Rocheston ZelExploits is an AI-powered automated penetration testing platform built to run authorized offensive validation at enterprise scale.
Powered by AINA and executed through Zombiecop Docker runners, it simulates real testing workflows with live progress, evidence-first findings, MITRE ATT&CK coverage selection, and premium reporting—so teams can validate exposure fast, prove impact with defensible artifacts, and ship fixes with confidence.
ZelExploits automates authorized offensive workflows using AINA to plan, execute safe checks, collect proof, and convert results into actionable remediation.
❝ Automated, evidence-first outcomes. ❞
Every run is executed through Zombiecop runner profiles with controlled resources, isolated instances, and full lifecycle telemetry for enterprise-grade operations.
❝ Clean isolation. Predictable execution. Real control. ❞
Each user only sees their own engagements, scans, findings, evidence, and settings—enforced at the database query layer with strict user scoping.
❝ Your data stays yours—always. ❞
Admin-only controls unlock user management, runner governance, template management, audit views, and global defaults across the platform.
❝ Full control, zero blind spots. ❞
Every scan is tied to an engagement that requires ROE acceptance and scope definition before anything can run.
❝ No ROE, no run. Simple. ❞
Targets are validated against allowlists and exclusions server-side to prevent accidental out-of-scope testing.
❝ Scope is law. The system enforces it. ❞
Core choices are always visible as selectable boxes—scan types, runner selection, auth modes, MITRE coverage, schedules—one glance, one click.
❝ Everything important is visible instantly. ❞
A fast launch page bundles discovery, validation modules, evidence capture, and runner selection into a clean “press go” experience.
❝ One click to a full validation run. ❞
End-to-end AINA-driven testing: plan → recon → validate → evidence → report, with strategy profiles and explainable outputs.
❝ From plan to report—fully guided. ❞
Dispatch AINA tasks for triage, reporting, evidence bundling, compliance mapping, and operations—plus approvals and task history.
❝ AINA is your autonomous operator. ❞
A dense operator console streams live events, shows progress, phases, runner logs, and gives pause/resume/stop control.
❝ Watch the mission unfold in real time. ❞
Launch runs and watch realistic progress, phases, module lanes, and activity logs—then land directly into findings and evidence.
❝ A real run experience, every time. ❞
Power filters, saved views, bulk actions, inline status updates, assignments, accepted risk workflows, and retest scheduling.
❝ Triage at scale without losing precision. ❞
Each finding carries a confidence score and evidence pack so teams can see what’s proven vs what needs review.
❝ Confidence is earned, not claimed. ❞
Central evidence repository with previews, SHA256 hash verification, redaction preview, and export-ready organization.
❝ Proof you can trust and audit. ❞
Every evidence interaction—created, viewed, bundled, exported—is recorded for audit-grade defensibility.
❝ Evidence with a history trail. ❞
Create audit packs, developer packs, and executive packs by selecting evidence objects and exporting structured indexes.
❝ Build report-ready evidence in minutes. ❞
Visual chains show how findings connect into impact paths, with stage arrows and high-level risk narratives.
❝ See the chain. Break the chain. ❞
Node-link diagrams allow deep exploration of entry points, pivots, and impact nodes without exposing harmful steps.
❝ Enterprise risk visualization, safely. ❞
Every chain gets an impact score and fix-cost score so teams can prioritize the highest payoff remediations.
❝ Fix what matters most, first. ❞
ZelExploits highlights low-effort fixes that collapse high-impact chains to maximize remediation ROI.
❝ Small fix. Massive risk reduction. ❞
A dedicated MITRE page loads tactics and techniques from enterprise-attack.json and renders selectable boxes and profiles.
❝ Turn ATT&CK into a selectable coverage plan. ❞
Users can save coverage profiles and apply them as a tile option in scan launch pages for consistent reporting.
❝ Consistent coverage across every run. ❞
Recurring schedules with tile-based creation, next-run preview, run history, and dashboards for success/fail trends.
❝ Automate validations like a real platform. ❞
Schedules show past executions, success rates, and allow immediate runs with full event streams.
❝ Control automation without losing visibility. ❞
A large template catalog covers executive, technical, audit, evidence, operations, and digest-style reports.
❝ Every audience gets the right report. ❞
Per-user branding profiles include logo upload, title formats, footer text, watermark controls, and cover page settings.
❝ Your reports look enterprise-grade by default. ❞
Preview reports in-app, edit drafts, lock final versions, and regenerate updated versions with changelogs.
❝ Report lifecycle built in. ❞
Export reports and indexes in multiple formats with audit logging and evidence citations.
❝ Export cleanly. Share confidently. ❞
AINA chat supports threads, pinned conversations, quick prompts, and linking to engagements/scans/findings/evidence.
❝ Ask once. Get structured answers. ❞
AINA converts scope and objectives into a structured validation plan checklist and can turn plans into tasks.
❝ Plans that turn into action. ❞
AINA rewrites the same issue for different audiences while referencing evidence IDs for defensible clarity.
❝ Same truth, perfect language for each team. ❞
AINA proposes status/assignment changes, then shows a confirmation modal before applying updates.
❝ AI suggestions, human control. ❞
Generate control-mapping tables and evidence outlines that align findings to compliance requirements.
❝ Compliance becomes a byproduct of proof. ❞
A massive library of validation labs across Web/API/Cloud/K8s/Identity/Forensics/AI Security with featured templates and search.
❝ Infinite practice environments, instantly searchable. ❞
Users launch instances, manage status, configure connection settings, and view activity timelines.
❝ Sandbox operations like a cloud platform. ❞
Connect to sandbox instances via a built-in terminal UI with session management and transcript export.
❝ The environment opens inside the app. ❞
A full catalog system for building safe playbooks: tools, skills, tasks, favorites, approvals, and versioning.
❝ Build reusable workflows like software. ❞
A scalable catalog for hundreds of Rocheston tools with import, search, filtering, and task attachment.
❝ A massive arsenal—organized and usable. ❞
Per-user data isolation across every module using strict user_id scoping in SQLite. Admin can manage all data with audit-logged “View As User” capability.
Password hashing (password_hash), secure sessions (httpOnly, SameSite), CSRF protection on all state-changing actions, and login rate limiting with lockout tracking.
Users can enable TOTP 2FA with QR provisioning and backup codes. Admin can force 2FA globally or per-user.
All sensitive secrets are encrypted at rest using libsodium and an APP_SECRET stored outside public/: OpenAI keys, TOTP secrets, backup codes, and runner environment secrets.
Every run is tied to an Engagement with ROE acceptance, version hash, and timestamp. Runs are blocked if ROE is not accepted or targets are out of scope.
Scope Builder enforces allowlist/denylist and prevents out-of-scope targets from launching—validated server-side, not only in UI.
Admin can create multiple Zombiecop runner profiles with image name, volumes, ports, env vars, resource limits, concurrency caps, and enable/disable controls. Users select runners via visible tiles.
Each run creates a runner instance record with lifecycle status, logs, health indicators, and operational events visible in Sandboxes and Realtime Task monitors.
Terminal sessions attach to runner instances and execute only admin-allowlisted safe templates. Full transcripts are stored and exportable, with every command audit logged.
Auto-Pentest and Full AI Testing launches show a premium run console with progress bar, phase labels, module lane progress, live activity logs, pause/resume/stop, and completion actions linking to Findings/Evidence/Reports.
A dense operator console shows running/queued/completed/failed tasks, streaming events, filters by phase/severity, runner logs split view, and control actions (pause/resume/stop/throttle).
Advanced triage workbench with filters, saved views, bulk actions, inline status edits, confidence bars, evidence counts, and a multi-tab right drawer for full finding details.
Central evidence repository with preview pane, hash verification (SHA256), redaction preview, bundle builder, export options, and custody timeline for every access/export action.
Attack Path Analysis supports Chain Board and Graph View diagrams, impact score + fix cost scoring, quick-win breakpoints, remediation checklist, heatmaps, and AINA chain analysis (safe narrative only).
Catalog of 120+ sandbox templates with categories, difficulty, featured items, filters, launch wizard, per-user instances, start/stop/pause/resume/restart, configuration, and connect viewer (simulated streaming by default).
Powerful catalog with Tools, Skills, Tasks, versioning/approval, task builder wizard, favorites/recently used, bulk import, and a scalable Rocheston Tools catalog seeded for 500+ items.
Tabbed AI suite: Chat threads, Plan Builder, Findings Explainer, Triage Copilot, Report Writer, Compliance Mapper. Structured outputs only (no raw JSON) with per-user storage and usage analytics.
Users store OpenAI key securely, select models, test connection/latency, configure token limits and temperature, and view usage by feature with guardrail budgets.
Dedicated MITRE page loads tactics + all techniques/sub-techniques from local enterprise-attack.json and renders selectable tactic/technique boxes, profiles, export/import, and run integration tiles.
Recurring schedules with tile-based creation, next-run preview, run history, templates, KPI dashboards, and Chart.js analytics for success/fail trends and frequency mix.
Template gallery across Executive/Technical/Audit/Ops reports with per-user branding: logo upload, title formats, footer text, watermark, cover page, export defaults, and versioned report lifecycle.
Exports include HTML/PDF/JSON where supported. Reports include evidence citations (IDs, timestamps, hashes) and optional MITRE coverage summaries and attack path summaries.
Toast alerts, notification inbox, and a full activity feed with filters. Every major action generates activity and admin-level audit records.
Append-only audit logging for sensitive operations: scope changes, approvals, exports, runner changes, user management, and “View As User” events.
Top-bar global search queries engagements, targets, scans, findings, reports, evidence, tools, tasks, and sandboxes with grouped results and direct navigation.
Clean directory structure with controllers, models, services, middleware, reusable UI components, and install/seed tooling designed for rapid extension.
Heavy seeded dataset across every module (engagements, scans, findings, evidence, reports, sandboxes, tools/tasks) so the UI is never empty and dashboards are immediately impressive.
System health views, worker heartbeat, logs viewer, feature flags, backup/export of SQLite, and admin tools to remove demo content when going live.