A Comprehensive Python-Based Cybersecurity Toolkit
CyberSuite is a powerful, user-friendly cybersecurity toolkit that brings essential security testing tools into a single, cohesive Python application. Designed for security professionals, penetration testers, and cybersecurity enthusiasts, CyberSuite simplifies complex security operations with an intuitive command-line interface.
- π¨ Beautiful CLI Interface - Colorized output with ASCII art banners
- π‘οΈ 9 Security Tools - Comprehensive toolkit for penetration testing and security analysis
- β Input Validation - Comprehensive validation to prevent errors
- π Security Warnings - Built-in deprecation warnings for outdated algorithms
- π Cross-Platform - Works on Windows, Linux, and macOS
- π¦ Easy Installation - Install with
pip install cybersuite - π― Educational Focus - Perfect for learning cybersecurity concepts
- π Advanced Hashing - Supports MD5, SHA-1, SHA-256, SHA-512, and BLAKE2b
Generate strong, unique passwords based on personal details and analyze password strength using entropy-based calculations.
Features:
- Generate 100+ password variations
- Entropy-based strength analysis
- Leetspeak transformations
- Common substitutions (iβ1, eβ3, aβ@, etc.)
- Color-coded strength indicators
Hide and extract secret messages within images using LSB (Least Significant Bit) steganography.
Features:
- Hide text messages in images
- Hide entire file contents in images
- Extract hidden messages from images
- Supports PNG, JPG, BMP, and more
Perform comprehensive network reconnaissance using Nmap integration.
Features:
- 9 different scan types (SYN, TCP, UDP, etc.)
- Version detection
- Service identification
- Port state analysis
- Tabular result display
Generate cryptographic hashes for messages and files with security warnings for deprecated algorithms.
Features:
- MD5, SHA-1, SHA-256 support
- File and message hashing
- Security warnings for broken algorithms
- Hash file export
# Install CyberSuite
pip install cybersuite
# Install with WiFi scanning support (optional)
pip install cybersuite[wifi]# Clone the repository
git clone https://github.com/Codeguruu03/CyberSuite.git
cd CyberSuite
# Install the package
pip install -e .
# Or use the setup script (Linux/macOS)
chmod +x setup.sh
./setup.sh- Python 3.7+ - Required
- Nmap - Required for ScanGenie (network scanner)
- WiFi Adapter - Optional, for WiFiGenie
Linux (Ubuntu/Debian):
sudo apt-get update
sudo apt-get install nmapmacOS (Homebrew):
brew install nmapWindows: Download and install from nmap.org
# Run CyberSuite main menu
cybersuite
# Or run individual tools directly
guardgenie # Password Generator
steggenie # Steganography
scangenie # Network Scanner
hashgenie # Hash Generator
sqlgenie # SQL Injection Tester
wifigenie # WiFi Scanner
webgenie # Web Directory Scanner
crackgenie # Password Cracker
netgenie # Network Utilitypython main.pyYou'll be greeted with the main menu:
_____ _ _____ _ _
/ ____| | | / ____| (_)| |
| | _ | |__ ___ | (___ _ _ _ | |_ ___
| | | | | |_ \ / _ \ \___ \ | | | | || __|/ _ \
| |____ | |_| | | || __/ ____) || |_| | || |_| __/
\_____| \__, |_| | \___| |_____/ \__,_|_| \__|\___|
__/ |
|___/
Welcome to Cyber-Suite! π
Please select an option:
1. GuardGenie - Password Generator & Analyzer
2. StegGenie - Steganography Tool
3. ScanGenie - Network Scanner (Nmap)
4. HashGenie - Hash Generator
5. SQLGenie - SQL Injection Tester
6. WiFiGenie - WiFi Network Scanner
7. WebGenie - Web Directory Scanner
8. CrackGenie - Password Hash Cracker
9. NetGenie - Network Utility (Netcat)
10. Quit
# Start GuardGenie
Select option 1 from main menu
# Example usage:
First name: John
Last name: Smith
Birthdate (YYYY-MM-DD): 1990-05-15
[skip other questions by pressing Enter]
# Output: Table with generated passwords and strength ratingsSample Output:
Password | Strength
----------------------------|-------------
JohnSmith | Moderate
JohnSmith123 | Strong
Sm1th@1990 | Very Strong
John$mith | Strong
# Select option 2 from main menu
Choose an option:
1. Hide text in an image
2. Extract text from an image
# Choose option 1, then:
1. Message
2. File
Enter the message you want to hide: Secret meeting at midnight
Enter the path to the image: photo.png
# Output: photo_hidden.png created# Choose option 2
Enter the path to the image: photo_hidden.png
# Output: Extracted text from the image: Secret meeting at midnight# Select option 3 from main menu
Enter the target IP address or hostname: 192.168.1.1
Choose a scan type:
1. SYN scan
2. TCP connect scan
3. UDP scan
[... more options ...]
Enter the option number: 2
# Output: Tabular display of open ports, services, and versionsSample Output:
Host | State | Protocol | Port | Service | Version
--------------|-------|----------|------|---------|----------
192.168.1.1 | up | tcp | 22 | ssh | OpenSSH 7.9
192.168.1.1 | up | tcp | 80 | http | nginx 1.18
# Select option 4 from main menu
Choose an option:
1. Hash a message
2. Hash a file
# Select 1
Enter the message to hash: MySecretPassword
Choose a hash algorithm:
1. MD5 (β οΈ Cryptographically broken - for legacy use only)
2. SHA-1 (β οΈ Cryptographically broken - for legacy use only)
3. SHA-256 (β Recommended)
# Select 3
Hash value: 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8# Select option 2
Enter the path to the file: document.pdf
# Same hash algorithm selection
# Output: Hash saved to document_hash.pdfIMPORTANT: This tool is intended for educational purposes and authorized security testing only.
Legal Requirements:
- β Only use on systems you own or have explicit permission to test
- β Obtain written authorization before any security testing
- β Unauthorized access to computer systems is illegal
Security Warnings:
- MD5 and SHA-1 are cryptographically broken - use SHA-256 or higher for security
- Some scan types require root/administrator privileges
- Network scans may trigger IDS/IPS alerts
The developers assume NO liability for misuse of this software.
Contributions are welcome! Here's how you can help:
- Fork the repository
- Create a feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
- Follow PEP 8 style guidelines
- Add comprehensive error handling
- Include docstrings for all functions
- Test on multiple platforms when possible
- Update README for new features
pywifi
stegano
requests
argparse
tabulate
colorama
pyfiglet
python-nmap
- WiFi scanning may require elevated privileges on some systems
- Nmap must be installed separately (not included in pip dependencies)
- Some steganography operations may fail with very large files
- Add GUI interface
- Implement result export (JSON/CSV)
- Add more hash algorithms (SHA-512, BLAKE2)
- Web directory brute-forcing tool
- SQL injection testing tool
- Password hash cracking tool
- Report generation (PDF/HTML)
This project is licensed under the MIT License - see the LICENSE file for details.
MIT License
Copyright (c) 2024 Naman Goyal
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction...
Naman Goyal
- GitHub: @Codeguruu03
- Project Link: https://github.com/Codeguruu03/CyberSuite
- Nmap - Network scanning capabilities
- Stegano - LSB steganography implementation
- Colorama - Cross-platform colored terminal text
- PyFiglet - ASCII art text generation
- All contributors and users of CyberSuite
If you encounter any issues or have questions:
- Check the Issues page
- Create a new issue with detailed information
- Include your OS, Python version, and error messages
Built with β€οΈ for the cybersecurity community
β Star this repository if you find it helpful!