Cyberonix: A Valuable Tool for Cybersecurity Professionals Prakash, 29, August 202329, August 2023 Recently a new tool was released for cyber security experts and enthusiasts. The application serves as a comprehensive resource portal for the entire cyber security community. The creators aim to make this service a one-stop shop for all hackers looking for resources on various cyber security concerns. The name of the tool is Cyberonix.Cyberonix is an open source and free tool developed by Team Defronix Solution. Initially, the tool is created by a group of students as part of their Internship at Defronix Solution completing their Diploma in Cyber Security Training.It is a comprehensive resource center for the Cyber Security Community. The idea is to make this tool a one-stop shop for all hackers looking for resources on various topics related to cyber security.TABLE OF CONTENTS1 Cyberonix Installation1.1 How to use the tool1.2 Conclusion1.2.1 About The Author1.2.1.1 Prakash1.2.2 RelatedCyberonix InstallationStep 1: Log in to the root terminal.Step 2: First, use the command to update your system to ensure it can handle the tool dependencies:sudo apt update -y && apt full-upgrade -yStep 3: Clone the application’s repository from github:git clone https://github.com/TeamDefronix/Cyberonix.gitStep 4: Go into the directory of the app:cd CyberonixStep 5: Then set the permissions of the setup.py file:chmod +x setup.pyStep 6: Run the setup.py file(in order to set the mandatory dependencies and processes for the tool to work):sudo python3 setup.pyStep 7: Finally, access the tool interface by typing:cyberonixHow to use the tool1: To begin using the programme, enter the help command into the terminal to learn about the fundamental instructions you can use to run it.cyberonix -hctrl+c for exitenter for back2: Create your final command use this helpful guidance before accessing the entire ability set that this tool has to offer.Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers out there to get resources of various topics in Cyber Security. We will keep updating this tool & adding new & updated resources on the go. options: -h, --help how this help message and exit --domain DOMAIN, -D DOMAIN Specify the domain --output OUTPUT, -o OUTPUT Specify An Output File (-o path/to/location) --file FILE, -f FILE Specify An Input File (-f path/to/file.txt) --ip IP, -ip IP Specify IP Address Main Arguments: --tools, -t Run Tools Function --cheatsheet, -c Run Cheatsheet Function --news [Date], -n [Date] Date In The Format yyyy-mm-dd IP: --getip, -gip Get Ip Of A Domain(options: --file,--domain,--output) --ipinfo, -ipi Get IP Infomation(Options: --ip,--file,--output) DNS Records: --dnsrecord, -dns To Get DNS Records(options: --domain,--file,--output) and use --record to specify record name --record RECORD, -r RECORD To Give Record For DNSrecord(Like: A,TXT,MX) Screenshoting: --screenshot, -s To Get Screenshot Of Websites(options: --file,--domain,--output) ASN Record: --asnrecord, -asn To Get ASN Record(Options: --ip,--file,--output) Password Generation: --passwordgen, -P To Generate Password --default-password-gen, -pass To Generate Random Password (Recommended)(You can only use --length,--checkpassword) --upper, -u For Uppercase --lower, -l For Lowercase --digits, -d For Digits --punctuation, -p For Punctuation --length LENGTH, -L LENGTH To Specify Length Of Password (Default=8) --checkpassword, -C To Check Your Generated Password HTTP Status: --http-status, -S To Get Http Status Code Of A Domain(Options: --domain,--file,--output) remove duplicate: --remove-duplicate, -rd To Remove Dublicates From a File(Options: --file,--outputConclusionThis tool is highly beneficial for cybersecurity professionals and tech enthusiasts alike. It serves as a valuable resource for learning about new tools and expanding knowledge in these fields. By utilizing this tool, individuals can greatly enhance their understanding and stay up-to-date with the latest developments in cybersecurity and technology.Don’t miss out on future educational posts like this one! Make sure to follow my blog to stay updated on the latest technology tools and processes. Stay informed and never fall behind the times.Also Read:BeEF: An Essential Kali Linux Tool for Penetration TestingAPKHunt: Introduction to Android Penetration Testing12 Best WiFi Hacking Tools for Secure Network ExplorationReportly: is an AzureAD user activity report tool.About The Author Prakash See author's posts Related Cyber Security Linux Cyber SecurityCyberonixpenetration testing toolstools
Cyber Security How Hackers Ban WhatsApp Number A Step By Step Guide 11, July 202311, July 2023WhatsApp has become one of the most popular messaging platforms worldwide, connecting people from different corners of the globe. However, there may be situations where you need to ban a WhatsApp number. Whether it’s due to harassment, spam, or any other reason. This article will guide you through the process… Read More
Hacking The Best Linux Distro for Hacking & Penetration Testing 30, April 20233, July 2023If you’re serious about penetration testing, you need the right Linux distro. Our list of the top 5 best linux distro for 2023 will help you make the right choice. There are several operating systems for hacking and penetration testing, with Linux distros specifically designed for Security Researchers or Ethical… Read More
Linux Linux From Scratch (LFS) – Make Your Own Operating system 24, June 202227, June 2022Linux From Scratch (LFS) is a type of a Linux installation and the name of a book written by Gerard Beekmans. The book gives readers instructions on how to build a Linux system from source. Benefits of having a system that is truly your own. Gerard BeekmansLinuxfromscratchAudienceThere are many reasons… Read More