Skip to content

β„ο½π• π”±π•π‘’ΕœΕœ is a stealthy, all-in-one pentesting console that packs recon, enumeration, and exploitation tools into a secure and minimal interface. It keeps everything isolated, fast, and mission-ready.

Notifications You must be signed in to change notification settings

karandesai2005/Rootless

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

13 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Rootless

A secure, sandboxed, cross-platform pentesting desktop console

Rootless is a security-first desktop application that lets you run common pentesting tools like Nmap in isolated environments, without virtual machines, without package conflicts, and without unsafe sudo usage.

One install β†’ one UI β†’ isolated tools β†’ live output.


✨ Why Rootless?

Traditional pentesting setups are painful and fragile:

  • Virtual machines are heavy and slow
  • Toolchains conflict with system packages
  • Many tools are Linux-only
  • sudo everywhere is dangerous
  • Switching between terminals kills focus

Rootless fixes this by:

  • Running tools in OS-level sandboxes
  • Keeping the UI completely unprivileged
  • Granting only the exact capabilities required
  • Streaming output live into a modern UI
  • Working toward cross-platform parity

🧠 Architecture Overview

Rootless uses a layered, least-privilege architecture. alt text

Electron UI
   ↓ IPC (safe bridge)
FastAPI Orchestrator (Python)
   ↓ HTTP + SSE
Go Sandbox Runtime
   ↓ exec
Firejail (Linux isolation)
   ↓
Pentesting Tool (Nmap, Gobuster, etc.)
   ↑
Live stdout/stderr streamed back to UI

Layer Responsibilities

πŸ–₯️ Electron UI

  • Tool selection & presets
  • Network interface visibility
  • Live streaming output
  • No Node.js access
  • No command execution

🐍 FastAPI Orchestrator

  • Validates tool requests
  • Maps UI presets β†’ safe commands
  • Selects sandbox profiles
  • Acts as SSE proxy

βš™οΈ Go Sandbox

  • Spawns and supervises tools
  • Streams stdout/stderr line-by-line
  • Handles process lifecycle safely

πŸ”’ Firejail (Linux)

  • Filesystem isolation
  • Network access control
  • Capability-based privileges (net_raw, etc.)
  • No full root shells

🌐 Network Intelligence Panel

Rootless includes a built-in network awareness panel.

alt text

Features:

  • Lists all network interfaces
  • Shows IPv4 / IPv6 addresses
  • Identifies loopback vs real interfaces
  • Cross-platform via os.networkInterfaces()
  • No shell commands, no parsing hacks

This allows users to:

  • Instantly identify local subnets
  • Choose correct scan targets
  • Avoid accidental scans on the wrong interface

πŸ” Nmap Integration (First-Class)

Nmap is not treated as a raw command runner.

Design Principles

  • ❌ No free-text flags
  • ❌ No sudo in the UI
  • βœ… Preset-driven scans
  • βœ… Capability-based privileges
  • βœ… Live output streaming

Example

Instead of running:

sudo nmap -sS -sV 192.168.1.0/24

Users simply:

  1. Select Nmap
  2. Choose a scan type (Quick, TCP, Service, Ping)
  3. Enter a target
  4. Click Run

Rootless automatically:

  • Chooses safe flags
  • Selects the correct sandbox profile
  • Streams output in real time

alt text

πŸ“Ί Live Streaming Output

All tools stream output live, end-to-end.

  • Line-buffered execution
  • stdout and stderr handled separately
  • Server-Sent Events (SSE)
  • No polling
  • No fake progress bars

The UI shows exactly what the tool prints, as it happens.


πŸ” Security Model

Rootless follows least privilege by default.

  • Renderer process cannot execute commands
  • Orchestrator only accepts known tools
  • Sandbox enforces filesystem isolation
  • Network access is explicit
  • Raw sockets only when required
  • One-way trust flow:
UI β†’ Orchestrator β†’ Sandbox β†’ Tool

A compromised UI does not equal system compromise.


🧩 Tool Support

Current

  • βœ… Nmap (preset-based, sandboxed)
  • βœ… Network interface discovery

In Progress

  • πŸ”œ Gobuster
  • πŸ”œ Wireless tooling (monitor mode aware)
  • πŸ”œ WASM-based tools
  • πŸ”œ Tool profiles & capability tiers

🚧 Project Status

Rootless is actively developed.

Current focus:

  • Hardening sandbox profiles
  • Improving Nmap UX
  • Expanding tool abstractions
  • Preparing cross-platform backends (macOS / Windows)

πŸ›£οΈ Short-Term Roadmap

  • Interface β†’ auto-fill scan target
  • Tool-specific permission warnings
  • Saved scan presets
  • Tool result export
  • App packaging (AppImage / dmg / exe)

🀝 Contributing

This project is early-stage but stable. Ideas, reviews, and security discussions are welcome.


πŸ“œ License

TBD (will be added before first public release)

About

β„ο½π• π”±π•π‘’ΕœΕœ is a stealthy, all-in-one pentesting console that packs recon, enumeration, and exploitation tools into a secure and minimal interface. It keeps everything isolated, fast, and mission-ready.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •