Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
<!DOCTYPE html>
< html lang = "en" >
< head >
< meta charset = "UTF-8" >
< meta name = "viewport" content = "width=device-width, initial-scale=1.0" >
< title > {% block title %}AUTARCH{% endblock %}< / title >
2026-03-02 22:12:06 -08:00
<!-- Critical inline CSS — prevents white flash / FOUC if external sheet delays -->
< style >
:root{--bg-primary:#0f1117;--bg-secondary:#1a1d27;--bg-card:#222536;--bg-input:#2a2d3e;--border:#333650;--text-primary:#e4e6f0;--text-secondary:#8b8fa8;--text-muted:#5c6078;--accent:#6366f1;--accent-hover:#818cf8;--danger:#ef4444;--radius:8px}
*{margin:0;padding:0;box-sizing:border-box}
body{font-family:-apple-system,BlinkMacSystemFont,'Segoe UI',Roboto,sans-serif;background:var(--bg-primary);color:var(--text-primary);line-height:1.6}
.layout{display:flex;min-height:100vh}
.sidebar{width:240px;background:var(--bg-secondary);border-right:1px solid var(--border);display:flex;flex-direction:column;position:fixed;height:100vh;overflow-y:auto}
.content{flex:1;margin-left:240px;padding:32px;max-width:1200px}
.login-wrapper{display:flex;flex-direction:column;align-items:center;justify-content:center;min-height:100vh;padding:20px}
a{color:var(--accent);text-decoration:none}
< / style >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< link rel = "stylesheet" href = "{{ url_for('static', filename='css/style.css') }}" >
{% block extra_head %}{% endblock %}
< / head >
< body >
{% if session.get('user') %}
< div class = "layout" >
< nav class = "sidebar" >
< div class = "sidebar-header" >
< h2 > AUTARCH< / h2 >
< span class = "subtitle" > Security Platform< / span >
< / div >
< div class = "nav-section" >
< ul class = "nav-links" >
< li > < a href = "{{ url_for('dashboard.index') }}" class = "{% if request.endpoint == 'dashboard.index' %}active{% endif %}" > Dashboard< / a > < / li >
Add Port Scanner, fix Hack Hijack SSE, fix debug console, fix tab layout bugs
- Add advanced Port Scanner with live SSE output, nmap integration, result export
- Add Port Scanner to sidebar nav and register blueprint
- Fix Hack Hijack scan: replace polling with SSE streaming, add live output box
and real-time port discovery table; add port_found_cb/status_cb to module
- Fix debug console: capture print()/stdout/stderr via _PrintCapture wrapper,
install handler at startup (not just on toggle), fix SSE stream history replay
- Add missing CSS: .card, .tabs, .btn-sm, .form-control, --primary, --surface
- Fix tab switching bug: style.display='' falls back to CSS display:none;
use explicit 'block' in hack_hijack, c2_framework, net_mapper, password_toolkit,
report_engine, social_eng, webapp_scanner
- Fix defense/linux layout: rewrite with card-based layout, remove slow
load_modules() call on every page request
- Fix sms_forge missing run() function warning on startup
- Fix port scanner JS: </style> was used instead of </script> closing tag
- Port scanner advanced options: remove collapsible toggle, show as always-visible bar
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-08 18:09:49 -07:00
< li > < a href = "{{ url_for('port_scanner.index') }}" class = "{% if request.blueprint == 'port_scanner' %}active{% endif %}" > 🔍 Port Scanner< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('targets.index') }}" class = "{% if request.blueprint == 'targets' %}active{% endif %}" > Targets< / a > < / li >
< / ul >
< / div >
< div class = "nav-section" >
< div class = "nav-section-title" > Categories< / div >
< ul class = "nav-links" >
2026-03-03 00:51:18 -08:00
< li > < a href = "{{ url_for('autonomy.index') }}" class = "{% if request.blueprint == 'autonomy' %}active{% endif %}" style = "color:var(--accent)" > Autonomy< / a > < / li >
Add Threat Monitor with drill-down popups, Hal agent mode, Windows defense, LLM trainer
- Threat Monitor: 7-tab monitoring page (live, connections, network intel,
threats, packet capture, DDoS mitigation, counter-attack) with real-time
SSE streaming and optimized data collection (heartbeat, cached subprocess
calls, bulk process name cache)
- Drill-down popups: Every live monitor stat is clickable, opening a popup
with detailed data (connections list with per-connection detail view,
GeoIP lookup, process kill, bandwidth, ARP spoof, port scan, DDoS status)
- Hal agent mode: Chat routes rewritten to use Agent system with
create_module tool, SSE streaming of thought/action/result steps
- Windows defense module with full security audit
- LLM trainer module and routes
- Defense landing page with platform-specific sub-pages
- Clean up stale files (get-pip.py, download.png, custom_adultsites.json)
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-02 21:08:11 -08:00
< li > < a href = "{{ url_for('defense.index') }}" class = "{% if request.blueprint == 'defense' and request.endpoint not in ('defense.linux_index', 'defense.windows_index', 'defense.monitor_index') %}active{% endif %}" > Defense< / a > < / li >
< li > < a href = "{{ url_for('defense.linux_index') }}" class = "{% if request.endpoint == 'defense.linux_index' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Linux< / a > < / li >
< li > < a href = "{{ url_for('defense.windows_index') }}" class = "{% if request.endpoint == 'defense.windows_index' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Windows< / a > < / li >
< li > < a href = "{{ url_for('defense.monitor_index') }}" class = "{% if request.endpoint == 'defense.monitor_index' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Threat Monitor< / a > < / li >
v2.2.0 — Full arsenal expansion: 16 new security modules
Add WiFi Audit, API Fuzzer, Cloud Scanner, Threat Intel, Log Correlator,
Steganography, Anti-Forensics, BLE Scanner, Forensics, RFID/NFC, Malware
Sandbox, Password Toolkit, Web Scanner, Report Engine, Net Mapper, and
C2 Framework. Each module includes CLI interface, Flask routes, and web
UI template. Also includes Go DNS server source + binary, IP Capture
service, SYN Flood, Gone Fishing mail server, and hack hijack modules
from v2.0 work.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-03 05:16:31 -08:00
< li > < a href = "{{ url_for('threat_intel.index') }}" class = "{% if request.blueprint == 'threat_intel' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Threat Intel< / a > < / li >
< li > < a href = "{{ url_for('log_correlator.index') }}" class = "{% if request.blueprint == 'log_correlator' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Log Correlator< / a > < / li >
v2.3.0 — RCS exploit v2.0, Starlink hack, SMS forge, Archon RCS module
Major RCS/SMS exploitation rewrite (v2.0):
- bugle_db direct extraction (plaintext messages, no decryption needed)
- CVE-2024-0044 run-as privilege escalation (Android 12-13)
- AOSP RCS provider queries (content://rcs/)
- Archon app relay for Shizuku-elevated bugle_db access
- 7-tab web UI: Extract, Database, Forge, Modify, Exploit, Backup, Monitor
- SQL query interface for extracted databases
- Full backup/restore/clone with SMS Backup & Restore XML support
- Known CVE database (CVE-2023-24033, CVE-2024-49415, CVE-2025-48593)
- IMS/RCS diagnostics, Phenotype verbose logging, Pixel tools
New modules: Starlink hack, SMS forge, SDR drone detection
Archon Android app: RCS messaging module with Shizuku integration
Updated manuals to v2.3, 60 web blueprints confirmed
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 13:50:29 -08:00
< li > < a href = "{{ url_for('container_sec.index') }}" class = "{% if request.blueprint == 'container_sec' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Container Sec< / a > < / li >
< li > < a href = "{{ url_for('email_sec.index') }}" class = "{% if request.blueprint == 'email_sec' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Email Sec< / a > < / li >
< li > < a href = "{{ url_for('incident_resp.index') }}" class = "{% if request.blueprint == 'incident_resp' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Incident Response< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('offense.index') }}" class = "{% if request.blueprint == 'offense' %}active{% endif %}" > Offense< / a > < / li >
v2.2.0 — Full arsenal expansion: 16 new security modules
Add WiFi Audit, API Fuzzer, Cloud Scanner, Threat Intel, Log Correlator,
Steganography, Anti-Forensics, BLE Scanner, Forensics, RFID/NFC, Malware
Sandbox, Password Toolkit, Web Scanner, Report Engine, Net Mapper, and
C2 Framework. Each module includes CLI interface, Flask routes, and web
UI template. Also includes Go DNS server source + binary, IP Capture
service, SYN Flood, Gone Fishing mail server, and hack hijack modules
from v2.0 work.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-03 05:16:31 -08:00
< li > < a href = "{{ url_for('loadtest.index') }}" class = "{% if request.blueprint == 'loadtest' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Load Test< / a > < / li >
< li > < a href = "{{ url_for('phishmail.index') }}" class = "{% if request.blueprint == 'phishmail' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Gone Fishing< / a > < / li >
v2.3.0 — RCS exploit v2.0, Starlink hack, SMS forge, Archon RCS module
Major RCS/SMS exploitation rewrite (v2.0):
- bugle_db direct extraction (plaintext messages, no decryption needed)
- CVE-2024-0044 run-as privilege escalation (Android 12-13)
- AOSP RCS provider queries (content://rcs/)
- Archon app relay for Shizuku-elevated bugle_db access
- 7-tab web UI: Extract, Database, Forge, Modify, Exploit, Backup, Monitor
- SQL query interface for extracted databases
- Full backup/restore/clone with SMS Backup & Restore XML support
- Known CVE database (CVE-2023-24033, CVE-2024-49415, CVE-2025-48593)
- IMS/RCS diagnostics, Phenotype verbose logging, Pixel tools
New modules: Starlink hack, SMS forge, SDR drone detection
Archon Android app: RCS messaging module with Shizuku integration
Updated manuals to v2.3, 60 web blueprints confirmed
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 13:50:29 -08:00
< li > < a href = "{{ url_for('social_eng.index') }}" class = "{% if request.blueprint == 'social_eng' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Social Eng< / a > < / li >
v2.2.0 — Full arsenal expansion: 16 new security modules
Add WiFi Audit, API Fuzzer, Cloud Scanner, Threat Intel, Log Correlator,
Steganography, Anti-Forensics, BLE Scanner, Forensics, RFID/NFC, Malware
Sandbox, Password Toolkit, Web Scanner, Report Engine, Net Mapper, and
C2 Framework. Each module includes CLI interface, Flask routes, and web
UI template. Also includes Go DNS server source + binary, IP Capture
service, SYN Flood, Gone Fishing mail server, and hack hijack modules
from v2.0 work.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-03 05:16:31 -08:00
< li > < a href = "{{ url_for('hack_hijack.index') }}" class = "{% if request.blueprint == 'hack_hijack' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Hack Hijack< / a > < / li >
< li > < a href = "{{ url_for('webapp_scanner.index') }}" class = "{% if request.blueprint == 'webapp_scanner' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Web Scanner< / a > < / li >
< li > < a href = "{{ url_for('c2_framework.index') }}" class = "{% if request.blueprint == 'c2_framework' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ C2 Framework< / a > < / li >
< li > < a href = "{{ url_for('wifi_audit.index') }}" class = "{% if request.blueprint == 'wifi_audit' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ WiFi Audit< / a > < / li >
v2.3.0 — RCS exploit v2.0, Starlink hack, SMS forge, Archon RCS module
Major RCS/SMS exploitation rewrite (v2.0):
- bugle_db direct extraction (plaintext messages, no decryption needed)
- CVE-2024-0044 run-as privilege escalation (Android 12-13)
- AOSP RCS provider queries (content://rcs/)
- Archon app relay for Shizuku-elevated bugle_db access
- 7-tab web UI: Extract, Database, Forge, Modify, Exploit, Backup, Monitor
- SQL query interface for extracted databases
- Full backup/restore/clone with SMS Backup & Restore XML support
- Known CVE database (CVE-2023-24033, CVE-2024-49415, CVE-2025-48593)
- IMS/RCS diagnostics, Phenotype verbose logging, Pixel tools
New modules: Starlink hack, SMS forge, SDR drone detection
Archon Android app: RCS messaging module with Shizuku integration
Updated manuals to v2.3, 60 web blueprints confirmed
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 13:50:29 -08:00
< li > < a href = "{{ url_for('deauth.index') }}" class = "{% if request.blueprint == 'deauth' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Deauth Attack< / a > < / li >
v2.2.0 — Full arsenal expansion: 16 new security modules
Add WiFi Audit, API Fuzzer, Cloud Scanner, Threat Intel, Log Correlator,
Steganography, Anti-Forensics, BLE Scanner, Forensics, RFID/NFC, Malware
Sandbox, Password Toolkit, Web Scanner, Report Engine, Net Mapper, and
C2 Framework. Each module includes CLI interface, Flask routes, and web
UI template. Also includes Go DNS server source + binary, IP Capture
service, SYN Flood, Gone Fishing mail server, and hack hijack modules
from v2.0 work.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-03 05:16:31 -08:00
< li > < a href = "{{ url_for('api_fuzzer.index') }}" class = "{% if request.blueprint == 'api_fuzzer' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ API Fuzzer< / a > < / li >
< li > < a href = "{{ url_for('cloud_scan.index') }}" class = "{% if request.blueprint == 'cloud_scan' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Cloud Scan< / a > < / li >
v2.3.0 — RCS exploit v2.0, Starlink hack, SMS forge, Archon RCS module
Major RCS/SMS exploitation rewrite (v2.0):
- bugle_db direct extraction (plaintext messages, no decryption needed)
- CVE-2024-0044 run-as privilege escalation (Android 12-13)
- AOSP RCS provider queries (content://rcs/)
- Archon app relay for Shizuku-elevated bugle_db access
- 7-tab web UI: Extract, Database, Forge, Modify, Exploit, Backup, Monitor
- SQL query interface for extracted databases
- Full backup/restore/clone with SMS Backup & Restore XML support
- Known CVE database (CVE-2023-24033, CVE-2024-49415, CVE-2025-48593)
- IMS/RCS diagnostics, Phenotype verbose logging, Pixel tools
New modules: Starlink hack, SMS forge, SDR drone detection
Archon Android app: RCS messaging module with Shizuku integration
Updated manuals to v2.3, 60 web blueprints confirmed
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 13:50:29 -08:00
< li > < a href = "{{ url_for('vuln_scanner.index') }}" class = "{% if request.blueprint == 'vuln_scanner' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Vuln Scanner< / a > < / li >
< li > < a href = "{{ url_for('exploit_dev.index') }}" class = "{% if request.blueprint == 'exploit_dev' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Exploit Dev< / a > < / li >
< li > < a href = "{{ url_for('ad_audit.index') }}" class = "{% if request.blueprint == 'ad_audit' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ AD Audit< / a > < / li >
< li > < a href = "{{ url_for('mitm_proxy.index') }}" class = "{% if request.blueprint == 'mitm_proxy' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ MITM Proxy< / a > < / li >
< li > < a href = "{{ url_for('pineapple.index') }}" class = "{% if request.blueprint == 'pineapple' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Pineapple< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('counter.index') }}" class = "{% if request.blueprint == 'counter' %}active{% endif %}" > Counter< / a > < / li >
v2.2.0 — Full arsenal expansion: 16 new security modules
Add WiFi Audit, API Fuzzer, Cloud Scanner, Threat Intel, Log Correlator,
Steganography, Anti-Forensics, BLE Scanner, Forensics, RFID/NFC, Malware
Sandbox, Password Toolkit, Web Scanner, Report Engine, Net Mapper, and
C2 Framework. Each module includes CLI interface, Flask routes, and web
UI template. Also includes Go DNS server source + binary, IP Capture
service, SYN Flood, Gone Fishing mail server, and hack hijack modules
from v2.0 work.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-03 05:16:31 -08:00
< li > < a href = "{{ url_for('steganography.index') }}" class = "{% if request.blueprint == 'steganography' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Steganography< / a > < / li >
< li > < a href = "{{ url_for('anti_forensics.index') }}" class = "{% if request.blueprint == 'anti_forensics' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Anti-Forensics< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('analyze.index') }}" class = "{% if request.blueprint == 'analyze' and request.endpoint != 'analyze.hash_detection' %}active{% endif %}" > Analyze< / a > < / li >
< li > < a href = "{{ url_for('analyze.hash_detection') }}" class = "{% if request.endpoint == 'analyze.hash_detection' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Hash Toolkit< / a > < / li >
Add Threat Monitor with drill-down popups, Hal agent mode, Windows defense, LLM trainer
- Threat Monitor: 7-tab monitoring page (live, connections, network intel,
threats, packet capture, DDoS mitigation, counter-attack) with real-time
SSE streaming and optimized data collection (heartbeat, cached subprocess
calls, bulk process name cache)
- Drill-down popups: Every live monitor stat is clickable, opening a popup
with detailed data (connections list with per-connection detail view,
GeoIP lookup, process kill, bandwidth, ARP spoof, port scan, DDoS status)
- Hal agent mode: Chat routes rewritten to use Agent system with
create_module tool, SSE streaming of thought/action/result steps
- Windows defense module with full security audit
- LLM trainer module and routes
- Defense landing page with platform-specific sub-pages
- Clean up stale files (get-pip.py, download.png, custom_adultsites.json)
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-02 21:08:11 -08:00
< li > < a href = "{{ url_for('llm_trainer.index') }}" class = "{% if request.blueprint == 'llm_trainer' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ LLM Trainer< / a > < / li >
v2.2.0 — Full arsenal expansion: 16 new security modules
Add WiFi Audit, API Fuzzer, Cloud Scanner, Threat Intel, Log Correlator,
Steganography, Anti-Forensics, BLE Scanner, Forensics, RFID/NFC, Malware
Sandbox, Password Toolkit, Web Scanner, Report Engine, Net Mapper, and
C2 Framework. Each module includes CLI interface, Flask routes, and web
UI template. Also includes Go DNS server source + binary, IP Capture
service, SYN Flood, Gone Fishing mail server, and hack hijack modules
from v2.0 work.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-03 05:16:31 -08:00
< li > < a href = "{{ url_for('password_toolkit.index') }}" class = "{% if request.blueprint == 'password_toolkit' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Password Toolkit< / a > < / li >
< li > < a href = "{{ url_for('net_mapper.index') }}" class = "{% if request.blueprint == 'net_mapper' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Net Mapper< / a > < / li >
< li > < a href = "{{ url_for('report_engine.index') }}" class = "{% if request.blueprint == 'report_engine' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Reports< / a > < / li >
< li > < a href = "{{ url_for('ble_scanner.index') }}" class = "{% if request.blueprint == 'ble_scanner' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ BLE Scanner< / a > < / li >
< li > < a href = "{{ url_for('forensics.index') }}" class = "{% if request.blueprint == 'forensics' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Forensics< / a > < / li >
< li > < a href = "{{ url_for('rfid_tools.index') }}" class = "{% if request.blueprint == 'rfid_tools' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ RFID/NFC< / a > < / li >
< li > < a href = "{{ url_for('malware_sandbox.index') }}" class = "{% if request.blueprint == 'malware_sandbox' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Malware Sandbox< / a > < / li >
v2.3.0 — RCS exploit v2.0, Starlink hack, SMS forge, Archon RCS module
Major RCS/SMS exploitation rewrite (v2.0):
- bugle_db direct extraction (plaintext messages, no decryption needed)
- CVE-2024-0044 run-as privilege escalation (Android 12-13)
- AOSP RCS provider queries (content://rcs/)
- Archon app relay for Shizuku-elevated bugle_db access
- 7-tab web UI: Extract, Database, Forge, Modify, Exploit, Backup, Monitor
- SQL query interface for extracted databases
- Full backup/restore/clone with SMS Backup & Restore XML support
- Known CVE database (CVE-2023-24033, CVE-2024-49415, CVE-2025-48593)
- IMS/RCS diagnostics, Phenotype verbose logging, Pixel tools
New modules: Starlink hack, SMS forge, SDR drone detection
Archon Android app: RCS messaging module with Shizuku integration
Updated manuals to v2.3, 60 web blueprints confirmed
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 13:50:29 -08:00
< li > < a href = "{{ url_for('reverse_eng.index') }}" class = "{% if request.blueprint == 'reverse_eng' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Reverse Eng< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('osint.index') }}" class = "{% if request.blueprint == 'osint' %}active{% endif %}" > OSINT< / a > < / li >
v2.2.0 — Full arsenal expansion: 16 new security modules
Add WiFi Audit, API Fuzzer, Cloud Scanner, Threat Intel, Log Correlator,
Steganography, Anti-Forensics, BLE Scanner, Forensics, RFID/NFC, Malware
Sandbox, Password Toolkit, Web Scanner, Report Engine, Net Mapper, and
C2 Framework. Each module includes CLI interface, Flask routes, and web
UI template. Also includes Go DNS server source + binary, IP Capture
service, SYN Flood, Gone Fishing mail server, and hack hijack modules
from v2.0 work.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-03 05:16:31 -08:00
< li > < a href = "{{ url_for('ipcapture.index') }}" class = "{% if request.blueprint == 'ipcapture' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ IP Capture< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('simulate.index') }}" class = "{% if request.blueprint == 'simulate' and request.endpoint != 'simulate.legendary_creator' %}active{% endif %}" > Simulate< / a > < / li >
< li > < a href = "{{ url_for('simulate.legendary_creator') }}" class = "{% if request.endpoint == 'simulate.legendary_creator' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Legendary Creator< / a > < / li >
< / ul >
< / div >
< div class = "nav-section" >
< div class = "nav-section-title" > Tools< / div >
< ul class = "nav-links" >
< li > < a href = "{{ url_for('encmodules.index') }}" class = "{% if request.blueprint == 'encmodules' %}active{% endif %}" style = "color:var(--danger,#f55)" > 🔒 Enc Modules< / a > < / li >
< li > < a href = "{{ url_for('wireshark.index') }}" class = "{% if request.blueprint == 'wireshark' %}active{% endif %}" > Wireshark< / a > < / li >
< li > < a href = "{{ url_for('hardware.index') }}" class = "{% if request.blueprint == 'hardware' %}active{% endif %}" > Hardware< / a > < / li >
< li > < a href = "{{ url_for('android_exploit.index') }}" class = "{% if request.blueprint == 'android_exploit' %}active{% endif %}" > Android Exploit< / a > < / li >
v2.3.0 — RCS exploit v2.0, Starlink hack, SMS forge, Archon RCS module
Major RCS/SMS exploitation rewrite (v2.0):
- bugle_db direct extraction (plaintext messages, no decryption needed)
- CVE-2024-0044 run-as privilege escalation (Android 12-13)
- AOSP RCS provider queries (content://rcs/)
- Archon app relay for Shizuku-elevated bugle_db access
- 7-tab web UI: Extract, Database, Forge, Modify, Exploit, Backup, Monitor
- SQL query interface for extracted databases
- Full backup/restore/clone with SMS Backup & Restore XML support
- Known CVE database (CVE-2023-24033, CVE-2024-49415, CVE-2025-48593)
- IMS/RCS diagnostics, Phenotype verbose logging, Pixel tools
New modules: Starlink hack, SMS forge, SDR drone detection
Archon Android app: RCS messaging module with Shizuku integration
Updated manuals to v2.3, 60 web blueprints confirmed
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 13:50:29 -08:00
< li > < a href = "{{ url_for('sms_forge.index') }}" class = "{% if request.blueprint == 'sms_forge' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ SMS Forge< / a > < / li >
< li > < a href = "{{ url_for('rcs_tools.index') }}" class = "{% if request.blueprint == 'rcs_tools' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ RCS Tools< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('iphone_exploit.index') }}" class = "{% if request.blueprint == 'iphone_exploit' %}active{% endif %}" > iPhone Exploit< / a > < / li >
< li > < a href = "{{ url_for('android_protect.index') }}" class = "{% if request.blueprint == 'android_protect' %}active{% endif %}" > Shield< / a > < / li >
< li > < a href = "{{ url_for('revshell.index') }}" class = "{% if request.blueprint == 'revshell' %}active{% endif %}" > Reverse Shell< / a > < / li >
< li > < a href = "{{ url_for('archon.index') }}" class = "{% if request.blueprint == 'archon' %}active{% endif %}" > Archon< / a > < / li >
v2.3.0 — RCS exploit v2.0, Starlink hack, SMS forge, Archon RCS module
Major RCS/SMS exploitation rewrite (v2.0):
- bugle_db direct extraction (plaintext messages, no decryption needed)
- CVE-2024-0044 run-as privilege escalation (Android 12-13)
- AOSP RCS provider queries (content://rcs/)
- Archon app relay for Shizuku-elevated bugle_db access
- 7-tab web UI: Extract, Database, Forge, Modify, Exploit, Backup, Monitor
- SQL query interface for extracted databases
- Full backup/restore/clone with SMS Backup & Restore XML support
- Known CVE database (CVE-2023-24033, CVE-2024-49415, CVE-2025-48593)
- IMS/RCS diagnostics, Phenotype verbose logging, Pixel tools
New modules: Starlink hack, SMS forge, SDR drone detection
Archon Android app: RCS messaging module with Shizuku integration
Updated manuals to v2.3, 60 web blueprints confirmed
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-03 13:50:29 -08:00
< li > < a href = "{{ url_for('sdr_tools.index') }}" class = "{% if request.blueprint == 'sdr_tools' %}active{% endif %}" > SDR/RF Tools< / a > < / li >
< li > < a href = "{{ url_for('starlink_hack.index') }}" class = "{% if request.blueprint == 'starlink_hack' %}active{% endif %}" > Starlink Hack< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< / ul >
< / div >
< div class = "nav-section" >
< div class = "nav-section-title" > System< / div >
< ul class = "nav-links" >
< li > < a href = "{{ url_for('upnp.index') }}" class = "{% if request.blueprint == 'upnp' %}active{% endif %}" > UPnP< / a > < / li >
< li > < a href = "{{ url_for('wireguard.index') }}" class = "{% if request.blueprint == 'wireguard' %}active{% endif %}" > WireGuard< / a > < / li >
< li > < a href = "{{ url_for('msf.index') }}" class = "{% if request.blueprint == 'msf' %}active{% endif %}" > MSF Console< / a > < / li >
v2.2.0 — Full arsenal expansion: 16 new security modules
Add WiFi Audit, API Fuzzer, Cloud Scanner, Threat Intel, Log Correlator,
Steganography, Anti-Forensics, BLE Scanner, Forensics, RFID/NFC, Malware
Sandbox, Password Toolkit, Web Scanner, Report Engine, Net Mapper, and
C2 Framework. Each module includes CLI interface, Flask routes, and web
UI template. Also includes Go DNS server source + binary, IP Capture
service, SYN Flood, Gone Fishing mail server, and hack hijack modules
from v2.0 work.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-03 05:16:31 -08:00
< li > < a href = "{{ url_for('dns_service.index') }}" class = "{% if request.blueprint == 'dns_service' and request.endpoint != 'dns_service.nameserver' %}active{% endif %}" > DNS Server< / a > < / li >
< li > < a href = "{{ url_for('dns_service.nameserver') }}" class = "{% if request.endpoint == 'dns_service.nameserver' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Nameserver< / a > < / li >
Add Threat Monitor with drill-down popups, Hal agent mode, Windows defense, LLM trainer
- Threat Monitor: 7-tab monitoring page (live, connections, network intel,
threats, packet capture, DDoS mitigation, counter-attack) with real-time
SSE streaming and optimized data collection (heartbeat, cached subprocess
calls, bulk process name cache)
- Drill-down popups: Every live monitor stat is clickable, opening a popup
with detailed data (connections list with per-connection detail view,
GeoIP lookup, process kill, bandwidth, ARP spoof, port scan, DDoS status)
- Hal agent mode: Chat routes rewritten to use Agent system with
create_module tool, SSE streaming of thought/action/result steps
- Windows defense module with full security audit
- LLM trainer module and routes
- Defense landing page with platform-specific sub-pages
- Clean up stale files (get-pip.py, download.png, custom_adultsites.json)
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-02 21:08:11 -08:00
< li > < a href = "{{ url_for('settings.index') }}" class = "{% if request.blueprint == 'settings' and request.endpoint not in ('settings.llm_settings', 'settings.deps_index') %}active{% endif %}" > Settings< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('settings.llm_settings') }}" class = "{% if request.endpoint == 'settings.llm_settings' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ LLM Config< / a > < / li >
Add Threat Monitor with drill-down popups, Hal agent mode, Windows defense, LLM trainer
- Threat Monitor: 7-tab monitoring page (live, connections, network intel,
threats, packet capture, DDoS mitigation, counter-attack) with real-time
SSE streaming and optimized data collection (heartbeat, cached subprocess
calls, bulk process name cache)
- Drill-down popups: Every live monitor stat is clickable, opening a popup
with detailed data (connections list with per-connection detail view,
GeoIP lookup, process kill, bandwidth, ARP spoof, port scan, DDoS status)
- Hal agent mode: Chat routes rewritten to use Agent system with
create_module tool, SSE streaming of thought/action/result steps
- Windows defense module with full security audit
- LLM trainer module and routes
- Defense landing page with platform-specific sub-pages
- Clean up stale files (get-pip.py, download.png, custom_adultsites.json)
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-02 21:08:11 -08:00
< li > < a href = "{{ url_for('settings.deps_index') }}" class = "{% if request.endpoint == 'settings.deps_index' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Dependencies< / a > < / li >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< li > < a href = "{{ url_for('dashboard.manual') }}" class = "{% if request.endpoint == 'dashboard.manual' %}active{% endif %}" > User Manual< / a > < / li >
< li > < a href = "{{ url_for('dashboard.manual_windows') }}" class = "{% if request.endpoint == 'dashboard.manual_windows' %}active{% endif %}" style = "padding-left:1.5rem;font-size:0.85rem" > └ Windows Guide< / a > < / li >
< / ul >
< / div >
2026-03-02 21:12:56 -08:00
< div style = "padding:6px 12px" >
< button id = "btn-reload-modules" onclick = "reloadModules()" class = "btn btn-small"
style="width:100%;font-size:0.75rem;padding:5px 0;background:var(--bg-input);border:1px solid var(--border);color:var(--text-secondary)"
title="Re-scan modules/ directory for new or changed modules">
↻ Refresh Modules
< / button >
< / div >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< div class = "sidebar-footer" >
< span class = "admin-name" > {{ session.get('user', 'admin') }}< / span >
< a href = "{{ url_for('auth.logout') }}" class = "logout-link" > Logout< / a >
< div style = "margin-top:0.55rem;padding:0.4rem 0 . 5rem ; border-top:1px solid rgba ( 255 , 255 , 255 , 0 . 06 ) ;
font-size:0.62rem;color:#555;line-height:1.4;text-align:center">
🔒 RESTRICTED PUBLIC RELEASE< br >
Certain features are limited or disabled.< br >
Authorized use only — activity is logged.
< / div >
< / div >
< / nav >
< main class = "content" >
{% with messages = get_flashed_messages(with_categories=true) %}
{% if messages %}
< div class = "flash-messages" >
{% for category, message in messages %}
< div class = "flash flash-{{ category }}" > {{ message }}< / div >
{% endfor %}
< / div >
{% endif %}
{% endwith %}
{% block content %}{% endblock %}
< / main >
< / div >
{% else %}
< div class = "login-wrapper" >
{% with messages = get_flashed_messages(with_categories=true) %}
{% if messages %}
< div class = "flash-messages" >
{% for category, message in messages %}
< div class = "flash flash-{{ category }}" > {{ message }}< / div >
{% endfor %}
< / div >
{% endif %}
{% endwith %}
{% block login_content %}{% endblock %}
< / div >
{% endif %}
< script src = "{{ url_for('static', filename='js/lib/adb-bundle.js') }}" > < / script >
< script src = "{{ url_for('static', filename='js/lib/fastboot-bundle.js') }}" > < / script >
< script src = "{{ url_for('static', filename='js/lib/esptool-bundle.js') }}" > < / script >
< script src = "{{ url_for('static', filename='js/hardware-direct.js') }}" > < / script >
< script src = "{{ url_for('static', filename='js/app.js') }}" > < / script >
<!-- Agent Hal Global Chat Panel -->
{% if session.get('user') %}
< div id = "hal-panel" class = "hal-panel" style = "display:none" >
< div class = "hal-header" >
2026-03-02 23:13:13 -08:00
< span > ● Hal< / span >
< label class = "hal-mode-switch" title = "Toggle Agent mode (tools) vs Direct chat" >
< input type = "checkbox" id = "hal-mode-toggle" onchange = "halModeChanged(this)" >
< span class = "hal-mode-slider" > < / span >
< span class = "hal-mode-label" id = "hal-mode-label" > Chat< / span >
< / label >
Initial public release — AUTARCH v1.0.0
Full security platform with web dashboard, 16 Flask blueprints, 26 modules,
autonomous AI agent, WebUSB hardware support, and Archon Android companion app.
Includes Hash Toolkit, debug console, anti-stalkerware shield, Metasploit/RouterSploit
integration, WireGuard VPN, OSINT reconnaissance, and multi-backend LLM support.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-01 03:57:32 -08:00
< button onclick = "halToggle()" class = "hal-close" title = "Close" > ✕ < / button >
< / div >
< div id = "hal-messages" class = "hal-messages" > < / div >
< div class = "hal-footer" >
< input id = "hal-input" type = "text" placeholder = "Ask Hal..." onkeypress = "if(event.key==='Enter')halSend()" >
< button onclick = "halSend()" class = "btn btn-sm btn-primary" > Send< / button >
< button onclick = "halClear()" class = "btn btn-sm" title = "Clear history" > ↺ < / button >
< / div >
< / div >
< button id = "hal-toggle-btn" class = "hal-toggle-btn" onclick = "halToggle()" > HAL< / button >
<!-- Debug Console Window -->
< div id = "debug-panel" class = "debug-panel" style = "display:none" >
< div class = "debug-header" id = "debug-drag-handle" >
< div style = "display:flex;align-items:center;gap:0.5rem" >
< span id = "debug-live-dot" class = "debug-live-dot" > < / span >
< span style = "font-weight:700;letter-spacing:0.08em;font-size:0.8rem" > AUTARCH DEBUG< / span >
< / div >
< div style = "display:flex;align-items:center;gap:0.5rem" >
< span id = "debug-msg-count" style = "font-size:0.7rem;color:#666;font-family:monospace" > 0 msgs< / span >
< button class = "debug-btn" onclick = "debugClear()" title = "Clear output" > ⌫ < / button >
< button class = "debug-btn" onclick = "debugClose()" title = "Close" > ✕ < / button >
< / div >
< / div >
< div id = "debug-output" class = "debug-output" > < / div >
< div class = "debug-controls" >
< span style = "font-size:0.7rem;color:#555;margin-right:0.5rem;font-weight:600" > FILTER:< / span >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "warn" checked onchange = "debugSetMode(this)" > Warnings & Errors< / label >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "verbose" onchange = "debugSetMode(this)" > Full Verbose< / label >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "debug" onchange = "debugSetMode(this)" > Full Debug + Symbols< / label >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "output" onchange = "debugSetMode(this)" > Output Only< / label >
< label class = "debug-check-label" > < input type = "checkbox" name = "dbg-mode" value = "all" onchange = "debugSetMode(this)" > Show Everything< / label >
< / div >
< / div >
< button id = "debug-toggle-btn" class = "debug-toggle-btn" style = "display:none" onclick = "debugOpen()" title = "Open Debug Console" > DBG< / button >
{% endif %}
< / body >
< / html >