counter-attack) with real-time
SSE streaming and optimized data collection (heartbeat, cached subprocess
calls, bulk process name cache)
- Drill-down popups: Every live monitor stat is clickable, opening a popup
with detailed data (connections list with per-connection detail view,
GeoIP lookup, process kill, bandwidth, ARP spoof, port scan, DDoS status)
- Hal agent mode: Chat routes rewritten to use Agent system with
create_module tool, SSE streaming of thought/action/result steps
- Windows defense module with full security audit
- LLM trainer module and routes
- Defense landing page with platform-specific sub-pages
- Clean up stale files (get-pip.py, download.png, custom_adultsites.json)
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-02 21:08:11 -08:00
< li > < a href = "{{ url_for('settings.index') }}" class = "{% if request.blueprint == 'settings' and request.endpoint not in ('settings.llm_settings', 'settings.deps_index') %}active{% endif %}" > Settings< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('settings.llm_settings') }}" class = "{% if request.endpoint == 'settings.llm_settings' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ LLM Config< / a > < / li >
Add Threat Monitor with drill-down popups, Hal agent mode, Windows defense, LLM trainer
- Threat Monitor: 7-tab monitoring page (live, connections, network intel,
threats, packet capture, DDoS mitigation, counter-attack) with real-time
SSE streaming and optimized data collection (heartbeat, cached subprocess
calls, bulk process name cache)
- Drill-down popups: Every live monitor stat is clickable, opening a popup
with detailed data (connections list with per-connection detail view,
GeoIP lookup, process kill, bandwidth, ARP spoof, port scan, DDoS status)
- Hal agent mode: Chat routes rewritten to use Agent system with
create_module tool, SSE streaming of thought/action/result steps
- Windows defense module with full security audit
- LLM trainer module and routes
- Defense landing page with platform-specific sub-pages
- Clean up stale files (get-pip.py, download.png, custom_adultsites.json)
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-02 21:08:11 -08:00
< li > < a href = "{{ url_for('settings.deps_index') }}" class = "{% if request.endpoint == 'settings.deps_index' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Dependencies< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('dashboard.manual') }}" class = "{% if request.endpoint == 'dashboard.manual' %}active{% endif %}" > User Manual< / a > < / li >
< li > < a href = "{{ url_for('dashboard.manual_windows') }}" class = "{% if request.endpoint == 'dashboard.manual_windows' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Windows Guide< / a > < / li >
< / ul >
< / div >
< div class = "sidebar-footer" >
< span class = "admin-name" > {{ session.get('user', 'admin') }}< / span >
< a href = "{{ url_for('auth.logout') }}" class = "logout-link" > Logout< / a >
< div style = "margin-top:0.55rem;padding:0.4rem 0 . 5rem ; border-top:1px solid rgba ( 255 , 255 , 255 , 0 . 06 ) ;
font-size:0.62rem;color:#555;line-height:1.4;text-align:center">
🔒 RESTRICTED PUBLIC RELEASE< br >
Certain features are limited or disabled.< br >
Authorized use only — activity is logged.
< / div >
< / div >
< / nav >
< main class = "content" >
{% with messages = get_flashed_messages(with_categories=true) %}
{% if messages %}
< div class = "flash-messages" >
{% for category, message in messages %}
< div class = "flash flash-{{ category }}" > {{ message }}< / div >
{% endfor %}
< / div >
{% endif %}
{% endwith %}
{% block content %}{% endblock %}
< / main >
< / div >
{% else %}
< div class = "login-wrapper" >
{% with messages = get_flashed_messages(with_categories=true) %}
{% if messages %}
< div class = "flash-messages" >
{% for category, message in messages %}
< div class = "flash flash-{{ category }}" > {{ message }}< / div >
{% endfor %}
< / div >
{% endif %}
{% endwith %}
{% block login_content %}{% endblock %}
< / div >
{% endif %}
< script src = "{{ url_for('static', filename='js/lib/adb-bundle.js') }}" > < / script >
< script src = "{{ url_for('static', filename='js/lib/fastboot-bundle.js') }}" > < / script >
< script src = "{{ url_for('static', filename='js/lib/esptool-bundle.js') }}" > < / script >
< script src = "{{ url_for('static', filename='js/hardware-direct.js') }}" > < / script >
< script src = "{{ url_for('static', filename='js/app.js') }}" > < / script >
<!-- Agent Hal Global Chat Panel -->
{% if session.get('user') %}
< div id = "hal-panel" class = "hal-panel" style = "display:none" >
< div class = "hal-header" >
< span > ● Agent Hal< / span >
< button onclick = "halToggle()" class = "hal-close" title = "Close" > ✕ < / button >
< / div >
< div id = "hal-messages" class = "hal-messages" > < / div >
< div class = "hal-footer" >
< input id = "hal-input" type = "text" placeholder = "Ask Hal..." onkeypress = "if(event.key==='Enter')halSend()" >
< button onclick = "halSend()" class = "btn btn-sm btn-primary" > Send< / button >
< button onclick = "halClear()" class = "btn btn-sm" title = "Clear history" > ↺ < / button >
< / div >
< / div >
< button id = "hal-toggle-btn" class = "hal-toggle-btn" onclick = "halToggle()" > HAL< / button >
<!-- Debug Console Window -->
< div id = "debug-panel" class = "debug-panel" style = "display:none" >
< div class = "debug-header" id = "debug-drag-handle" >
< div style = "display:flex;align-items:center;gap:0.5rem" >
< span id = "debug-live-dot" class = "debug-live-dot" > < / span >
< span style = "font-weight:700;letter-spacing:0.08em;font-size:0.8rem" > AUTARCH DEBUG< / span >
< / div >
< div style = "display:flex;align-items:center;gap:0.5rem" >
< span id = "debug-msg-count" style = "font-size:0.7rem;color:#666;font-family:monospace" > 0 msgs< / span >
< button class = "debug-btn" onclick = "debugClear()" title = "Clear output" > ⌫ < / button >
< button class = "debug-btn" onclick = "debugClose()" title = "Close" > ✕ < / button >
< / div >
< / div >
< div id = "debug-output" class = "debug-output" > < / div >
< div class = "debug-controls" >
< span style = "font-size:0.7rem;color:#555;margin-right:0.5rem;font-weight:600" > FILTER:< / span >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "warn" checked onchange = "debugSetMode(this)" > Warnings & Errors< / label >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "verbose" onchange = "debugSetMode(this)" > Full Verbose< / label >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "debug" onchange = "debugSetMode(this)" > Full Debug + Symbols< / label >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "output" onchange = "debugSetMode(this)" > Output Only< / label >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "all" onchange = "debugSetMode(this)" > Show Everything< / label >
< / div >
< / div >
< button id = "debug-toggle-btn" class = "debug-toggle-btn" style = "display:none" onclick = "debugOpen()" title = "Open Debug Console" > DBG< / button >
{% endif %}
< / body >
< / html >