SkillAgentSearch skills...

Cyberonix

Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers out there to get resources of various topics in Cyber Security. We will keep updating this tool & adding new & updated resources on the go.

Install / Use

/learn @TeamDefronix/Cyberonix

README

<div align="center"><p> <h1>CYBERONIX</h1> <img style="filter: brightness(200%)" src="https://user-images.githubusercontent.com/122822828/216810369-34904b5a-d063-48a9-a87d-11caf293243b.png" width="50%"><br> <img src="https://forthebadge.com/images/badges/made-with-python.svg"> <img src="https://forthebadge.com/images/badges/built-with-love.svg"> <br><br> <a href="https://github.com/TeamDefronix/Cyberonix/releases/latest"> <img alt="Latest release" src="https://img.shields.io/github/v/release/TeamDefronix/Cyberonix?style=for-the-badge&logo=starship&color=C9CBFF&logoColor=D9E0EE&labelColor=302D41" /> </a> <a href="https://github.com/TeamDefronix/Cyberonix/pulse"> <img alt="Last commit" src="https://img.shields.io/github/last-commit/TeamDefronix/Cyberonix?style=for-the-badge&logo=starship&color=8bd5ca&logoColor=D9E0EE&labelColor=302D41" /> </a> <a href="https://github.com/TeamDefronix/Cyberonix/blob/main/LICENSE"> <img alt="License" src="https://img.shields.io/github/license/TeamDefronix/Cyberonix?style=for-the-badge&logo=starship&color=ee999f&logoColor=D9E0EE&labelColor=302D41" /> </a> <a href="https://github.com/TeamDefronix/Cyberonix/stargazers"> <img alt="Stars" src="https://img.shields.io/github/stars/TeamDefronix/Cyberonix?style=for-the-badge&logo=starship&color=c69ff5&logoColor=D9E0EE&labelColor=302D41" /> </a> <a href="https://github.com/TeamDefronix/Cyberonix/issues"> <img alt="Issues" src="https://img.shields.io/github/issues/TeamDefronix/Cyberonix?style=for-the-badge&logo=bilibili&color=F5E0DC&logoColor=D9E0EE&labelColor=302D41" /> </a> <a href="https://github.com/TeamDefronix/Cyberonix"> <img alt="Repo Size" src="https://img.shields.io/github/repo-size/TeamDefronix/Cyberonix?color=%23DDB6F2&label=SIZE&logo=codesandbox&style=for-the-badge&logoColor=D9E0EE&labelColor=302D41" /> </a> <a href="https://twitter.com/intent/follow?screen_name=niteshlike123"> <img alt="follow on Twitter" src="https://img.shields.io/twitter/follow/niteshlike123?style=for-the-badge&logo=twitter&color=8aadf3&logoColor=D9E0EE&labelColor=302D41" /> </a> <a href="https://discord.gg/defronix"> <img alt="Discord" src="https://img.shields.io/discord/1072407436348112896?style=for-the-badge&logo=starship&color=c69ff5&logoColor=D9E0EE&labelColor=302D41"/> </a> </p> <p align="center"> <img src="https://stars.medv.io/TeamDefronix/Cyberonix.svg", title="commits"/> </p> <h1 align="left">Description</h1> <p align="left"> Cyberonix is an open-source and free tool developed by Team Defronix Cyber Security Pvt. Ltd. Initially created by a team of students during their internship at Defronix after completing their Diploma in Cyber Security Training. </p> <p align="left"> This tool serves as a comprehensive resource hub for the Cyber Security Community. Our objective is to establish it as a one-stop solution for hackers, providing resources on various topics within Cyber Security. We are committed to regularly updating the tool and incorporating new and relevant resources.</p> <p align="left"> Please feel free to suggest any features you would like to see in this tool, we welcome your input and will be delighted to include suggested features in our upcoming updates. </p>

<kbd><br> Install <br></kbd><kbd><br> Usage <br></kbd><kbd><br> Categories <br></kbd><kbd><br> ScreenShots <br></kbd><kbd><br> Contributors <br></kbd>


</div>

Installation

  1. Update your system packages:
sudo apt update -y && apt full-upgrade -y
  1. Clone the Cyberonix repository from GitHub:
git clone https://github.com/TeamDefronix/Cyberonix.git
  1. Navigate to the Cyberonix directory:
cd Cyberonix
  1. Make the setup script executable:
chmod +x setup.py
  1. Run the setup script using Python3:
sudo python3 setup.py
  1. Execute Cyberonix:
cyberonix

PIP intallation

pip install cyberonix

If you encounter the "Externally-Managed-Environment" issue on your machine, please refer to our blog for a solution. You can find detailed information and steps to resolve this problem by clicking <a href="https://technicalnavigator.in/how-to-fix-error-externally-managed-environment-in-python-kali-linux/" target="_blank">here</a>.

Usage

  • To display the help menu, use the following command: cyberonix -h

  • To exit the Cyberonix tool, press: ctrl+c

  • Press the enter key to navigate back.

Below are the instructions to access the tool's help function, along with a complete list of all available switches:

Welcome to Cyberonix - Your Cyber Security Resource Hub!

Basic Options:

  -h, --help                  : Get this help message.
  --domain DOMAIN, -D DOMAIN   : Target a specific domain.
  --output OUTPUT, -o OUTPUT   : Save results to a file (provide the file path).
  --file FILE, -f FILE         : Read input from a file (provide the file path).
  --ip IP, -ip IP             : Target a specific IP address.

Main Functions:

  --tools, -t                 : Access various cybersecurity tools.
  --cheatsheet, -c            : Get a cybersecurity reference guide.

IP Operations:

  --getip, -gip               : Get the IP address of a domain.
  
  Can use with: --domain, --file, --output

  --ipinfo, -ipi              : Get information about an IP address.

  Can use with: --ip, --file, --output

DNS Operations:

  --dnsrecord, -dns           : Get DNS records for a domain.

  Can use with: --domain, --file, --output

  --record RECORD, -r RECORD   : Specify the type of DNS record (e.g., A, TXT, MX).

  usage: --record <type>

ASN Record:

  --asnrecord, -asn           : Get ASN (network) information.

  Can use with: --ip, --file, --output

Screenshoting:

  --screenshot, -s            : Take a website screenshot.

  Can use with: --domain, --file, --output

HTTP Status:

  --http-status, -S           : Check a website's HTTP status code.

  Can use with: --domain, --file, --output

Remove Duplicate:

  --remove-duplicate, -rd     : Remove duplicate lines from a file.

  Can use with: --file, --output

Password Generation:

  --passwordgen, -P           : Generate a secure password.
  --default-password-gen, -pass: Generate a strong random password (recommended).

  Customization Options:

  --upper, -u                 : Include uppercase letters.
  --lower, -l                 : Include lowercase letters.
  --digits, -d                : Include numbers.
  --punctuation, -p           : Include symbols.
  --length LENGTH, -L LENGTH   : Set password length (default is 8).
  --checkpassword, -C         : Test the strength of a password.

Worlist Generation:

  --worlist, -w                : To generate a wordlist
  --characters,-c              : Set of characters to include in the wordlist (Default = abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 )
  --min_length, -min           : Minimum length of the words  ( Default = 4 )
  --max_length, -max           : Maximum length of the words  ( Default = 6 )
  --output_file, -ot           : Output file name   ( Default = custom_wordlist.txt )

Categories

  • Tools

<div align="center">

Information Gathering

| Tool Name | Tool Name | Tool Name | | ------- | --------------------------------------------- | ------ | | Useful Websites | Nmap | Subfinder | | Maltego | Dracnmap | Red_Hawk | | Th3Inspector | Hping3 | Arping | | Netdiscover | The Harvester | Wafw00f | | Recon-Ng | Sublist3R | Spiderfoot | | Amass | | |

Vulnerability Analysis

| Tool Name | Tool Name | Tool Name | | ------- | --------------------------------------------- | ------ | | Wpscan | Wireshark | Wapiti | | Nmap | Legion | Nikto | | Wfuzz | | |

Web Application Analysis

| Tool Name | Tool Name | Tool Name | | ------- | --------------------------------------------- | ------ | | Burp Suite | Dirsearch | Owasp Zap | | Dirbuster | Nikto | Wapiti | | Nessus | Dirb | Nuclei | | Ffuf | | |

Password Attacks

Brute Force Attacks

| Tool Name | Tool Name | Tool Name | | ------- | --------------------------------------------- | ------ | | Hashcat | John The Ripper | Hydra | | Johnny (GUI John) | Brutus | Dirbuster | | Reaver | Dirsearch | |

Dicitionary Attacks

| Tool Name | Tool Name | Tool Name | | ------- | --------------------------------------------- | ------ | | Hashcat | John The Ripper | Hydra | | Medusa | Ncrack | Johnny (GUI John) |

Rainbow Table Attacks

| Tool Name | Tool Name | | ------- | --------------------------------------------- | | Rainbowcrack | Ophcrack |

Wordlist Generator

| Tool Name | Tool Name | Tool Name | | ------- | --------------------------------------------- | ------ | | Crunch | Cupp | Bopscrk |

Phishing Attacks

| Tool Name | Tool Name | Tool Name | | ------- | --------------------------------------------- | ------ | | Social-Engineer Toolkit (SET) | Hiddeneye | R3Bu5 | | Zphisher | Shellphish | Gophish (GUI) | | Camphish | | |

Keylogger Attacks

| Tool Name | Tool Name | | ------- | --------------------------------------------- | | Zlogger | Keylogger |

Wireless Attacks

| Tool Name | Tool Name

Related Skills

View on GitHub
GitHub Stars516
CategoryDevelopment
Updated11d ago
Forks94

Languages

Python

Security Score

100/100

Audited on Mar 13, 2026

No findings