AI-powered cybersecurity assessment platform for auditing Ethiopian financial institutions and telecoms. Combines automated scanners, AI-driven report generation, threat intelligence, compliance mapping, and business operations tools.
7 targets analyzed Β· 137 findings (57 CRITICAL, 87 HIGH) Β· 10+ tools
# 1. Install dependencies
pip install -r requirements.txt
# 2. Pull a model (pick one)
ollama pull qwen3:32b # 20 GB β best quality
ollama pull deepseek-r1:7b # 4.7 GB β fast
# 3. Run a scan
python3 scanners/haka_email_scanner.py --domain cbe.com.et
# 4. Generate a report
python3 haka_ai_reporter.py --input reports/haka_consolidated_cbe.json --mode executive
# 5. Chat with findings
python3 haka_chat.py -q "show me critical findings at CBE"
# 6. Build attack paths
python3 haka_attack_paths.py --target cbe
# 7. Run compliance mapping
python3 haka_compliance.py --target cbe --framework nbe
# 8. Manage client pipeline
python3 haka_crm.py --pipelineAutomated security assessment tools that probe targets and produce structured JSON output.
| Tool | Description | Key Capabilities |
|---|---|---|
haka_exchange_scanner.py |
Exchange server security | OWA exposure, EWS enumeration, version detection, auth assessment |
haka_email_scanner.py |
Email security posture | SPF/DKIM/DMARC validation, MX enumeration, STARTTLS checking |
haka_dns_scanner.py |
DNS infrastructure | Zone transfer attempt, DNSSEC validation, subdomain enumeration |
haka_tls_scanner.py |
TLS/SSL assessment | Cipher suite analysis, certificate validation, protocol version checks |
haka_web_scanner.py |
Web application scan | Header analysis, cookie security, clickjacking, CSP validation |
haka_s3_scanner.py |
S3 bucket audit | Public exposure, ACL analysis, encryption status |
haka_vpn_scanner.py |
VPN endpoint audit | IKE/ISAKMP enumeration, vendor fingerprinting |
haka_collab_scanner.py |
Collaboration tool scan | Teams/SharePoint/Webex exposure assessment |
haka_ct_scanner.py |
Certificate Transparency | Real-time CT log monitoring, subdomain discovery via certs |
haka_ai.py |
AI orchestration | Master orchestrator that runs all scanners and consolidates results |
Usage examples:
python3 scanners/haka_exchange_scanner.py --target mail.cbe.com.et
python3 scanners/haka_email_scanner.py --domain cbe.com.et
python3 scanners/haka_dns_scanner.py --domain cbe.com.et
python3 scanners/haka_tls_scanner.py --host cbe.com.et --port 443
python3 scanners/haka_web_scanner.py --url https://cbe.com.et
python3 scanners/haka_s3_scanner.py --bucket cbe-bucket
python3 scanners/haka_ct_scanner.py --domain cbe.com.et --monitor
python3 scanners/haka_ai.py --target cbe --all # Run all scannersLLM-powered analysis and reporting tools that consume scanner output.
Generates professional, client-ready security assessment reports from HAKA scan findings.
# Technical report (full detail)
python3 haka_ai_reporter.py --input reports/haka_consolidated_cbe.json
# Executive summary for board/regulators
python3 haka_ai_reporter.py --input reports/haka_consolidated_cbe.json --mode executive
# One-page leave-behind (top 3 findings)
python3 haka_ai_reporter.py --input reports/haka_consolidated_cbe.json --mode onepager
# Remediation roadmap only
python3 haka_ai_reporter.py --input reports/haka_consolidated_cbe.json --mode remediation
# Process a directory of scanner JSONs
python3 haka_ai_reporter.py --input reports/ --mode executive
# Dry-run (preview prompt without LLM call)
python3 haka_ai_reporter.py --input reports/haka_consolidated_cbe.json --dry-run
# Interactive mode (refine each section)
python3 haka_ai_reporter.py --input reports/haka_consolidated_cbe.json --interactive
# Use specific model
python3 haka_ai_reporter.py --input reports/haka_consolidated_cbe.json \
--model deepseek-r1:7b --output /tmp/cbe_report.mdReport Modes:
| Mode | Description | Best For |
|---|---|---|
executive |
2-3 paragraph business summary, top risks, priorities | Board, regulators |
technical |
Full findings, MITRE mapping, methodology | Security teams, auditors |
onepager |
Top 3 critical issues, fits on one page | Leave-behind, quick briefs |
remediation |
Phased action plan, effort estimates, verification | Project planning, compliance |
Input formats: Consolidated JSONs (preferred), individual scanner JSONs, or directory of JSONs (auto-merges).
Interactive chat for querying HAKA scan findings in plain English.
# One-shot queries
python3 haka_chat.py -q "show me critical findings at CBE"
python3 haka_chat.py -q "compare CBE and Awash Bank"
python3 haka_chat.py -q "which bank has the worst email security"
python3 haka_chat.py -q "how many banks have exposed Exchange servers"
# Filter by target
python3 haka_chat.py -q "list all findings" --target cbe
# Interactive REPL
python3 haka_chat.py --interactive
python3 haka_chat.py -i --target awash
# Preview context
python3 haka_chat.py -q "find anything related to SWIFT" --dry-runInteractive REPL commands: targets, stats, model <name>, filter <target>, help, quit
Smart context selection filters findings by target name, severity, technology keywords, and intent detection (comparison, pattern analysis, lookup).
Chains HAKA findings into realistic multi-step attack scenarios following MITRE ATT&CK kill chain.
# Generate 3 attack paths for CBE
python3 haka_attack_paths.py --target cbe
# 5 paths for Awash, save to file
python3 haka_attack_paths.py --target awash --count 5 --output attack_paths_awash.md
# Use local model
python3 haka_attack_paths.py --target cbe --model r1 --count 2Output: Named attack paths, risk levels, kill chain stage coverage, step-by-step narrative tied to finding IDs, adversary profiles, impact assessments.
Maps HAKA findings to regulatory frameworks: NBE cybersecurity directives, ISO 27001, PCI-DSS.
# Single framework
python3 haka_compliance.py --target cbe --framework nbe
# All targets, all frameworks
python3 haka_compliance.py --framework all --output compliance_full.md
# Specific target + framework
python3 haka_compliance.py --target awash --framework pcidssOutput: Compliance scores per framework, finding-to-control mapping tables, critical compliance gaps (3+ control violations), regulatory risk statements, prioritized remediation roadmap.
Embedded controls: 30 NBE controls across 10 directives (SBB/77/2020, FIS/01/2021, FIS/02/2019, CIS/01/2022, Risk Management Guidelines, Data Protection Proclamation, Email Security, DNS Security, Network Security, Access Control).
Extracts software versions from findings and enriches with CVE data, CVSS scores, exploit availability.
# Full CVE analysis
python3 haka_threat_intel.py --target cbe
# Only exploitable findings
python3 haka_threat_intel.py --target cbe --exploit-only
# Save to file
python3 haka_threat_intel.py --target awash --output threat_intel_awash.mdOutput: Software inventory table, per-product CVE lists with CVSS scores, exploit availability matrix (public PoC, Metasploit, CISA KEV), prioritized patching roadmap.
Active monitoring and detection tools for ongoing security operations.
| Tool | Description |
|---|---|
haka_spray_detector.py |
Password spray attack detection via EVTX log analysis |
haka_kerberos_detector.py |
Kerberos attack detection (Golden/Silver Ticket, AS-REP roasting) |
haka_wazuh_ai.py |
AI-enhanced Wazuh SIEM integration for anomaly detection |
python3 detectors/haka_spray_detector.py --evtx security.evtx
python3 detectors/haka_kerberos_detector.py --dc 10.0.0.1
python3 detectors/haka_wazuh_ai.py --alert-file alerts.jsonClient management and invoicing for security consulting engagements.
Lightweight CRM for tracking security consulting engagements. Uses SQLite (no external DB).
# Add a client
python3 haka_crm.py --add-client --name "Abebe Kebede" --org "CBE" \
--email "ak@cbe.com.et" --status prospect
# List all clients
python3 haka_crm.py --list-clients
# Add an engagement
python3 haka_crm.py --add-engagement --client 1 --type external_assessment \
--value 8000 --status proposed
# List engagements
python3 haka_crm.py --list-engagements
# Show pipeline
python3 haka_crm.py --pipeline
# Export pipeline to markdown
python3 haka_crm.py --pipeline --export
# Update client/engagement status
python3 haka_crm.py --update --client 1 --status active
python3 haka_crm.py --update --engagement 1 --status signedDatabase: ~/.haka/haka_crm.db (auto-created)
Generates professional invoices for security consulting work. Outputs Markdown.
# Generate from client name + line items
python3 haka_invoice.py --client "CBE" \
--items "External Security Assessment:8000" \
--items "Remediation Roadmap:2000"
# Generate from CRM engagement (auto-fills type + value)
python3 haka_invoice.py --engagement 1
# Custom invoice number, dates
python3 haka_invoice.py --client "Awash Bank" \
--items "Full Penetration Test:15000" \
--number HAKA-2026-005 \
--date 2026-05-01 --due 2026-06-15 \
--output /tmp/awash_invoice.md
# List all invoices
python3 haka_invoice.py --list
# Mark as paid
python3 haka_invoice.py --paid HAKA-2026-001Invoice includes: HAKA Security header, invoice/dates, client info, line items, subtotal, 15% VAT (Ethiopia), total, payment instructions, professional footer. Numbering: HAKA-YYYY-NNN.
Generates customized cybersecurity assessment proposals from CRM data using the proposal template.
# Generate a proposal from a CRM engagement
python3 haka_proposal.py --engagement 1 --output proposals/CBE_Proposal.md
# Preview without saving
python3 haka_proposal.py --engagement 1 --preview
# List all generated proposals
python3 haka_proposal.py --list
# List available engagements in CRM
python3 haka_proposal.py --list-engagementsFeatures: Reads client + engagement data from ~/.haka/haka_crm.db, auto-generates proposal numbers (HAKA-PROP-YYYY-NNN), tailors scope and timeline to engagement type (external_assessment, full_pentest, quarterly_retainer, ir_retainer), outputs ready-to-send markdown proposals.
Legal toolkit and business documentation for launching HAKA Security Consulting as an Ethiopian sole proprietorship.
| Document | File | Description |
|---|---|---|
| Registration Checklist | haka_registration_checklist.md |
Step-by-step guide for registering a self-sponsored cybersecurity consultancy in Ethiopia β trade name, TIN, business license, bank account, VAT, NBE notification. Includes costs (ETB/USD), timelines, required documents, and government office directory. |
| NDA Template | NDA_Template.md |
Mutual Non-Disclosure Agreement template for Ethiopian banking clients. Fill-in-the-blanks format covering confidentiality definitions, exclusions, obligations, term, return of materials, and governing law (Ethiopia). Ready for client signature. |
| Proposal Template | Proposal_Template.md |
Professional cybersecurity assessment proposal with cover page, executive summary, scope of work, deliverables, timeline, pricing, and acceptance blocks. Uses [FILL] placeholders for customization. |
| Landing Page | landing_page.html |
Single-file responsive HTML landing page for HAKA Security. Dark theme with cyan accents, services cards, pricing tiers, and client section. Deployable to any static host β no frameworks. |
Usage flow: Use the registration checklist to get legally set up β send the NDA template to prospective clients β generate a proposal from haka_proposal.py using CRM data β share the landing page as a professional online presence.
HAKA uses a unified provider layer (haka_providers.py) supporting local Ollama and cloud APIs.
| Shortcut | Full Model | Provider |
|---|---|---|
openclaw |
openclaw/default | OpenClaw Gateway (local, same model) |
deepseek |
deepseek-chat | DeepSeek API |
claude |
claude-sonnet-4-20250514 | Anthropic |
claude-opus |
claude-opus-4-20250514 | Anthropic |
claude-haiku |
claude-haiku-4-5-20250514 | Anthropic |
gpt5 |
gpt-4o | OpenAI |
qwen |
qwen3:32b | Ollama (local) |
r1 |
deepseek-r1:7b | Ollama (local) |
gemma |
gemma3:27b | Ollama (local) |
coder |
qwen2.5-coder:7b | Ollama (local) |
The openclaw shortcut auto-discovers the gateway token from ~/.openclaw/openclaw.json.
No setup needed β just make sure the gateway chat completions endpoint is enabled.
Place keys in any of these (auto-discovered):
~/.deepseek.env~/HAKA-AI/.env~/kewani-bot/.env- Environment variables:
DEEPSEEK_API_KEY,ANTHROPIC_API_KEY,OPENAI_API_KEY
# Example ~/.deepseek.env
export DEEPSEEK_API_KEY="sk-your-key-here"
export ANTHROPIC_API_KEY="sk-ant-your-key-here"# Pull recommended models
ollama pull qwen3:32b # 20 GB β best quality reports
ollama pull deepseek-r1:7b # 4.7 GB β fast chat queries
ollama pull gemma3:27b # 17 GB β alternative for reports
ollama pull qwen2.5-coder:7b # 4.7 GB β code analysis
# Usage
python3 haka_ai_reporter.py --model qwen --input reports/haka_consolidated_cbe.json
python3 haka_chat.py --model r1 -q "show me critical findings"HAKA-AI/
βββ README.md # This file
βββ requirements.txt # Python dependencies
βββ haka_providers.py # Unified LLM backend
β
βββ scanners/ # Security assessment scanners
β βββ haka_ai.py # Master orchestrator
β βββ haka_exchange_scanner.py
β βββ haka_email_scanner.py
β βββ haka_dns_scanner.py
β βββ haka_tls_scanner.py
β βββ haka_web_scanner.py
β βββ haka_s3_scanner.py
β βββ haka_vpn_scanner.py
β βββ haka_collab_scanner.py
β βββ haka_ct_scanner.py
β
βββ detectors/ # Active monitoring & detection
β βββ haka_spray_detector.py
β βββ haka_kerberos_detector.py
β βββ haka_wazuh_ai.py
β
βββ haka_ai_reporter.py # AI report engine
βββ haka_chat.py # NL query interface
βββ haka_attack_paths.py # Attack path constructor
βββ haka_compliance.py # Regulatory compliance mapper
βββ haka_threat_intel.py # CVE & exploit intelligence
β
βββ haka_crm.py # Client & pipeline tracker
βββ haka_invoice.py # Invoice generator
βββ haka_proposal.py # Proposal generator
β
βββ docs/ # Business legal toolkit
β βββ haka_registration_checklist.md
β βββ NDA_Template.md
β βββ Proposal_Template.md
β βββ landing_page.html
β
βββ dashboard.html # Web dashboard
βββ dashboard_server.py # Dashboard HTTP server
β
βββ reports/ # Scan output (JSON)
β βββ haka_consolidated_cbe.json
β βββ haka_consolidated_awash.json
β βββ haka_consolidated_dashen.json
β βββ haka_consolidated_boa.json
β βββ haka_consolidated_ethiotelecom.json
β βββ haka_consolidated_telebirr.json
β βββ haka_consolidated_etaf.json
β
βββ resources/ # Static resources
7 targets across Ethiopian financial sector β 137 findings
| Target | File | Findings |
|---|---|---|
| CBE | haka_consolidated_cbe.json |
31 (12 CRIT, 19 HIGH) |
| Awash Bank | haka_consolidated_awash.json |
25 (9 CRIT, 16 HIGH) |
| Ethio Telecom | haka_consolidated_ethiotelecom.json |
23 (9 CRIT, 14 HIGH) |
| Dashen Bank | haka_consolidated_dashen.json |
20 (7 CRIT, 13 HIGH) |
| Bank of Abyssinia | haka_consolidated_boa.json |
18 (6 CRIT, 12 HIGH) |
| Telebirr | haka_consolidated_telebirr.json |
17 (7 CRIT, 10 HIGH) |
| ETAF | haka_consolidated_etaf.json |
3 (3 HIGH) |
Operational and legal templates for running HAKA as a consulting business.
| Document | Description |
|---|---|
docs/haka_registration_checklist.md |
Step-by-step guide for registering HAKA as a sole proprietorship in Ethiopia (trade name, TIN, bank account, VAT). Includes costs, timelines, and office locations. |
docs/NDA_Template.md |
Mutual Non-Disclosure Agreement template for engagements. Fill-in ready for client and HAKA signatures. |
| Tool | Description |
|---|---|
haka_proposal.py |
Generate customized proposals from CRM data + the proposal template |
docs/Proposal_Template.md |
Professional cybersecurity assessment proposal with scope, pricing, terms |
haka_crm.py |
Client & pipeline tracker β use before generating proposals |
# List available engagements
python3 haka_proposal.py --list-engagements
# Generate a proposal from CRM engagement #1
python3 haka_proposal.py --engagement 1 --output proposals/CBE_Proposal.md
# Preview without saving
python3 haka_proposal.py --engagement 1 --preview| Document | Description |
|---|---|
docs/landing_page.html |
Single-file responsive landing page. Dark theme, professional aesthetic. Deploy to any static host. |
| Output Type | Format | Generated By | Content |
|---|---|---|---|
| Scanner reports | JSON | All scanners | Raw findings with severity, evidence, remediation |
| Consolidated reports | JSON | haka_ai.py |
Merged findings across all scanners per target |
| AI reports | Markdown | haka_ai_reporter.py |
Professional reports (executive, technical, onepager, remediation) |
| Attack paths | Markdown | haka_attack_paths.py |
Multi-step attack scenarios with kill chain mapping |
| Compliance reports | Markdown | haka_compliance.py |
Framework compliance scores, gap analysis, roadmaps |
| Threat intel | Markdown | haka_threat_intel.py |
CVE lists, CVSS scores, exploit availability |
| Pipeline reports | Markdown | haka_crm.py --export |
Sales pipeline summary with values by stage |
| Invoices | Markdown | haka_invoice.py |
Professional invoices for client delivery |