Cyberonix: A quite useful tool for cybersecurity professionals and people of the cybersecurity field
A new tool for cybersecurity professionals and people who love this field came up quite recently. This tool is a complete resource hub for the whole Cybersecurity Community. The aim of the creators is to make this tool an one(1) stop solution for all the Hackers out there to get resources of various topics in cybersecurity. The name of the tool is: Cyberonix
How to install it on Kali Linux or other Linux distribution of your choice
Step 1: Open the root terminal
Step 2: First update your system to make sure it can handle the tool dependencies with the command:
sudo apt update -y && apt full-upgrade -y
Step 3: Clone the repository of the application from github:
git clone https://github.com/TeamMetaxone/Cyberonix.git
Step 4: Go into the directory of the app:
cd Cyberonix
Step 5: Then set the permissions of the setup.py file:
chmod +x setup.py
Step 6: Run the setup.py file(in order to set the mandatory dependencies and processes for the tool to work):
sudo python3 setup.py
Step 7: Finally, access the tool interface by typing:
cyberonix
How to use the tool
Step 1: In order to start using the tool you will have to type the help command in the terminal to figure out the basic commands you can use to run the tool.
cyberonix -h
ctrl+c for exit
enter for back
Step 2: Craft your final command by using this helpful guide before you access the whole ability set that this tool can offer you.
Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this
tool an 1 stop solution for all the Hackers out there to get resources of various topics in
Cyber Security. We will keep updating this tool & adding new & updated resources on the go.
options:
-h, --help how this help message and exit
--domain DOMAIN, -D DOMAIN Specify the domain
--output OUTPUT, -o OUTPUT Specify An Output File (-o path/to/location)
--file FILE, -f FILE Specify An Input File (-f path/to/file.txt)
--ip IP, -ip IP Specify IP Address
Main Arguments:
--tools, -t Run Tools Function
--cheatsheet, -c Run Cheatsheet Function
--news [Date], -n [Date] Date In The Format yyyy-mm-dd
IP:
--getip, -gip Get Ip Of A Domain(options: --file,--domain,--output)
--ipinfo, -ipi Get IP Infomation(Options: --ip,--file,--output)
DNS Records:
--dnsrecord, -dns To Get DNS Records(options: --domain,--file,--output) and use --record to specify record name
--record RECORD, -r RECORD To Give Record For DNSrecord(Like: A,TXT,MX)
Screenshoting:
--screenshot, -s To Get Screenshot Of Websites(options: --file,--domain,--output)
ASN Record:
--asnrecord, -asn To Get ASN Record(Options: --ip,--file,--output)
Password Generation:
--passwordgen, -P To Generate Password
--default-password-gen, -pass
To Generate Random Password (Recommended)(You can only use --length,--checkpassword)
--upper, -u For Uppercase
--lower, -l For Lowercase
--digits, -d For Digits
--punctuation, -p For Punctuation
--length LENGTH, -L LENGTH To Specify Length Of Password (Default=8)
--checkpassword, -C To Check Your Generated Password
HTTP Status:
--http-status, -S To Get Http Status Code Of A Domain(Options: --domain,--file,--output)
remove duplicate:
--remove-duplicate, -rd To Remove Dublicates From a File(Options: --file,--output)
Conclusion
As you might have figured out this tool is extremely useful for cybersecurity professionals and tech enthusiasts who want to learn about new tools and expand their knowledge exponentially.
Stay tuned for more educational posts like this one and also follow my blog to stay informed about the most recent technology tools and processes.