โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ โ
โ โโโโโโโ โโโ โโโ โโโโโโ โโโโ โโโโโโโโโโโโ โโโโโโโ โโโโ โโโโ โโโ โโโโโโโโโโ โโโโโโโ โ
โ โโโโโโโโโโโ โโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโโโโโโโโโโโ โโโโโ โโโ โโโโโโโโโโโ โโโโโโโโโ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โโโ โโโ โโโ โโโโโโโโโโโโโโ โโโ โโโ โโโโโโโ โโโโโโโโโ โ
โ โโโโโโโ โโโโโโโโโโโโโโโโโโโโโโโโโโ โโโ โโโ โโโโโโโโโโโโโโ โโโโ โโโโ โโโโโโโ โโโโโโโโโ โ
โ โโโ โโโ โโโโโโ โโโโโโ โโโโโโ โโโ โโโโโโโโโโโโ โโโ โโโ โโโโโโโ โโโโโโโโโโโโโโโโโโโโ โ
โ โโโ โโโ โโโโโโ โโโโโโ โโโโโ โโโ โโโโโโโ โโโ โโโ โโโโโ โโโโโโโ โโโ โโโโโโโ โ
โ โ
โ โก NEXT-GENERATION CYBERSECURITY OPERATIONS FRAMEWORK โก โ
โ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Complete Framework Rewrite - The entire codebase has been redesigned from the ground up with modern Python architecture.
- ๐ง Neural Network Powered Analysis - Advanced pattern recognition for threat detection
- ๐ Zero-Day Defense Capabilities - Proactive security assessment tools
- ๐ Global Threat Intelligence - Integrated threat feeds and vulnerability databases
- โ๏ธ Cloud Security Scanner - AWS, Azure, GCP, and container security auditing
- ๐ Plugin Architecture - Extensible framework for custom modules
- ๐ Session Management - Track operations, targets, and findings
- ๐จ Modern TUI - Beautiful terminal interface with rich library support
- โ Modular OOP design with clean separation of concerns
- โ YAML/JSON configuration system
- โ Comprehensive logging with audit trails
- โ Plugin system for extensibility
- โ Session persistence and management
- โ Cross-platform compatibility
| Module | Description |
|---|---|
| Neural Network Scanner | Advanced port & service detection with ML |
| OSINT Harvester | Open-source intelligence gathering |
| DNS Intelligence | DNS enumeration & zone transfer |
| Subdomain Discovery | Automated subdomain enumeration |
| Technology Fingerprint | Web technology identification |
| Module | Description |
|---|---|
| Network Mapper | Advanced network topology discovery |
| Traffic Analyzer | Real-time packet inspection |
| ARP Spoofer | Man-in-the-middle operations |
| Port Knocker | Port knocking sequence generator |
| Bandwidth Monitor | Network throughput analysis |
| Module | Description |
|---|---|
| SQLi Scanner | SQL injection vulnerability scanner |
| XSS Hunter | Cross-site scripting detection |
| Directory Buster | Web path enumeration |
| API Fuzzer | REST/GraphQL API testing |
| WAF Bypass Toolkit | Web application firewall evasion |
| Module | Description |
|---|---|
| Exploit Framework | Automated exploitation engine |
| Payload Generator | Custom payload creation |
| Shell Manager | Reverse shell handler |
| Privilege Escalation | Local privilege escalation |
| Persistence Toolkit | Post-exploitation persistence |
| Module | Description |
|---|---|
| WiFi Analyzer | Wireless network analysis |
| Deauth Attack | WiFi deauthentication |
| Evil Twin | Rogue access point deployment |
| WPS Cracker | WPS PIN brute force |
| Bluetooth Scanner | BLE device discovery |
| Module | Description |
|---|---|
| TOR Gateway | Anonymous network routing |
| Proxy Chain | Multi-hop proxy configuration |
| MAC Spoofer | Hardware address manipulation |
| Log Cleaner | Forensic countermeasures |
| Anti-Forensics | Evidence destruction toolkit |
| Module | Description |
|---|---|
| Phishing Framework | Advanced phishing campaigns |
| Credential Harvester | Login credential capture |
| QR Jacker | QR code manipulation |
| SMS Spoofer | SMS origin spoofing |
| Social Profiler | Social media intelligence |
| Module | Description |
|---|---|
| Memory Analyzer | RAM forensics analysis |
| Disk Imager | Forensic disk imaging |
| File Carver | Deleted file recovery |
| Metadata Extractor | Document metadata analysis |
| Timeline Builder | Event timeline reconstruction |
| Module | Description |
|---|---|
| Hash Cracker | Password hash attacks |
| Cipher Analyzer | Cryptographic analysis |
| Key Generator | Secure key generation |
| Steganography | Hidden data extraction |
| Blockchain Forensics | Cryptocurrency tracing |
| Module | Description |
|---|---|
| AWS Scanner | Amazon Web Services audit |
| Azure Recon | Microsoft Azure enumeration |
| GCP Analyzer | Google Cloud Platform scan |
| Container Security | Docker/K8s vulnerability scan |
| S3 Bucket Finder | Cloud storage discovery |
- Python 3.7 or higher
- pip package manager
- Linux-based operating system (Kali Linux, Parrot OS recommended)
# Clone the repository
git clone https://github.com/MiChaelinzo/CyberPunkNetrunner.git
# Change directory
cd CyberPunkNetrunner
# Install dependencies
pip3 install -r requirements.txt
# Run PHANTOM
python3 phantom_runner.py# Run legacy Netrunner
python3 Netrunner.pypython3 phantom_runner.pypython3 phantom_runner.py --help
python3 phantom_runner.py --version
python3 phantom_runner.py --no-banner
python3 phantom_runner.py --config /path/to/config.yaml
python3 phantom_runner.py --module 01 # Run specific moduleCyberPunkNetrunner/
โโโ phantom/ # Main framework package
โ โโโ core/ # Core engine modules
โ โ โโโ engine.py # Main execution engine
โ โ โโโ config.py # Configuration management
โ โ โโโ logger.py # Logging system
โ โ โโโ session.py # Session management
โ โ โโโ plugin_loader.py # Plugin system
โ โโโ modules/ # Security modules
โ โ โโโ recon.py # Reconnaissance
โ โ โโโ network.py # Network analysis
โ โ โโโ web.py # Web security
โ โ โโโ exploit.py # Exploitation
โ โ โโโ wireless.py # Wireless attacks
โ โ โโโ stealth.py # Anonymization
โ โ โโโ social.py # Social engineering
โ โ โโโ forensics.py # Digital forensics
โ โ โโโ crypto.py # Cryptography
โ โ โโโ cloud.py # Cloud security
โ โโโ utils/ # Utility functions
โ โ โโโ network.py # Network utilities
โ โ โโโ system.py # System utilities
โ โ โโโ crypto.py # Crypto utilities
โ โ โโโ display.py # Display manager
โ โโโ plugins/ # Plugin system
โ โโโ base.py # Base plugin class
โโโ config/ # Configuration files
โ โโโ phantom.yaml # Main config
โโโ phantom_runner.py # New entry point
โโโ Netrunner.py # Legacy entry point
โโโ requirements.txt # Dependencies
โโโ README.md # Documentation
Create custom plugins by extending the BasePlugin class:
from phantom.plugins.base import BasePlugin
class MyCustomPlugin(BasePlugin):
PLUGIN_INFO = {
'name': 'My Custom Plugin',
'version': '1.0.0',
'author': 'Your Name',
'description': 'Custom security tool',
'category': 'recon'
}
def initialize(self):
self.log("Initializing plugin...")
return True
def execute(self, target, **options):
# Your plugin logic here
results = {"target": target, "data": []}
return results
def cleanup(self):
self.log("Cleaning up...")Place your plugin in ~/.phantom/plugins/ and it will be automatically loaded.
PHANTOM Netrunner is designed for authorized security testing and educational purposes only.
- Only use this tool on systems you own or have explicit permission to test
- Unauthorized access to computer systems is illegal
- The developers are not responsible for any misuse of this tool
- Always follow applicable laws and regulations
This project is licensed under the MIT License - see the LICENSE file for details.
Contributions are welcome! Please feel free to submit a Pull Request.
- Fork the repository
- Create your feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
- GitHub: @MiChaelinzo
- Website: beacons.ai/cyberworld
โญ Star this repository if you find it useful! โญ
Made with โค๏ธ by the CyberPunk Netrunner Team