Skip to content

Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers out there to get resources of various topics in Cyber Security. We will keep updating this tool & adding new & updated resources on the go.

License

Notifications You must be signed in to change notification settings

0xMrR0b0t/Cyberonix

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CYBERONIX




Latest release Last commit License Stars Issues Repo Size follow on Twitter Discord

Description

Cyberonix is an open source & free tool by Team Metaxone Solution. The tool at first is developed by a team of students as part of their Internship at Metaxone Solution after their Diploma in Cyber Security Training.

It is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers out there to get resources of various topics in Cyber Security. We will keep updating this tool & adding new & updated resources on the go.

Feel free to suggest any feature that you want to see in this tool, We will be happy to include that in our next update.



 Install 

 Categories 

 ScreenShots 

 Contributors 

 Usage 


Installation

sudo apt update -y && apt full-upgrade -y
git clone https://github.com/TeamMetaxone/Cyberonix.git
cd Cyberonix
chmod +x setup.py
sudo python3 setup.py
cyberonix

pip Installation

pip install cyberonix

Categories

  • Tools

    • Information Gathring

      • Nmap
      • Maltego
      • Dracnmap
      • Red_Hawk
      • Th3Inspector
      • Hping3
      • Arping
      • Netdiscover
      • Wafw00f
    • Vulnerability Analysis

      • Wpscan
      • Wapiti
      • Nmap
      • Legion
      • Nikto
    • Web Application Analysis

      • Burp Suite
      • Owasp Zap
      • Nikto
      • Wapiti
      • Nessus
      • Dirb
      • Skipfish
      • Nuclei
    • Password Attacks

      • Brute Force Attacks

        • Hashcat
        • John The Ripper
        • Hydra
        • Johnny
        • Crackstatiion
        • cyberchef
      • Dicitionary Attacks

        • Hashcat
        • John The Ripper
        • Hydra
        • Medusa
        • Nrack
        • Johnny
        • Crackstation
        • Cyberchef
      • Rainbow Table Attacks

        • Rainbowcrack
        • Ophcrack
      • Wordlist Generator

        • Social-Engineer
        • Hiddeneye
        • R3Bu5
        • Zphisher
        • Shellphish
        • Gophish
      • Phishing Attacks

        • Social-Engineer
        • Hiddeneye
        • R3Bu5
        • Zphisher
        • Shellphis
        • Gophish
      • Keylogger Attacks

        • Zlogger
    • Wireless Attacks

      • Kismet
      • Wifite
      • Fern Wifi Cracker
      • Aircrack-Ng
      • Fluxion
      • Wifiphisher
      • Bettercap
    • Exploitation Tools

      • Metasploit
      • Crackmapexec
      • Searchsploit
      • Beef
      • Routersploit
      • Sqlmap
      • Airmitage
      • Commix
    • Sniffing And Spoofing

      • Wireshark
      • Bettercap
      • Tcpdump
      • Arpspoof
      • Dsniff
      • Scapy
      • Netsniff-Ng
      • Macchanger
      • Responder
      • Airgeddon
      • Sharesniffer
      • Wifi-Pumpkin-3
    • Post Exploitation

      • Privilege Escalation

        • Metasploit-Framework
        • Linpeas
        • Sudo Killer
        • Berrot
        • Linux Exploit Suggester 2
        • Lse
        • Pspy
        • Bashark
        • Linux Private-I
      • Maintain Access

        • Metasploit-Framework
        • Shellter
        • Amber
        • Upx
      • Clearing or Removing Tracks

        • Metasploit-Framework
        • Covermyass
    • Pentesting And Bug-Bounty

      • Information Gathering

        • Nmap
        • Maltego
        • Dracnmap
        • Red_Hawk
        • Th3Inspector
        • Hping3
        • Arping
        • Netdiscover
        • Wafw00F
      • Configuration Management

        • Dirb
        • gobuster
        • Nikto
        • Wfuzz
        • Skipfish
        • Dirbuster
        • Feroxbuster
        • Nmap
        • Httpie
        • Metasploit
        • Securityheaders
        • Sqlmap
        • Trufflehog
        • Gitleaks
        • Secretfinder
      • Secure Transmission

        • Writeups

          • Check Ssl Version, Algorithms, Key Length
          • Check For Digital Certificate Validity
          • Check Credentials Only Delivered Over Https
          • Check Session Tokens Only Delivered Over Https
          • Check If Http Strict Transport Security (Hsts) In Use
      • Authentication

        • Burp Suite
        • Wireshark
        • Owasp Zap
        • Nessus
        • Hydra
        • Beef
        • Sqlmap
        • Metasploit
        • Nmap
        • Penetration Testers Framework (Ptf)
      • Session Management

        • Owasp Zap
        • Burpsuite
        • Nikto
        • Nmap
        • Arachni
        • Wapiti
        • Nessus
        • Nuclei
        • Fiddler
        • Penetration Testers Framework (Ptf)
      • Authorization

        • Burpsuite
        • Wireshark
        • Owasp Zap
        • Nessus
        • Hydra
        • Beef
        • Sqlmap
        • Metasploit
        • Nmap
        • Penetration Testers Framework (Ptf)
      • Data Validation

        • Xss
        • Xxe - Xml
        • Html Injection
        • Sql Injection
        • Command Injection
        • Http Smuggling
        • Http Parameter Pollution
        • Open Redirection
        • Lfi
      • Denial Of Service

        • Goldeneye
        • Slowhttptest
        • Thc-Ssl-Dos
        • Slowloris
      • Business Logic

        • Writeups

          • Business Logic
          • Exploiting Business Logic Vulnerabilities
          • Web Application — Business Logic Vulnerabilities
          • Business Logic Flaw
      • Cryptography

        • Sslstript
        • Bettercap
        • Ettercap (Graphical Of Bettercap)
        • Sslyze
        • 0-Saft
        • Sslscan
        • Ssllabs
      • Risky Functionality - File Uploads

        • Fuxploider
        • Fuse
      • Risky Functionality - Card Payment

        • Burpsuite
        • Wireshark
        • Owasp Zap
        • Nessus
        • Sqlmap
        • Fiddler
        • Metasploit
        • Nmap
        • Penetration Testers Framework (Ptf)
      • Html 5

        • Writeups

          • Web Messaging
          • Web Storage Sql Injection
          • Cors Implementation
          • Offline Web Application
  • Cheatsheets

    • Nmap Cheatsheet
    • Maltego Cheatsheet
    • Hping3 Cheatsheet
    • Netdiscover Cheatsheet
    • Wafw00F Cheatsheet
    • Metasploit-Framework Cheatsheet
    • Wireshark Cheatsheet
    • Bettercap Cheatsheet
    • Tcpdump Cheatsheet
    • Scapy Cheatsheet
    • Responder Cheatsheet
    • Airgeddon Cheatsheet
    • Wpscan Cheatsheet
    • Wapiti Cheatsheet
    • Legion Cheatsheet
    • Nikto Cheatsheet
    • Burp Suite Cheatsheet
    • Owasp Zap Cheatsheet
    • Nessus Cheatsheet
    • Dirb Cheatsheet
    • Skipfish Cheatsheet
    • Nuclei Cheatsheet
    • Wifite Cheatsheet
    • Aircrack-Ng Cheatsheet
  • News

    • Date Wise

Usage

cyberonix -h

Please find below the instructions to access the tool's help function, along with a list of all available switches:

Cyberonix is a complete resource hub for Cyber Security Community. Our aim is
to make this tool an 1 stop solution for all the Hackers out there to get
resources of various topics in Cyber Security. We will keep updating this tool
& adding new & updated resources on the go.

options:
  -h, --help            show this help message and exit
  --domain DOMAIN, -D DOMAIN
                        Specify the domain
  --output OUTPUT, -o OUTPUT
                        Specify An Input File (-f path/to/file.txt)
  --file FILE, -f FILE  Specify An Output File (-o path/to/location)
  --ip IP, -ip IP       Specify IP Address

Main Arguments:
  --tools, -t           Run Tools Function
  --cheatsheet, -c      Run Cheatsheet Function
  --news [Date], -n [Date]
                        Date In The Format yyyy-mm-dd

IP:
  --getip Domain, -gip Domain
                        Get Ip Of A Domain
  --ipinfo IP, -ipi IP  Get IP Infomation

DNS Records:
  --dnsrecord, -dns     To Get DNS Records(options: --domain) and use --record
                        to specify record name
  --record RECORD, -r RECORD
                        To Give Record For DNSrecord(Like: A,TXT,MX)

Screenshoting:
  --screenshot, -s      To Get Screenshot Of Websites(options: --file,--
                        domain)
  ASN Record:
  --asnrecord, -asn     To Get ASN Record(Options: --ip,--file,--output)

Password Generation:
  --passwordgen, -P     To Generate Password
  --default-password-gen, -pass
                        To Generate Random Password (Recommended)(You can only
                        use --length,--checkpassword)
  --upper, -u           For Uppercase
  --lower, -l           For Lowercase
  --digits, -d          For Digits
  --punctuation, -p     For Punctuation
  --length LENGTH, -L LENGTH
                        To Specify Length Of Password (Default=8)
  --checkpassword, -C   To Check Your Generated Password

HTTP Status:
  --http-status, -S     To Get Http Status Code Of A Domain(Options: --domain,
                        --file,--output)

remove duplicate:
  --remove-duplicate, -rd
                        To Remove Dublicates From a File(Options: --file,--
                        output)

ScreenShots

help

home

tools

bug-bounty menue

Socials

Github Logo Discord Logo Twitter Logo

Support

Buymeacoffee




Donate with paypal




Donate with paypal



Donate with paypal



Thanks To All Contributors

About

Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers out there to get resources of various topics in Cyber Security. We will keep updating this tool & adding new & updated resources on the go.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 98.7%
  • Roff 1.3%