Giter VIP home page Giter VIP logo

teamdefronix / cyberonix Goto Github PK

View Code? Open in Web Editor NEW
303.0 11.0 58.0 3.45 MB

Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers out there to get resources of various topics in Cyber Security. We will keep updating this tool & adding new & updated resources on the go.

Home Page: https://defronix.com/

License: MIT License

Python 98.57% Roff 1.43%
cheatsheet cybersecurity cybersecurity-framework cybersecurity-news cybersecurity-tools framework hacking hacking-framework hacking-tool hacking-toolkit

cyberonix's Introduction

CYBERONIX




Latest release Last commit License Stars Issues Repo Size follow on Twitter Discord

Description

Cyberonix is an open-source and free tool developed by Team Defronix Cyber Security Pvt. Ltd. Initially created by a team of students during their internship at Defronix after completing their Diploma in Cyber Security Training.

This tool serves as a comprehensive resource hub for the Cyber Security Community. Our objective is to establish it as a one-stop solution for hackers, providing resources on various topics within Cyber Security. We are committed to regularly updating the tool and incorporating new and relevant resources.

Please feel free to suggest any features you would like to see in this tool, we welcome your input and will be delighted to include suggested features in our upcoming updates.



 Install 

 Usage 

 Categories 

 ScreenShots 

 Contributors 


Installation

  1. Update your system packages:
sudo apt update -y && apt full-upgrade -y
  1. Clone the Cyberonix repository from GitHub:
git clone https://github.com/TeamDefronix/Cyberonix.git
  1. Navigate to the Cyberonix directory:
cd Cyberonix
  1. Make the setup script executable:
chmod +x setup.py
  1. Run the setup script using Python3:
sudo python3 setup.py
  1. Execute Cyberonix:
cyberonix

PIP intallation

pip install cyberonix

If you encounter the "Externally-Managed-Environment" issue on your machine, please refer to our blog for a solution. You can find detailed information and steps to resolve this problem by clicking here.

Usage

  • To display the help menu, use the following command: cyberonix -h

  • To exit the Cyberonix tool, press: ctrl+c

  • Press the enter key to navigate back.

Below are the instructions to access the tool's help function, along with a complete list of all available switches:

Welcome to Cyberonix - Your Cyber Security Resource Hub!

Basic Options:

  -h, --help                  : Get this help message.
  --domain DOMAIN, -D DOMAIN   : Target a specific domain.
  --output OUTPUT, -o OUTPUT   : Save results to a file (provide the file path).
  --file FILE, -f FILE         : Read input from a file (provide the file path).
  --ip IP, -ip IP             : Target a specific IP address.

Main Functions:

  --tools, -t                 : Access various cybersecurity tools.
  --cheatsheet, -c            : Get a cybersecurity reference guide.

IP Operations:

  --getip, -gip               : Get the IP address of a domain.
  
  Can use with: --domain, --file, --output

  --ipinfo, -ipi              : Get information about an IP address.

  Can use with: --ip, --file, --output

DNS Operations:

  --dnsrecord, -dns           : Get DNS records for a domain.

  Can use with: --domain, --file, --output

  --record RECORD, -r RECORD   : Specify the type of DNS record (e.g., A, TXT, MX).

  usage: --record <type>

ASN Record:

  --asnrecord, -asn           : Get ASN (network) information.

  Can use with: --ip, --file, --output

Screenshoting:

  --screenshot, -s            : Take a website screenshot.

  Can use with: --domain, --file, --output

HTTP Status:

  --http-status, -S           : Check a website's HTTP status code.

  Can use with: --domain, --file, --output

Remove Duplicate:

  --remove-duplicate, -rd     : Remove duplicate lines from a file.

  Can use with: --file, --output

Password Generation:

  --passwordgen, -P           : Generate a secure password.
  --default-password-gen, -pass: Generate a strong random password (recommended).

  Customization Options:

  --upper, -u                 : Include uppercase letters.
  --lower, -l                 : Include lowercase letters.
  --digits, -d                : Include numbers.
  --punctuation, -p           : Include symbols.
  --length LENGTH, -L LENGTH   : Set password length (default is 8).
  --checkpassword, -C         : Test the strength of a password.

Worlist Generation:

  --worlist, -w                : To generate a wordlist
  --characters,-c              : Set of characters to include in the wordlist (Default = abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 )
  --min_length, -min           : Minimum length of the words  ( Default = 4 )
  --max_length, -max           : Maximum length of the words  ( Default = 6 )
  --output_file, -ot           : Output file name   ( Default = custom_wordlist.txt )

Categories

  • Tools

Information Gathering

Tool Name Tool Name Tool Name
Useful Websites Nmap Subfinder
Maltego Dracnmap Red_Hawk
Th3Inspector Hping3 Arping
Netdiscover The Harvester Wafw00f
Recon-Ng Sublist3R Spiderfoot
Amass

Vulnerability Analysis

Tool Name Tool Name Tool Name
Wpscan Wireshark Wapiti
Nmap Legion Nikto
Wfuzz

Web Application Analysis

Tool Name Tool Name Tool Name
Burp Suite Dirsearch Owasp Zap
Dirbuster Nikto Wapiti
Nessus Dirb Nuclei
Ffuf

Password Attacks

Brute Force Attacks

Tool Name Tool Name Tool Name
Hashcat John The Ripper Hydra
Johnny (GUI John) Brutus Dirbuster
Reaver Dirsearch

Dicitionary Attacks

Tool Name Tool Name Tool Name
Hashcat John The Ripper Hydra
Medusa Ncrack Johnny (GUI John)

Rainbow Table Attacks

Tool Name Tool Name
Rainbowcrack Ophcrack

Wordlist Generator

Tool Name Tool Name Tool Name
Crunch Cupp Bopscrk

Phishing Attacks

Tool Name Tool Name Tool Name
Social-Engineer Toolkit (SET) Hiddeneye R3Bu5
Zphisher Shellphish Gophish (GUI)
Camphish

Keylogger Attacks

Tool Name Tool Name
Zlogger Keylogger

Wireless Attacks

Tool Name Tool Name Tool Name
Kismet Wifite Fern Wifi Cracker
Aircrack-Ng Fluxion Wifiphisher

Exploitation Tools

Tool Name Tool Name Tool Name
Metasploit Crackmapexec Searchsploit
Beef Routersploit Sqlmap
Seclists Airmitage

Sniffing And Spoofing

Tool Name Tool Name Tool Name
Wireshark Bettercap Tcpdump
Arpspoof Dsniff Scapy
Netsniff-Ng Macchanger Responder
Airgeddon Sharesniffer Wifi-Pumpkin-3
Mitmproxy Zaproxy

Post Exploitation

Tool Name Tool Name Tool Name
Metasploit-Framework Linpeas Linenum
Sudo Killer Beroot Linux Exploit Suggester 2
LSE (Linux Smart Enumeration) Pspy Bashark
Linux Private-I Shellter Amber
Upx (Ultimate Packer for Executable) Covermyass

Anonymity

Tool Name Tool Name Tool Name
Tor Anonsurf Nipe
Proxychain

Framework

Tool Name Tool Name
OSINT Framework MITRE Framework

Pentesting And Bug-Bounty

Information Gathering

Tool Name Tool Name Tool Name
Useful Websites Nmap Subfinder
Maltego Dracnmap Red_Hawk
Th3Inspector Hping3 Arping
Netdiscover The Harvester Wafw00f
Recon-Ng Sublist3R Spiderfoot
Amass

Configuration Management

Tool Name Tool Name Tool Name
Dirb gobuster Nikto
Wfuzz Skipfish Dirbuster
Feroxbuster Nmap Httpie
Metasploit Securityheaders Sqlmap
Trufflehog Gitleaks Secretfinder

Secure Transmission

Writeups Writeups
Check SSL Version, Algorithms, Key Length Check for Digital Certificate Validity
Check Credentials Only Delivered Over HTTPS Check Session Tokens Only Delivered Over HTTPS
Check if HTTP Strict Transport Security (HSTS)

Authentication

Writeups Writeups Writeups
User Enumeration Authentication Bypass Vulnerable Remember Me Functionality
Password Reset Captcha Bypass Autocomplete On
Multifactor Authentication Logout Functionality Cache Management
Default Credentials

Session Management

Tool Name Tool Name Tool Name
OWASP Zap BurpSuite Nikto
Nmap Wapiti Nessus
Nuclei Fiddler Penetration Testers Framework (PTF)

Authorization

Tool Name Tool Name Tool Name
BurpSuite Wireshark OWASP Zap
Nessus Hydra Beef
Sqlmap Metasploit Nmap
Penetration Testers Framework (PTF)

Data Validation

Tool Name Tool Name Tool Name
XSS XXE - XML HTML Injection
SQL Injection Command Injection HTTP Smuggling
HTTP Parameter Pollution Open Redirection LFI

Denial Of Service

Tool Name Tool Name
Goldeneye Slowhttptest
Thc-SSL-Dos Slowloris

Business Logic

Writeups Writeups
Business Logic Exploiting Business Logic Vulnerabilities
Web Application — Business Logic Vulnerabilities Business Logic Flaw

Cryptography

Tool Name Tool Name Tool Name
SSLstrip Bettercap Ettercap
SSLyze 0-Saft SSLscan
SSLLabs

Risky Functionality - File Uploads

Tool Name Tool Name
Fuxploider Upload Scanner

Risky Functionality - Card Payment

Tool Name Tool Name Tool Name
BurpSuite Wireshark OWASP Zap
Nessus SQLmap Fiddler
Metasploit Nmap Penetration Testers Framework (PTF)

Html 5

Writeups Writeups Writeups
Web Messaging Web Storage SQL Injection CORS Implementation

Screenshots

Main Menu

Bug Bounty

Tools

Information Gathering

Nmap

Socials

Github Logo Facebook Logo Twitter Logo Instagram Logo WhatsApp Logo Youtube Logo LinkedIN Logo

Support

Buymeacoffee




Donate with paypal




Donate with paypal




Donate with paypal



Thanks To All Contributors

cyberonix's People

Contributors

0xmrr0b0t avatar ajmewal avatar amitdubey12 avatar b14ckky avatar defronixpro avatar ethicalrishab avatar mohita9138 avatar naman-devnani avatar sb00021 avatar thech13f avatar yashparwal1 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

cyberonix's Issues

Bug report

Describe the bug
A clear and concise description of what the bug is.

To Reproduce
Steps to reproduce the behavior:

  1. Go to '...'
  2. Click on '....'
  3. Scroll down to '....'
  4. See error

Expected behavior
A clear and concise description of what you expected to happen.

Screenshots
If applicable, add screenshots to help explain your problem.

Desktop (please complete the following information):

  • OS: [e.g. iOS]
  • Browser [e.g. chrome, safari]
  • Version [e.g. 22]

Smartphone (please complete the following information):

  • Device: [e.g. iPhone6]
  • OS: [e.g. iOS8.1]
  • Browser [e.g. stock browser, safari]
  • Version [e.g. 22]

Additional context
Add any other context about the problem here.

AttributeError: module 'collections' has no attribute 'MutableMapping'

┌──(kali㉿kali)-[~/Desktop/Cyberonix]
└─$ sudo cyberonix
[sudo] password for kali:
Traceback (most recent call last):
File "/home/kali/Desktop/Cyberonix/./setup.py", line 5, in
import cyberonix
File "/home/kali/Desktop/Cyberonix/cyberonix.py", line 4, in
from main import *
File "/home/kali/Desktop/Cyberonix/main/arguments.py", line 1, in
import dns.resolver, requests, socket, os, time
File "/usr/local/lib/python3.11/dist-packages/requests/init.py", line 58, in
from . import utils
File "/usr/local/lib/python3.11/dist-packages/requests/utils.py", line 30, in
from .cookies import RequestsCookieJar, cookiejar_from_dict
File "/usr/local/lib/python3.11/dist-packages/requests/cookies.py", line 164, in
class RequestsCookieJar(cookielib.CookieJar, collections.MutableMapping):
^^^^^^^^^^^^^^^^^^^^^^^^^^
AttributeError: module 'collections' has no attribute 'MutableMapping'

Feature request: Using IPinfo.io for IP information (IP Geolocation + ASN)

Is your feature request related to a problem? Please describe.

Hi, I noticed that the current IP geolocation API provider does not offer https/SSL encryption for its free tier access. Most of the services here use https, which is why I would like to recommend ipinfo.io. IPinfo supports SSL encryption and, on tokenless access, can handle 1,000 requests per day. With a free access tier token, the limit is 50,000 requests per month.

Describe the solution you'd like
A clear and concise description of what you want to happen.

The current implementation of the code is the following:

url = f"http://ip-api.com/json/{url}"

        temp=url
--        url = f"http://ip-api.com/json/{url}"
++        url = f"https://ipinfo.io/{url}/json"
        response = requests.get(url)

Additional context
Add any other context or screenshots about the feature request here.

Another aspect to note is the synchronous nature of the code described here:

try:
f = open(path, "r")
urls = f.read()
urls = urls.split("\n")
for url in urls:

Bulk IP enrichment and async operations can be supported if used via the IPinfo module.


Disclaimer: I work for IPinfo.

Bug

Describe the bug
A clear and concise description of what the bug is.

To Reproduce
Steps to reproduce the behavior:

  1. Go to '...'
  2. Click on '....'
  3. Scroll down to '....'
  4. See error

Expected behavior
A clear and concise description of what you expected to happen.

Screenshots
If applicable, add screenshots to help explain your problem.

Desktop (please complete the following information):

  • OS: [e.g. iOS]
  • Browser [e.g. chrome, safari]
  • Version [e.g. 22]

Smartphone (please complete the following information):

  • Device: [e.g. iPhone6]
  • OS: [e.g. iOS8.1]
  • Browser [e.g. stock browser, safari]
  • Version [e.g. 22]

Additional context
Add any other context about the problem here.

ModuleNotFoundError: No module named 'selenium'

Traceback (most recent call last):
File "/home/cdworld/Cyberonix/cyberonix.py", line 4, in
from main import *
File "/home/cdworld/Cyberonix/main/arguments.py", line 3, in
from selenium import webdriver
ModuleNotFoundError: No module named 'selenium'
Traceback (most recent call last):
File "/home/cdworld/Cyberonix/cyberonix.py", line 4, in
from main import *
File "/home/cdworld/Cyberonix/main/arguments.py", line 3, in
from selenium import webdriver
ModuleNotFoundError: No module named 'selenium'

I have allerady downloaded selenium

python3 not support

└─$ sudo python3 setup.py
[sudo] password for techteams:
Traceback (most recent call last):
File "/home/techteams/Cyberonix/setup.py", line 5, in
import cyberonix
File "/home/techteams/Cyberonix/cyberonix.py", line 4, in
from main import *
File "/home/techteams/Cyberonix/main/arguments.py", line 3, in
from selenium import webdriver
ModuleNotFoundError: No module named 'selenium'

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.