Version: 1.0
Codename: void
Date: January 14, 2026
Status: Production Release
- System Overview
- Installation Instructions
- Framework Functions
- Module Usage
- Testing Checklist
- Known Issues
- Reporting Bugs
NullSec Linux 1.0 (void) is an enterprise-grade penetration testing and offensive security operating system featuring:
- 188 Attack Modules across 13 categories
- AI-Powered Framework with 12 AI models (73GB total)
- Interactive Launcher with enhanced logging and encryption
- Desktop Integration with click-to-launch tools
- Comprehensive Resources including wordlists, payloads, and multi-language scripts
Minimum:
- CPU: 64-bit dual-core processor (2.0 GHz+)
- RAM: 8GB
- Storage: 100GB free space
- Network: Ethernet or Wi-Fi adapter
Recommended:
- CPU: 64-bit quad-core processor (3.0 GHz+)
- RAM: 16GB or more
- Storage: 250GB+ SSD
- Network: Multiple adapters for testing
- GPU: NVIDIA/AMD for AI acceleration
- Base OS: Parrot Security OS (Debian-based)
- Desktop: MATE Desktop Environment
- Kernel: Linux 6.x
- Package Manager: apt/dpkg
- USB drive (16GB+ recommended)
- NullSec Linux ISO file
- USB creation tool (Rufus, Etcher, or dd)
1. Download/Obtain ISO
# ISO Location on test system
/home/antics/nullsec-linux-1.0-amd64.iso
# Also available on "The Lulz Boat" USB drive2. Create Bootable USB (Linux)
# Identify USB device
lsblk
# Create bootable USB (replace /dev/sdX with your USB device)
sudo dd if=nullsec-linux-1.0-amd64.iso of=/dev/sdX bs=4M status=progress
sudo sync3. Create Bootable USB (Windows)
- Download Rufus: https://rufus.ie/
- Select NullSec ISO
- Select USB drive
- Click "Start"
- Use DD mode when prompted
4. Boot from USB
- Insert USB drive
- Restart computer
- Enter BIOS/UEFI (usually F2, F12, DEL, or ESC)
- Select USB drive as boot device
- Choose "Live mode" or "Install"
# Boot to live mode without installation
# Login credentials (if prompted):
Username: antics
Password: [provided separately]
# Test all features before installation
# No changes persist after reboot- Boot from USB
- Select "Install NullSec Linux"
- Choose language and keyboard layout
- Select installation target (disk)
- Create user account
- Wait for installation (15-30 minutes)
- Reboot and remove USB
- Login with created credentials
1. Create New VM
Name: NullSec Linux
Type: Linux
Version: Debian (64-bit)
RAM: 8192 MB (minimum)
Disk: 100 GB dynamically allocated
2. VM Settings
- System β Processor: 4 CPUs (or more)
- Display β Video Memory: 128 MB
- Network β Adapter 1: NAT
- Network β Adapter 2: Host-only (for isolated testing)
- Storage β Add NullSec ISO to optical drive
3. Start VM and Install
- Follow normal installation steps
- Install Guest Additions after setup
1. Create New VM
Configuration: Custom
OS: Linux β Debian 11.x 64-bit
RAM: 8 GB
Disk: 100 GB
Network: NAT + Host-only
2. Mount ISO and Install
- Attach NullSec ISO
- Power on VM
- Complete installation
- Install VMware Tools
# From terminal
cd ~/nullsec
./nullsec-launcher.py
# Or double-click desktop icon
# Or type: nullsecMain Menu:
[N] Next Page - Navigate to next module page
[P] Previous Page - Navigate to previous page
[A] Run ALL - Execute all modules sequentially
[R] Random - Run random module selection
[C] Categories - Browse modules by category
[S] Search - Search modules by name/desc
[M] Metasploit - Launch Metasploit Framework
[H] Shodan - Shodan API integration
[D] Module List - Detailed module browser (NEW!)
[E] Exec Console - Direct command execution
[F] Framework - Framework documentation
[T] Tools - External tools menu
[I] AI Console - AI-powered assistance
[X] Credits - System information
[Q] Quit - Exit launcher
[1-188] - Launch specific module by number
14 Browse Options:
- View All Modules - Paginated list with descriptions
- Browse by Category - 13 organized categories
- Search - Name/description/category search
- Recently Used - Last 10 executed modules
- Enhanced Modules - Show JSON-configured modules only
- Desktop GUI Launcher - Launch GUI application
- CLI Framework - Command-line usage
- Direct Execution - Bash execution info
- Network Modules - Quick access
- Web Exploitation - Quick access
- Credential Attacks - Quick access
- Active Directory - Quick access
- Cloud & Container - Quick access
- IoT & ICS/SCADA - Quick access
Applications β β‘ NullSec Tools β [Category] β [Module]
Available Categories:
- π Network Exploitation (5 modules)
- π Web Exploitation (11 modules)
- π‘ Wireless Attacks (2 modules)
- π£ Exploitation (37 modules)
- π Password Attacks (12 modules)
- βοΈ Cloud & Container (5 modules)
- π’ Active Directory (4 modules)
- π± IoT & ICS/SCADA (3 modules)
Plus Main Tools:
- β‘ NullSec Framework Launcher
- β‘ NullSec Desktop GUI
# Method 1: Through Launcher
./nullsec-launcher.py
# Select module, answer prompts
# Method 2: Direct Framework Call
python3 ~/nullsec/module-framework.py \
~/nullsec/nullsecurity/module.sh \
~/nullsec/nullsecurity/module.json
# Method 3: Standard Bash
cd ~/nullsec/nullsecurity
bash module.sh- Parameter Collection: Smart prompts for each module
- Validation: Input validation (IP, port, URL, domain, etc.)
- Logging: Automatic logging to ~/nullsec/logs/targets/
- Vulnerability Tracking: Automatic detection and categorization
- Summary Reports: Markdown summaries with next steps
- Encryption Option: Optional AES-256 log encryption
Launch AI Console:
# From launcher: Press [I]
# Or directly:
python3 ~/nullsec/nullsec-ai.pyAvailable AI Models (12 total):
- GPT-4 (OpenAI)
- Claude 3 (Anthropic)
- Llama 2 (Meta)
- Mixtral (Mistral AI)
- CodeLlama (Meta)
- PaLM 2 (Google)
- Gemini Pro (Google)
- Command R+ (Cohere)
- Falcon (TII)
- MPT (MosaicML)
- Vicuna (LMSYS)
- WizardCoder (Microsoft)
AI Capabilities:
- Exploit analysis and recommendations
- Code generation and modification
- Vulnerability assessment
- Attack planning and automation
- Report generation
- Custom payload creation
# Automatically set in ~/.bashrc
export NULLSEC_RESOURCES="$HOME/nullsec/resources"
export NULLSEC_WORDLISTS="$NULLSEC_RESOURCES/wordlists"
export NULLSEC_SCRIPTS="$NULLSEC_RESOURCES/scripts"
export NULLSEC_PAYLOADS="$NULLSEC_RESOURCES/payloads"Wordlists:
# Passwords (146 entries)
$NULLSEC_WORDLISTS/passwords/common-passwords.txt
$NULLSEC_WORDLISTS/passwords/rockyou-top1000.txt
# Usernames (40 entries)
$NULLSEC_WORDLISTS/usernames/common-usernames.txt
# Subdomains (100 entries)
$NULLSEC_WORDLISTS/subdomains/common-subdomains.txt
# Directories/Files (90 entries)
$NULLSEC_WORDLISTS/directories/common-directories.txt
$NULLSEC_WORDLISTS/files/common-files.txt
# Fuzzing payloads (85 entries)
$NULLSEC_WORDLISTS/fuzzing/sql-injection.txt
$NULLSEC_WORDLISTS/fuzzing/xss-payloads.txt
$NULLSEC_WORDLISTS/fuzzing/api-endpoints.txt
# Token patterns (20 entries)
$NULLSEC_WORDLISTS/tokens/api-keys.txtHelper Scripts:
# Python scripts
python3 $NULLSEC_SCRIPTS/python/port_scanner.py <target>
python3 $NULLSEC_SCRIPTS/python/subdomain_enum.py <domain>
python3 $NULLSEC_SCRIPTS/python/hash_cracker.py <hash> <wordlist>
python3 $NULLSEC_SCRIPTS/python/http_client.py <url>
python3 $NULLSEC_SCRIPTS/python/payload_gen.py
# Ruby scripts
ruby $NULLSEC_SCRIPTS/ruby/web_crawler.rb <url>
# Go scripts (compile first)
cd $NULLSEC_SCRIPTS/go
go build fast_scanner.go
./fast_scanner <target>
# PowerShell scripts
pwsh $NULLSEC_SCRIPTS/powershell/Invoke-PortScan.ps1 <target>Payloads:
# Web shells
$NULLSEC_PAYLOADS/web/simple-shell.php
$NULLSEC_PAYLOADS/web/simple-shell.jsp
$NULLSEC_PAYLOADS/web/simple-shell.aspx
# Reverse shells
$NULLSEC_PAYLOADS/network/reverse-shell.sh <LHOST> <LPORT>
python3 $NULLSEC_PAYLOADS/network/reverse-shell.py <LHOST> <LPORT># Install encryption system
bash ~/nullsec/install-log-encryption.sh
# Generate encryption key (first time)
python3 ~/nullsec/log-encrypt.py --generate-key
# Enter a strong password (SAVE THIS!)Automatic (In Framework):
When running modules, answer 'y' to:
"Encrypt logs after execution? [y/N]:"
Manual Encryption:
# Encrypt a log file
python3 ~/nullsec/log-encrypt.py --encrypt attack.log
# Output: attack.log.enc + attack.log.enc.meta
# Decrypt a log file
python3 ~/nullsec/log-encrypt.py --decrypt attack.log.enc
# Output: attack.log (original restored)
# Encrypt entire directory
python3 ~/nullsec/log-encrypt.py --encrypt-dir ~/nullsec/logs/targets
# Decrypt entire directory
python3 ~/nullsec/log-encrypt.py --decrypt-dir ~/nullsec/logs/targetsSecurity Notes:
- Uses AES-256 encryption
- PBKDF2 key derivation (100,000 iterations)
- Password CANNOT be recovered if lost!
- Backup ~/.nullsec/ directory for key recovery
- Network (5 modules) - Port scanning, network pivoting, DNS attacks
- Web (11 modules) - SQL injection, XSS, API fuzzing, web shells
- Wireless (2 modules) - WiFi deauth, Bluetooth attacks
- Exploitation (37 modules) - RCE, kernel exploits, container escapes
- Password (12 modules) - Hash cracking, brute force, 2FA bypass
- Social Engineering (4 modules) - Phishing, vishing, pretexting
- IoT (3 modules) - IoT camera attacks, Zigbee, SCADA
- Cloud (5 modules) - AWS/Azure/GCP enumeration, container exploits
- Active Directory (4 modules) - Kerberoasting, LDAP injection, domain attacks
- Database (1 module) - Database exfiltration
- Mobile (2 modules) - Android/iOS attacks
- Forensics (0 modules) - Coming soon
- Misc (102 modules) - Various attack tools and utilities
1. Launch NullSec Launcher
./nullsec-launcher.py
2. Press [D] for Module List
Select [9] Network Modules
3. Choose port-scanner module
Enter target: 192.168.1.0/24
Choose scan type: Full
Enable log encryption: y
4. Review results in:
~/nullsec/logs/targets/192.168.1.0_24/1. Launch via Desktop Menu
Applications β NullSec Tools β Web Exploitation β SQL Injection
2. Or use framework directly:
python3 ~/nullsec/module-framework.py \
~/nullsec/nullsecurity/web-exploit.sh \
~/nullsec/nullsecurity/web-exploit.json
3. Follow interactive prompts:
- Target URL
- Injection point
- Payload type
- Encryption option
4. Check results and next steps in SUMMARY.md1. Collect hash from target
# Example: 5f4dcc3b5aa765d61d8327deb882cf99
2. Use hash cracker:
python3 $NULLSEC_SCRIPTS/python/hash_cracker.py \
5f4dcc3b5aa765d61d8327deb882cf99 \
$NULLSEC_WORDLISTS/passwords/rockyou-top1000.txt \
md5
3. Or use module:
./nullsec-launcher.py
Select password-crack module
Enter hash and select wordlist1. Initial Reconnaissance
Module: network-pivot
Discover domain controllers
2. Enumeration
Module: ad-attack-enhanced
Collect user/group information
3. Credential Harvesting
Module: kerberoast
Extract service account hashes
4. Exploitation
Module: golden-ticket
Create persistence mechanism
5. Lateral Movement
Module: lateral-movement
Move to high-value targets- NullSec Linux installed (bare metal or VM)
- System updated:
sudo apt update && sudo apt upgrade - Network connectivity verified
- Test targets prepared (isolated lab environment)
- Backup created (if testing on production system)
- Legal authorization obtained for testing
- Launch nullsec-launcher.py successfully
- Navigate between pages ([N], [P])
- Access Module List ([D])
- Search functionality works ([S])
- Category browser works ([C])
- Module execution (select by number)
- AI Console launches ([I])
- Framework info displays ([F])
- Tools menu displays ([T])
- Exit properly ([Q])
- Applications menu shows "β‘ NullSec Tools"
- All 8 category submenus visible
- Click-to-launch works for modules
- NullSec Framework Launcher icon works
- NullSec Desktop GUI launches
- Run module via launcher (interactive)
- Run module via desktop menu (click)
- Run module via framework directly
- Run module via standard bash
- Run module in external terminal
- Environment variables set correctly (
echo $NULLSEC_RESOURCES) - Wordlists accessible and readable
- Python scripts executable and functional
- Ruby scripts work (if Ruby installed)
- Go scripts compile and run
- PowerShell scripts work (if pwsh installed)
- Payloads accessible
- Logs created in ~/nullsec/logs/targets/
- SUMMARY.md generated correctly
- Vulnerability tracking works
- Log encryption key generation works
- Log encryption succeeds
- Log decryption restores original
- Directory-wide encryption works
- Encrypted logs are unreadable without key
- AI console launches
- Can select AI model
- AI responds to prompts
- Code generation works
- Exploit recommendations provided
- AI integration with modules functional
- System responsive during normal operation
- Module execution completes in reasonable time
- No memory leaks during extended use
- Log files don't grow excessively
- Encryption/decryption speed acceptable
- Port scanner completes successfully
- DNS enumeration works
- Network pivoting functional
- Results logged properly
- SQL injection detection works
- XSS payload generation functional
- API fuzzing completes
- Web shells deploy successfully (in test env)
- WiFi adapter detection works
- Deauth attacks functional (in isolated env)
- Bluetooth enumeration works
- Exploit selection appropriate
- Payload generation works
- Exploitation succeeds against vulnerable targets
- Post-exploitation modules functional
- Hash identification correct
- Cracking completes successfully
- Brute force attacks work
- 2FA bypass attempts logged properly
-
Issue: Some modules may show "command not found" in minimal shells
- Workaround: Use full paths or run from framework
- Status: Fixed in system-audit.sh, testing ongoing
-
Issue: Log encryption requires password entry for each file
- Workaround: Use directory-wide encryption once
- Status: Feature, not bug - security by design
-
Issue: AI models require 73GB storage
- Workaround: Install on system with sufficient space
- Status: Expected, all models optional
-
Issue: Desktop menu may not update immediately after installation
- Workaround: Log out and back in, or run:
xdg-desktop-menu forceupdate - Status: Desktop environment cache issue
- Workaround: Log out and back in, or run:
-
Issue: Some wireless modules require specific hardware
- Workaround: Ensure compatible WiFi adapter (monitor mode capable)
- Status: Hardware limitation, not software issue
Please pay special attention to:
- Module execution across different launch methods
- Log encryption/decryption with various file sizes
- Desktop menu integration and icon display
- Resource library accessibility
- Interactive prompts and validation
- Error handling and recovery
When reporting issues, please include:
**Bug Title:** Brief description
**Environment:**
- NullSec Linux Version: 1.0 (void)
- Installation Type: [USB Live / Full Install / VM]
- Hardware: [CPU, RAM, etc.]
- Network: [WiFi / Ethernet]
**Steps to Reproduce:**
1. Launch component
2. Execute action
3. Observe issue
**Expected Behavior:**
What should happen
**Actual Behavior:**
What actually happened
**Logs/Screenshots:**
- Error messages
- Screenshots
- Log file contents from ~/nullsec/logs/
**Additional Context:**
Any other relevant information
Method 1: Direct Contact
- Email: [provided separately]
- Include "NullSec Bug:" in subject line
Method 2: Log Files
# Collect all relevant logs
cd ~/nullsec
tar -czf nullsec-bug-report-$(date +%Y%m%d).tar.gz logs/
# Share the tarballMethod 3: System Info
# Generate system information
bash ~/nullsec/system-audit.sh > system-info.txt
# Include in bug reportLocated in ~/nullsec/:
- TESTER_GUIDE.md (this file) - Comprehensive testing guide
- QUICK_REFERENCE.txt - Quick command reference
- NULLSEC_COMMANDS_REFERENCE.md - All 188 modules documented
- NULLSEC_AI_V3_GUIDE.md - AI system usage guide
- SCREENSAVER_GUIDE.md - Screensaver customization
- MODULE_DEVELOPMENT_GUIDE.md - Creating new modules
- API_DOCUMENTATION.md - API reference
- System installation walkthrough
- Launcher navigation tutorial
- Module execution examples
- Log encryption demonstration
- AI integration showcase
- Community: [provided separately]
- Documentation: ~/nullsec/*.md files
- Examples: ~/nullsec/logs/examples/ (if available)
- Scripts: ~/nullsec/resources/scripts/
- Unauthorized penetration testing is illegal
- Always obtain proper authorization
- Document scope and limitations
- Follow responsible disclosure practices
Recommended Setup:
Internet
β
[Host Machine] β Your workstation
β
[Isolated Network] β Internal network with NO internet
β
[Test Targets] β Vulnerable systems for testing
Never:
- Test against production systems without authorization
- Use on public networks without permission
- Execute attacks against internet targets
- Share exploits publicly before disclosure period
- Encrypt all test logs
- Secure test environment properly
- Delete test data after completion
- Follow data retention policies
- Backup critical findings securely
After testing, please provide:
# NullSec Linux 1.0 Test Report
**Tester Name:** [Your Name]
**Test Date:** [Date Range]
**Environment:** [Hardware/VM specs]
## Tests Completed
- [ ] Installation (USB/Full/VM)
- [ ] Launcher functionality
- [ ] Desktop integration
- [ ] Module execution (how many tested)
- [ ] Resource library
- [ ] Log encryption
- [ ] AI integration
- [ ] Performance testing
## Issues Found
1. [Issue description]
- Severity: Critical/High/Medium/Low
- Reproducible: Yes/No
- Workaround: [if any]
## Suggestions
1. [Improvement suggestion]
2. [Feature request]
## Overall Assessment
- Stability: [1-10]
- Performance: [1-10]
- Usability: [1-10]
- Documentation: [1-10]
## Additional Comments
[Free-form feedback]# 1. Boot NullSec Linux (Live or Installed)
# 2. Open terminal and verify setup
cd ~/nullsec
ls -la
cat QUICK_REFERENCE.txt
# 3. Launch framework
./nullsec-launcher.py
# 4. Explore module browser
# Press [D] in launcher
# Try options 1-3
# 5. Run a simple module
# Select port-scanner (or any network module)
# Use 127.0.0.1 as target
# Review logs in ~/nullsec/logs/
# 6. Test desktop menu
# Applications β NullSec Tools β Network Exploitation
# Click any module
# 7. Test resource library
echo $NULLSEC_RESOURCES
ls $NULLSEC_WORDLISTS
python3 $NULLSEC_SCRIPTS/python/port_scanner.py 127.0.0.1
# 8. Set up encryption (optional but recommended)
bash ~/nullsec/install-log-encryption.sh
python3 ~/nullsec/log-encrypt.py --generate-key
# 9. Review documentation
cat ~/nullsec/NULLSEC_COMMANDS_REFERENCE.md | less
# 10. Start comprehensive testing using checklist aboveFor Testing Support:
- Primary Contact: [provided separately]
- Test Coordinator: [provided separately]
- Emergency: [provided separately]
Testing Timeline:
- Test Period: [dates]
- Report Due: [date]
- Review Meeting: [date]
Thank you for testing NullSec Linux!
Your feedback is critical to making this the best penetration testing platform available.
NullSec Linux 1.0 (void) - Built with β‘ for offensive security professionals
"The ultimate penetration testing and security research operating system"