Syd - Air-Gapped Red and blueteam
嗯,用户发来了一段英文内容,看起来是一个独立开发者介绍他开发的工具Syd。他希望我用中文帮他总结一下文章内容,控制在100字以内,而且不需要以“文章内容总结”之类的开头,直接写描述。 首先,我需要通读整篇文章,理解Syd的功能和用途。Syd是一个本地AI助手,用于渗透测试和安全分析,支持BloodHound、Nmap和Volatility 3等工具。它能够解析这些工具的输出数据,并以自然语言回答问题。数据处理完全本地化,没有云服务依赖。 接下来,我要注意用户的需求:总结在100字以内。这意味着我需要抓住关键点:Syd的功能、支持的工具、本地处理、目标用户群体(如安全顾问、红蓝队)以及它与ChatGPT的区别。 然后,我要确保语言简洁明了,避免使用复杂的句子结构。同时,不需要使用“文章内容总结”这样的开头词,直接进入描述。 最后,检查字数是否符合要求,并确保所有关键信息都被涵盖。这样用户就能快速了解Syd的主要功能和用途了。 </think> 一位独立开发者介绍了其开发的本地AI工具Syd,专为渗透测试和安全分析设计。支持BloodHound、Nmap和Volatility 3等工具的数据解析与分析,提供自然语言问答功能。数据完全本地处理,无云依赖。旨在帮助安全顾问、红蓝队快速分析数据、生成报告并辅助决策。 2026-1-23 13:49:17 Author: www.reddit.com(查看原文) 阅读量:0 收藏

Hey everyone,

I’m an independent developer and for the past few months I’ve been working on a tool called Syd. Before I invest more time and money into it, I’m trying to get honest feedback from people who actually work in security.

Syd is a fully local, offline AI assistant for penetration testing and security analysis. The easiest way to explain it is “ChatGPT for pentesting”, but with some important differences. All data stays on your machine, there are no cloud calls or APIs involved, and it’s built specifically around security tooling and workflows rather than being a general-purpose chatbot. The whole point is being able to analyse client data that simply cannot leave the network.

Right now Syd works with BloodHound, Nmap, and I’m close to finishing Volatility 3 support.

With BloodHound, you upload the JSON export and Syd parses it into a large set of structured facts automatically. You can then ask questions in plain English like what the shortest path to Domain Admin is, which users have DCSync rights, or which computers have unconstrained delegation. The answers are based directly on the data and include actual paths, users, and attack chains rather than generic explanations.

With Nmap, you upload the XML output and Syd analyses services, versions, exposed attack surface and misconfigurations. You can ask things like what the most critical issues are, which Windows servers expose SMB, or which hosts are running outdated SSH. The output is prioritised and includes CVE context and realistic next steps.

I’m currently finishing off Volatility 3 integration. The idea here is one-click memory analysis using a fixed set of plugins depending on the OS. You can then ask practical questions such as whether there are signs of malware, what processes look suspicious, or what network connections existed. It’s not trying to replace DFIR tooling, just make memory analysis more approachable and faster to reason about.

The value, as I see it, differs slightly depending on who you are. For consultants, it means analysing client data without uploading anything to third-party AI services, speeding up report writing, and giving junior testers a way to ask “why is this vulnerable?” without constantly interrupting seniors. For red teams, it helps quickly identify attack paths during engagements and works in restricted or air-gapped environments with no concerns about data being reused for training. For blue teams, it helps with triage and investigation by allowing natural language questions over logs and memory without needing to be an expert in every tool.

One thing I’ve been careful about is hallucination. Syd has a validation layer that blocks answers if they reference data that doesn’t exist in the input. If it tries to invent IPs, PIDs, users, or hosts, the response is rejected with an explanation. I’m trying to avoid the confident-but-wrong problem as much as possible.

I’m also considering adding support for other tools, but only if there’s real demand. Things like Burp Suite exports, Nuclei scans, Nessus or OpenVAS reports, WPScan, SQLMap, Metasploit workspaces, and possibly C2 logs. I don’t want to bolt everything on just for the sake of it.

The reason I’m posting here is that I genuinely need validation. I’ve been working on this solo for months with no sales and very little interest, and I’m at a crossroads. I need to know whether people would actually use something like this in real workflows, which tools would matter most to integrate next, and whether anyone would realistically pay for it. I’m also unsure what pricing model would even make sense, whether that’s one-time, subscription, or free for personal use with paid commercial licensing.

Technically, it runs on Windows, macOS and Linux. It uses a local Qwen 2.5 14B model, runs as a Python desktop app, has zero telemetry and no network dependencies. Sixteen gigabytes of RAM is recommended and a GPU helps but isn’t required.

I can share screenshots or record a walkthrough showing real BloodHound and Nmap workflows if there’s interest.

I’ll be honest, this has been a grind. I believe in the idea of a privacy-first, local assistant for security work, but I need to know if there’s actually a market for it or if the industry is happy using cloud AI tools despite the data risks, sticking to fully manual analysis, or relying on scripts and frameworks without LLMs.

Syd is not an automated scanner, not a cloud SaaS, not a ChatGPT wrapper, and not an attempt to replace pentesters. It’s meant to be an assistant, nothing more.

If this sounds useful, I’m happy to share a demo or collaborate with others. I’d really appreciate any honest feedback, positive or negative.

Thanks for reading.

sydsec.co.uk

https://www.youtube.com/@SydSecurity

[email protected]


文章来源: https://www.reddit.com/r/netsec/comments/1qkra8i/syd_airgapped_red_and_blueteam/
如有侵权请联系:admin#unsafe.sh