██╗ ██╗ █████╗ ███╗ ██╗ ██████╗ ██████╗ ██████╗██╗ ██╗ ██║ ██║██╔══██╗████╗ ██║██╔════╝██╔═══██╗██╔════╝██║ ██╔╝ ███████║███████║██╔██╗ ██║██║ ██║ ██║██║ █████╔╝ ██╔══██║██╔══██║██║╚██╗██║██║ ██║ ██║██║ ██╔═██╗ ██║ ██║██║ ██║██║ ╚████║╚██████╗╚██████╔╝╚██████╗██║ ██╗ ╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═══╝ ╚═════╝ ╚═════╝ ╚═════╝╚═╝ ╚═╝
Hancock is CyberViser's elite AI security agent — fine-tuned on Mistral 7B with MITRE ATT&CK, NVD/CVE, and real-world pentest knowledge. Automate pentesting, SOC analysis, and incident response with a single API.
Hancock switches modes on command — red team or blue team, it adapts to your mission.
Recon, exploitation, post-exploitation, CVE research, and professional report writing. Built on MITRE ATT&CK and NVD. Knows Metasploit, Burp Suite, nmap, sqlmap, and 50+ tools.
Alert triage, SIEM queries (Splunk SPL, Elastic KQL, Sentinel KQL), PICERL incident response, Sigma/YARA rule generation, IOC analysis, and threat hunting.
LoRA fine-tuned on curated cybersecurity datasets — MITRE ATT&CK TTPs, CVE/NVD data, and real pentest Q&A. Runs locally or via NVIDIA NIM inference.
Drop Hancock into any workflow. Seven endpoints: /v1/chat, /v1/ask, /v1/triage, /v1/hunt, /v1/respond, /v1/code, /v1/webhook. JSON in, answers out.
Official clients in clients/python/ and clients/nodejs/. One-line install, all 7 endpoints, interactive CLI, streaming output, model alias switching.
Push alerts from Splunk, Elastic, Sentinel, or CrowdStrike to /v1/webhook — auto-triage with MITRE mapping and instant Slack or Teams notification.
Board-level risk reporting, compliance gap analysis (SOC2, ISO 27001, NIST CSF), security program roadmaps, and executive summaries — coming in Phase 3.
Native Burp Suite extension for real-time AI analysis of web app findings, automated report generation, and payload suggestion during active engagements.
Start the server with python hancock_agent.py --server and hit these endpoints.
Three phases. One mission: automate cybersecurity from red team to the boardroom.
Fine-tuned Mistral 7B on MITRE ATT&CK, NVD/CVE, and pentest knowledge bases. CLI + REST API with Pentest and SOC modes. NVIDIA NIM inference backend.
Expanded fine-tuning on detection engineering, threat intel feeds (MISP/TAXII/STIX), UEBA patterns, and automated Sigma/YARA rule generation pipelines.
Executive reporting, compliance automation (SOC2, ISO 27001, NIST CSF), risk scoring, security program KPIs, and board-ready presentation generation.
Source available. Runs locally or in the cloud via NVIDIA NIM. Free for personal use.