Skip to content

Cyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberPunk 2077 https://www.cyberpunk.net/

License

Notifications You must be signed in to change notification settings

MiChaelinzo/CyberPunkNetrunner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

28 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•—
โ•‘                                                                                                      โ•‘
โ•‘   โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ•—  โ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ•—   โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ•—   โ–ˆโ–ˆโ–ˆโ•—    โ–ˆโ–ˆโ•—   โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—     โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—   โ•‘
โ•‘   โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ•‘  โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ•—  โ–ˆโ–ˆโ•‘โ•šโ•โ•โ–ˆโ–ˆโ•”โ•โ•โ•โ–ˆโ–ˆโ•”โ•โ•โ•โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ•‘    โ–ˆโ–ˆโ•‘   โ–ˆโ–ˆโ•‘โ•šโ•โ•โ•โ•โ–ˆโ–ˆโ•—   โ–ˆโ–ˆโ•”โ•โ–ˆโ–ˆโ–ˆโ–ˆโ•—  โ•‘
โ•‘   โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•”โ•โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•”โ–ˆโ–ˆโ•— โ–ˆโ–ˆโ•‘   โ–ˆโ–ˆโ•‘   โ–ˆโ–ˆโ•‘   โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•”โ–ˆโ–ˆโ–ˆโ–ˆโ•”โ–ˆโ–ˆโ•‘    โ–ˆโ–ˆโ•‘   โ–ˆโ–ˆโ•‘ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•”โ•   โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•”โ–ˆโ–ˆโ•‘  โ•‘
โ•‘   โ–ˆโ–ˆโ•”โ•โ•โ•โ• โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•‘โ•šโ–ˆโ–ˆโ•—โ–ˆโ–ˆโ•‘   โ–ˆโ–ˆโ•‘   โ–ˆโ–ˆโ•‘   โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•‘โ•šโ–ˆโ–ˆโ•”โ•โ–ˆโ–ˆโ•‘    โ•šโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ•”โ• โ•šโ•โ•โ•โ–ˆโ–ˆโ•—   โ–ˆโ–ˆโ–ˆโ–ˆโ•”โ•โ–ˆโ–ˆโ•‘  โ•‘
โ•‘   โ–ˆโ–ˆโ•‘     โ–ˆโ–ˆโ•‘  โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•‘  โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•‘ โ•šโ–ˆโ–ˆโ–ˆโ–ˆโ•‘   โ–ˆโ–ˆโ•‘   โ•šโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•”โ•โ–ˆโ–ˆโ•‘ โ•šโ•โ• โ–ˆโ–ˆโ•‘     โ•šโ–ˆโ–ˆโ–ˆโ–ˆโ•”โ• โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•”โ•โ–ˆโ–ˆโ•—โ•šโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•”โ•  โ•‘
โ•‘   โ•šโ•โ•     โ•šโ•โ•  โ•šโ•โ•โ•šโ•โ•  โ•šโ•โ•โ•šโ•โ•  โ•šโ•โ•โ•โ•   โ•šโ•โ•    โ•šโ•โ•โ•โ•โ•โ• โ•šโ•โ•     โ•šโ•โ•      โ•šโ•โ•โ•โ•  โ•šโ•โ•โ•โ•โ•โ• โ•šโ•โ• โ•šโ•โ•โ•โ•โ•โ•   โ•‘
โ•‘                                                                                                      โ•‘
โ•‘   โšก NEXT-GENERATION CYBERSECURITY OPERATIONS FRAMEWORK โšก                                            โ•‘
โ•‘                                                                                                      โ•‘
โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•


๐Ÿš€ What's New in PHANTOM v3.0

Complete Framework Rewrite - The entire codebase has been redesigned from the ground up with modern Python architecture.

โœจ Key Features

  • ๐Ÿง  Neural Network Powered Analysis - Advanced pattern recognition for threat detection
  • ๐Ÿ” Zero-Day Defense Capabilities - Proactive security assessment tools
  • ๐ŸŒ Global Threat Intelligence - Integrated threat feeds and vulnerability databases
  • โ˜๏ธ Cloud Security Scanner - AWS, Azure, GCP, and container security auditing
  • ๐Ÿ”Œ Plugin Architecture - Extensible framework for custom modules
  • ๐Ÿ“Š Session Management - Track operations, targets, and findings
  • ๐ŸŽจ Modern TUI - Beautiful terminal interface with rich library support

๐Ÿ”ง Architecture Improvements

  • โœ… Modular OOP design with clean separation of concerns
  • โœ… YAML/JSON configuration system
  • โœ… Comprehensive logging with audit trails
  • โœ… Plugin system for extensibility
  • โœ… Session persistence and management
  • โœ… Cross-platform compatibility

๐Ÿ“š Module Categories

๐Ÿ” RECONNAISSANCE

Module Description
Neural Network Scanner Advanced port & service detection with ML
OSINT Harvester Open-source intelligence gathering
DNS Intelligence DNS enumeration & zone transfer
Subdomain Discovery Automated subdomain enumeration
Technology Fingerprint Web technology identification

๐ŸŒ NETWORK OPERATIONS

Module Description
Network Mapper Advanced network topology discovery
Traffic Analyzer Real-time packet inspection
ARP Spoofer Man-in-the-middle operations
Port Knocker Port knocking sequence generator
Bandwidth Monitor Network throughput analysis

๐Ÿ•ธ๏ธ WEB SECURITY

Module Description
SQLi Scanner SQL injection vulnerability scanner
XSS Hunter Cross-site scripting detection
Directory Buster Web path enumeration
API Fuzzer REST/GraphQL API testing
WAF Bypass Toolkit Web application firewall evasion

๐Ÿ’€ EXPLOITATION

Module Description
Exploit Framework Automated exploitation engine
Payload Generator Custom payload creation
Shell Manager Reverse shell handler
Privilege Escalation Local privilege escalation
Persistence Toolkit Post-exploitation persistence

๐Ÿ“ก WIRELESS

Module Description
WiFi Analyzer Wireless network analysis
Deauth Attack WiFi deauthentication
Evil Twin Rogue access point deployment
WPS Cracker WPS PIN brute force
Bluetooth Scanner BLE device discovery

๐Ÿ‘ป STEALTH

Module Description
TOR Gateway Anonymous network routing
Proxy Chain Multi-hop proxy configuration
MAC Spoofer Hardware address manipulation
Log Cleaner Forensic countermeasures
Anti-Forensics Evidence destruction toolkit

๐ŸŽญ SOCIAL ENGINEERING

Module Description
Phishing Framework Advanced phishing campaigns
Credential Harvester Login credential capture
QR Jacker QR code manipulation
SMS Spoofer SMS origin spoofing
Social Profiler Social media intelligence

๐Ÿ”ฌ FORENSICS

Module Description
Memory Analyzer RAM forensics analysis
Disk Imager Forensic disk imaging
File Carver Deleted file recovery
Metadata Extractor Document metadata analysis
Timeline Builder Event timeline reconstruction

๐Ÿ” CRYPTOGRAPHY

Module Description
Hash Cracker Password hash attacks
Cipher Analyzer Cryptographic analysis
Key Generator Secure key generation
Steganography Hidden data extraction
Blockchain Forensics Cryptocurrency tracing

โ˜๏ธ CLOUD SECURITY

Module Description
AWS Scanner Amazon Web Services audit
Azure Recon Microsoft Azure enumeration
GCP Analyzer Google Cloud Platform scan
Container Security Docker/K8s vulnerability scan
S3 Bucket Finder Cloud storage discovery

๐Ÿ› ๏ธ Installation

Prerequisites

  • Python 3.7 or higher
  • pip package manager
  • Linux-based operating system (Kali Linux, Parrot OS recommended)

Quick Install

# Clone the repository
git clone https://github.com/MiChaelinzo/CyberPunkNetrunner.git

# Change directory
cd CyberPunkNetrunner

# Install dependencies
pip3 install -r requirements.txt

# Run PHANTOM
python3 phantom_runner.py

Alternative: Install Legacy Version

# Run legacy Netrunner
python3 Netrunner.py

๐ŸŽฎ Usage

Interactive Mode

python3 phantom_runner.py

Command Line Options

python3 phantom_runner.py --help
python3 phantom_runner.py --version
python3 phantom_runner.py --no-banner
python3 phantom_runner.py --config /path/to/config.yaml
python3 phantom_runner.py --module 01  # Run specific module

๐Ÿ“ Project Structure

CyberPunkNetrunner/
โ”œโ”€โ”€ phantom/                    # Main framework package
โ”‚   โ”œโ”€โ”€ core/                   # Core engine modules
โ”‚   โ”‚   โ”œโ”€โ”€ engine.py           # Main execution engine
โ”‚   โ”‚   โ”œโ”€โ”€ config.py           # Configuration management
โ”‚   โ”‚   โ”œโ”€โ”€ logger.py           # Logging system
โ”‚   โ”‚   โ”œโ”€โ”€ session.py          # Session management
โ”‚   โ”‚   โ””โ”€โ”€ plugin_loader.py    # Plugin system
โ”‚   โ”œโ”€โ”€ modules/                # Security modules
โ”‚   โ”‚   โ”œโ”€โ”€ recon.py            # Reconnaissance
โ”‚   โ”‚   โ”œโ”€โ”€ network.py          # Network analysis
โ”‚   โ”‚   โ”œโ”€โ”€ web.py              # Web security
โ”‚   โ”‚   โ”œโ”€โ”€ exploit.py          # Exploitation
โ”‚   โ”‚   โ”œโ”€โ”€ wireless.py         # Wireless attacks
โ”‚   โ”‚   โ”œโ”€โ”€ stealth.py          # Anonymization
โ”‚   โ”‚   โ”œโ”€โ”€ social.py           # Social engineering
โ”‚   โ”‚   โ”œโ”€โ”€ forensics.py        # Digital forensics
โ”‚   โ”‚   โ”œโ”€โ”€ crypto.py           # Cryptography
โ”‚   โ”‚   โ””โ”€โ”€ cloud.py            # Cloud security
โ”‚   โ”œโ”€โ”€ utils/                  # Utility functions
โ”‚   โ”‚   โ”œโ”€โ”€ network.py          # Network utilities
โ”‚   โ”‚   โ”œโ”€โ”€ system.py           # System utilities
โ”‚   โ”‚   โ”œโ”€โ”€ crypto.py           # Crypto utilities
โ”‚   โ”‚   โ””โ”€โ”€ display.py          # Display manager
โ”‚   โ””โ”€โ”€ plugins/                # Plugin system
โ”‚       โ””โ”€โ”€ base.py             # Base plugin class
โ”œโ”€โ”€ config/                     # Configuration files
โ”‚   โ””โ”€โ”€ phantom.yaml            # Main config
โ”œโ”€โ”€ phantom_runner.py           # New entry point
โ”œโ”€โ”€ Netrunner.py               # Legacy entry point
โ”œโ”€โ”€ requirements.txt            # Dependencies
โ””โ”€โ”€ README.md                   # Documentation

๐Ÿ”Œ Plugin Development

Create custom plugins by extending the BasePlugin class:

from phantom.plugins.base import BasePlugin

class MyCustomPlugin(BasePlugin):
    PLUGIN_INFO = {
        'name': 'My Custom Plugin',
        'version': '1.0.0',
        'author': 'Your Name',
        'description': 'Custom security tool',
        'category': 'recon'
    }
    
    def initialize(self):
        self.log("Initializing plugin...")
        return True
    
    def execute(self, target, **options):
        # Your plugin logic here
        results = {"target": target, "data": []}
        return results
    
    def cleanup(self):
        self.log("Cleaning up...")

Place your plugin in ~/.phantom/plugins/ and it will be automatically loaded.


โš ๏ธ Legal Disclaimer

PHANTOM Netrunner is designed for authorized security testing and educational purposes only.

  • Only use this tool on systems you own or have explicit permission to test
  • Unauthorized access to computer systems is illegal
  • The developers are not responsible for any misuse of this tool
  • Always follow applicable laws and regulations

๐Ÿ“œ License

This project is licensed under the MIT License - see the LICENSE file for details.


๐Ÿค Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

  1. Fork the repository
  2. Create your feature branch (git checkout -b feature/AmazingFeature)
  3. Commit your changes (git commit -m 'Add some AmazingFeature')
  4. Push to the branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

๐Ÿ“ง Contact


โญ Star this repository if you find it useful! โญ

Made with โค๏ธ by the CyberPunk Netrunner Team

Releases

No releases published

Sponsor this project

Packages

No packages published