Installation
- Update your system packages:
sudo apt update -y && apt full-upgrade -y
- Clone the Cyberonix repository from GitHub:
git clone https://github.com/TeamDefronix/Cyberonix.git
- Navigate to the Cyberonix directory:
cd Cyberonix
- Make the setup script executable:
chmod +x setup.py
- Run the setup script using Python3:
sudo python3 setup.py
- Execute Cyberonix:
cyberonix
PIP intallation
pip install cyberonix
If you encounter the "Externally-Managed-Environment" issue on your machine, please refer to our blog for a solution. You can find detailed information and steps to resolve this problem by clicking here.
Usage
-
To display the help menu, use the following command: cyberonix -h
-
To exit the Cyberonix tool, press: ctrl+c
-
Press the enter
key to navigate back.
Below are the instructions to access the tool's help function, along with a complete list of all available switches:
Welcome to Cyberonix - Your Cyber Security Resource Hub!
Basic Options:
-h, --help : Get this help message.
--domain DOMAIN, -D DOMAIN : Target a specific domain.
--output OUTPUT, -o OUTPUT : Save results to a file (provide the file path).
--file FILE, -f FILE : Read input from a file (provide the file path).
--ip IP, -ip IP : Target a specific IP address.
Main Functions:
--tools, -t : Access various cybersecurity tools.
--cheatsheet, -c : Get a cybersecurity reference guide.
IP Operations:
--getip, -gip : Get the IP address of a domain.
Can use with: --domain, --file, --output
--ipinfo, -ipi : Get information about an IP address.
Can use with: --ip, --file, --output
DNS Operations:
--dnsrecord, -dns : Get DNS records for a domain.
Can use with: --domain, --file, --output
--record RECORD, -r RECORD : Specify the type of DNS record (e.g., A, TXT, MX).
usage: --record <type>
ASN Record:
--asnrecord, -asn : Get ASN (network) information.
Can use with: --ip, --file, --output
Screenshoting:
--screenshot, -s : Take a website screenshot.
Can use with: --domain, --file, --output
HTTP Status:
--http-status, -S : Check a website's HTTP status code.
Can use with: --domain, --file, --output
Remove Duplicate:
--remove-duplicate, -rd : Remove duplicate lines from a file.
Can use with: --file, --output
Password Generation:
--passwordgen, -P : Generate a secure password.
--default-password-gen, -pass: Generate a strong random password (recommended).
Customization Options:
--upper, -u : Include uppercase letters.
--lower, -l : Include lowercase letters.
--digits, -d : Include numbers.
--punctuation, -p : Include symbols.
--length LENGTH, -L LENGTH : Set password length (default is 8).
--checkpassword, -C : Test the strength of a password.
Worlist Generation:
--worlist, -w : To generate a wordlist
--characters,-c : Set of characters to include in the wordlist (Default = abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 )
--min_length, -min : Minimum length of the words ( Default = 4 )
--max_length, -max : Maximum length of the words ( Default = 6 )
--output_file, -ot : Output file name ( Default = custom_wordlist.txt )
Categories
Information Gathering
Tool Name |
Tool Name |
Tool Name |
Useful Websites |
Nmap |
Subfinder |
Maltego |
Dracnmap |
Red_Hawk |
Th3Inspector |
Hping3 |
Arping |
Netdiscover |
The Harvester |
Wafw00f |
Recon-Ng |
Sublist3R |
Spiderfoot |
Amass |
|
|
Vulnerability Analysis
Tool Name |
Tool Name |
Tool Name |
Wpscan |
Wireshark |
Wapiti |
Nmap |
Legion |
Nikto |
Wfuzz |
|
|
Web Application Analysis
Tool Name |
Tool Name |
Tool Name |
Burp Suite |
Dirsearch |
Owasp Zap |
Dirbuster |
Nikto |
Wapiti |
Nessus |
Dirb |
Nuclei |
Ffuf |
|
|
Password Attacks
Brute Force Attacks
Tool Name |
Tool Name |
Tool Name |
Hashcat |
John The Ripper |
Hydra |
Johnny (GUI John) |
Brutus |
Dirbuster |
Reaver |
Dirsearch |
|
Dicitionary Attacks
Tool Name |
Tool Name |
Tool Name |
Hashcat |
John The Ripper |
Hydra |
Medusa |
Ncrack |
Johnny (GUI John) |
Rainbow Table Attacks
Tool Name |
Tool Name |
Rainbowcrack |
Ophcrack |
Wordlist Generator
Tool Name |
Tool Name |
Tool Name |
Crunch |
Cupp |
Bopscrk |
Phishing Attacks
Tool Name |
Tool Name |
Tool Name |
Social-Engineer Toolkit (SET) |
Hiddeneye |
R3Bu5 |
Zphisher |
Shellphish |
Gophish (GUI) |
Camphish |
|
|
Keylogger Attacks
Tool Name |
Tool Name |
Zlogger |
Keylogger |
Wireless Attacks
Tool Name |
Tool Name |
Tool Name |
Kismet |
Wifite |
Fern Wifi Cracker |
Aircrack-Ng |
Fluxion |
Wifiphisher |
Exploitation Tools
Tool Name |
Tool Name |
Tool Name |
Metasploit |
Crackmapexec |
Searchsploit |
Beef |
Routersploit |
Sqlmap |
Seclists |
Airmitage |
|
Sniffing And Spoofing
Tool Name |
Tool Name |
Tool Name |
Wireshark |
Bettercap |
Tcpdump |
Arpspoof |
Dsniff |
Scapy |
Netsniff-Ng |
Macchanger |
Responder |
Airgeddon |
Sharesniffer |
Wifi-Pumpkin-3 |
Mitmproxy |
Zaproxy |
|
Post Exploitation
Tool Name |
Tool Name |
Tool Name |
Metasploit-Framework |
Linpeas |
Linenum |
Sudo Killer |
Beroot |
Linux Exploit Suggester 2 |
LSE (Linux Smart Enumeration) |
Pspy |
Bashark |
Linux Private-I |
Shellter |
Amber |
Upx (Ultimate Packer for Executable) |
Covermyass |
|
Anonymity
Tool Name |
Tool Name |
Tool Name |
Tor |
Anonsurf |
Nipe |
Proxychain |
|
|
Framework
Tool Name |
Tool Name |
OSINT Framework |
MITRE Framework |
Pentesting And Bug-Bounty
Information Gathering
Tool Name |
Tool Name |
Tool Name |
Useful Websites |
Nmap |
Subfinder |
Maltego |
Dracnmap |
Red_Hawk |
Th3Inspector |
Hping3 |
Arping |
Netdiscover |
The Harvester |
Wafw00f |
Recon-Ng |
Sublist3R |
Spiderfoot |
Amass |
|
|
Configuration Management
Tool Name |
Tool Name |
Tool Name |
Dirb |
gobuster |
Nikto |
Wfuzz |
Skipfish |
Dirbuster |
Feroxbuster |
Nmap |
Httpie |
Metasploit |
Securityheaders |
Sqlmap |
Trufflehog |
Gitleaks |
Secretfinder |
Secure Transmission
Writeups |
Writeups |
Check SSL Version, Algorithms, Key Length |
Check for Digital Certificate Validity |
Check Credentials Only Delivered Over HTTPS |
Check Session Tokens Only Delivered Over HTTPS |
Check if HTTP Strict Transport Security (HSTS) |
|
Authentication
Writeups |
Writeups |
Writeups |
User Enumeration |
Authentication Bypass |
Vulnerable Remember Me Functionality |
Password Reset |
Captcha Bypass |
Autocomplete On |
Multifactor Authentication |
Logout Functionality |
Cache Management |
Default Credentials |
|
|
Session Management
Tool Name |
Tool Name |
Tool Name |
OWASP Zap |
BurpSuite |
Nikto |
Nmap |
Wapiti |
Nessus |
Nuclei |
Fiddler |
Penetration Testers Framework (PTF) |
Authorization
Tool Name |
Tool Name |
Tool Name |
BurpSuite |
Wireshark |
OWASP Zap |
Nessus |
Hydra |
Beef |
Sqlmap |
Metasploit |
Nmap |
Penetration Testers Framework (PTF) |
|
|
Data Validation
Tool Name |
Tool Name |
Tool Name |
XSS |
XXE - XML |
HTML Injection |
SQL Injection |
Command Injection |
HTTP Smuggling |
HTTP Parameter Pollution |
Open Redirection |
LFI |
Denial Of Service
Tool Name |
Tool Name |
Goldeneye |
Slowhttptest |
Thc-SSL-Dos |
Slowloris |
Business Logic
Writeups |
Writeups |
Business Logic |
Exploiting Business Logic Vulnerabilities |
Web Application — Business Logic Vulnerabilities |
Business Logic Flaw |
Cryptography
Tool Name |
Tool Name |
Tool Name |
SSLstrip |
Bettercap |
Ettercap |
SSLyze |
0-Saft |
SSLscan |
SSLLabs |
|
|
Risky Functionality - File Uploads
Tool Name |
Tool Name |
Fuxploider |
Upload Scanner |
Risky Functionality - Card Payment
Tool Name |
Tool Name |
Tool Name |
BurpSuite |
Wireshark |
OWASP Zap |
Nessus |
SQLmap |
Fiddler |
Metasploit |
Nmap |
Penetration Testers Framework (PTF) |
Html 5
Writeups |
Writeups |
Writeups |
Web Messaging |
Web Storage SQL Injection |
CORS Implementation |
-
Cheatsheets
-
Certifications & Roadmap
-
Beginner Level Certifications
-
Advance Level Certifications
-
Bug Bounty
- Bug Bounty for Beginners
- Reconnaissance
- Intel Discovery
- Enumeration
- Vulnerability Analysis
- Exploitation
- Reporting
Screenshots
Socials
Support
Thanks To All Contributors