Powerful tools for the modern security professional
Explore Documentation | Installation Guide | Contributing | Report Bug
"The first step in securing your system is having the right tools at your disposal."
In a world where cyber threats evolve daily, staying ahead requires the right arsenal. CyberTools Collection brings you a carefully curated suite of security tools that combine power with simplicity. Whether you're a seasoned security professional or just starting your cybersecurity journey, our tools are designed to meet your needs.
Fun Fact: A 12-character random password would take centuries to crack using current technology!
π IP-Check
A Python based IP address analysis tool that provides detailed information about IP addresses and domains. This tool fetches and analyzes various aspects of an IP address or domain, including geolocation, network information, DNS records, SSL certificates, WHOIS data, and port scanning.
- IPv4 and IPv6 support
- Domain name resolution
- Response time measurement
- Detailed geolocation data
- Network information analysis
-
DNS Analysis
- Multiple record types (A, AAAA, MX, NS, TXT, SOA, CNAME)
- Nameserver information
- Reverse DNS lookup
-
Security Information
- SSL/TLS certificate details
- Port scanning with service detection
- Banner grabbing for open ports
- Proxy/VPN detection
-
Domain Information
- WHOIS data retrieval
- Registration details
- Domain status
- Registrar information
- Organized data storage in
dataV/
directory - Raw data storage in JSON format
- Interactive visualizations
- Historical data viewing
- Structured report generation
- Python 3.7+
- Required packages:
requests dnspython python-whois pyOpenSSL plotly pandas
Basic Information:
IP Address: 8.8.8.8
Response Time: 0.373 detik
Tipe: Non-Mobile
Proxy/VPN: Tidak
Hosting/Datacenter: Ya
Location:
Continent: North America (NA)
Country: United States (US)
Region: Virginia (VA)
City: Ashburn
District:
Zip Code: 20149
Coordinate: 39.03, -77.5
Network Network:
ISP: Google LLC
Organization: Google Public DNS
AS Number: AS15169 Google LLC
AS Name: GOOGLE
Reverse DNS: dns.google
DNS Information:
Record DNS:
- A: 8.8.4.4, 8.8.8.8
- AAAA: 2001:4860:4860::8888, 2001:4860:4860::8844
- NS: ns4.zdns.google., ns3.zdns.google., ns2.zdns.google., ns1.zdns.google.
- TXT: "v=spf1 -all", "https://xkcd.com/1361/"
- SOA: ns1.zdns.google. cloud-dns-hostmaster.google.com. 1 21600 3600 259200 300
Nameservers: ns3.zdns.google., ns2.zdns.google., ns1.zdns.google., ns4.zdns.google.
SSL Information:
Issuer: [(b'C', b'US'), (b'O', b'Google Trust Services'), (b'CN', b'WR2')]
Subject: [(b'CN', b'dns.google')]
Valid From: b'20250106083801Z'
Valid Until: b'20250331083800Z'
Version: 2
WHOIS Information:
Registrar: MarkMonitor Inc.
Created: 2018-04-16 22:57:01
Expires: 2025-04-16 22:57:01
Updated: 2024-03-20 10:02:54
Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited, clientTransferProhibited https://icann.org/epp#clientTransferProhibited, clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Nameservers: ns1.zdns.google, ns2.zdns.google, ns3.zdns.google, ns4.zdns.google
dataV/
βββ raw/ # Raw JSON data
βββ reports/ # Formatted reports
βββ visualizations/# Interactive visualizations
βββ history/ # Search history
The tool provides information including:
- Basic IP information
- Geographical data
- Network details
- DNS records
- SSL certificate information
- WHOIS data
- Port scan results
- Response times
π― Use Case: Perfect for threat intelligence and network security assessments!
π Local Device Monitor
This Network Monitoring System is a Python-based tool designed to provide monitoring of network infrastructure, device health, and WiFi connectivity. By utilizing these monitoring techniques, it offers real-time analysis and reporting of network-related metrics.
- System resource tracking (CPU, Memory, Disk)
- Platform-specific system information retrieval
- Performance logging and analysis
- Network interface scanning
- IP address and hostname resolution
- Connection status and network topology mapping
- WiFi network detection and analysis
- Robust logging mechanism
- Security-based network scanning
- Concurrent processing for efficient monitoring
- SQLite database integration for persistent data storage
-
Language: Python 3.8+
-
Main Libraries:
psutil
: System and process utilitiesplatform
: System information retrievalsocket
: Network communicationthreading
: Concurrent operationssqlite3
: Database managementrequests
: HTTP networking
MUST BE INSTALLED!
- Python 3.8 or higher
- Required Python libraries (see
External Tools
) - Administrative/root access recommended
check the repository in here
https://github.com/rexzea/Simple-Monitoring.git
import psutil
import platform
import socket
import time
import logging
import datetime
import socket
import json
import threading
import time
import sqlite3
import re
import os
import subprocess
import concurrent.futures
import uuid
import requests
import ipaddress
--- Network Monitoring ---
Network: {'ssid': 'Not shown', 'platform': 'Windows'}
Connected Devices: 0
Download Speed: 18.81 Mbps
Upload Speed: 9.4 Mbps
Signal Strength: 84%
Local IP: not shown
Subnet: not shown
Device List: not shown
Monitoring stopped.
π Performance Tip: Set up custom alerts to catch resource hogs before they impact your system!
π MAC Address Changer
Master of disguise for your network identity! Change your MAC address with confidence:
- One click randomization
- Vendor specific MACs
- Automatic backup
- Cross platform support
- Safety checks built-in
β‘ Quick Tip: Always backup your original MAC address before making changes!
π± OSINT Phone Number
PhoneDetective is an OSINT (Open Source Intelligence) tool designed to uncover hidden information behind phone numbers effortlessly. With an intuitive interface, PhoneDetective helps you gather intelligence from various open sources.
- Automatic phone number format detection
- Real time validation to ensure accuracy
- National format (Indonesia)
- Identify mobile providers
- Detect geographical location
- Phone number registration history
- Export results in JSON format
- Interactive data visualization
- Structured analysis summary
- Prerequisites
- Python 3.6+
- pip (Python package installer)
- Internet connection
ββββββββββββββββββββββββ³βββββββββββββββββββ
β Field β Value β
β‘ββββββββββββββββββββββββββββββββββββββββββ©
β Format Internasional β +62 898-8610-455 β
β Format Nasional β 0898-8610-455 β
β Format E164 β +628988610455 β
β Kode Negara β +62 β # My contact
β Nomor Nasional β 8988610455 β
β Tipe β 1 β
β Valid β True β
β Kemungkinan β True β
ββββββββββββββββββββββββ΄βββββββββββββββββββ
{
"number": "+62812XXXXX",
"valid": true,
"provider": "Telkomsel",
"location": {
"province": "DKI Jakarta",
"region": "Indonesia"
},
"risk_score": 0.2,
"last_seen": "2024-12-15"
}
π Investigation Tip: Cross reference findings with social media for better results!
πΈοΈ OSINT Web
Magic Eye is a powerful OSINT (Open Source Intelligence) tool designed for comprehensive website analysis and intelligence gathering. With four specialized modes of operation, it provides flexible and detailed insights into web infrastructure, content, and security aspects.
- Four specialized analysis modes
- Multiple output formats (JSON/CSV)
- Real time data processing
- Deep website crawling capabilities
- Security focused analysis options
The versatile reconnaissance mode for quick analysis.
Specialized analysis for ".com" domains with structured output.
Advanced link discovery and relationship mapping.
Technical security analysis and infrastructure mapping.
To know more details about all modes, Click here
ββββ βββββ βββ βββββ βββ ββββββ βββββββββ βββββββββ
βββββββ βββββββββ βββ βββββββββββ ββ ββ β βββ βββββ β
βββ βββββββ βββ βββββββββββββββ β ββββ βββ βββββββ
βββ βββ βββββββββ βββ βββββββββββ ββββ βββ β β ββββββββ β
ββββ ββββ ββ βββββββββββββββββ βββββ β βββββββ β ββββββββββββ
β ββ β β ββ ββββ ββ β ββ β ββ β β ββ ββ β βββββ ββ ββ β
β β β β ββ β β β β β β β β β ββββ βββ β β β
β β β β β β β β ββ β β β ββ β
β β β β β β β β ββ β β β
β β β
cr : rexzea
==================================================
Enter the target domain (example: example.com): example.com
"ip": "20.205.243.166",
"ip_details": {
"status": "success",
"country": "Singapore",
"countryCode": "SG",
"region": "01",
"regionName": "Central Singapore",
"city": "Singapore",
"zip": "168812",
"lat": 1.283,
"lon": 103.833,
"timezone": "Asia/Singapore",
"isp": "Microsoft Corporation",
"org": "Microsoft Azure Cloud (southeastasia)",
"as": "AS8075 Microsoft Corporation",
"query": "20.205.243.166"
π― Best Practice: Always verify findings through multiple sources!
π Password Checker
Password Strength Checker is a Python application designed to analyze and evaluate password strength in depth. This project aims to provide an assessment of password security using various metrics and analytical algorithms in Python.
- Password Complexity Analysis
- Password Length Checking
- Password Entropy Calculation
- Weak Password Identification
- Password Strength Scoring
- Security Recommendations
- Objectives
- Help you create strong passwords
- Enhance digital security awareness
- Provide an easy guide for password creation
Python 3.7+ No additional external libraries required
π AES Text Encryptor
AES Text Encryptor is a Python application that allows you to encrypt and decrypt text messages using the AES (Advanced Encryption Standard) algorithm. With encrypted storage in SQLite database, you can manage messages securely and efficiently!
- Message Encryption: Encrypt text messages with a password using the AES algorithm
- Message Decryption: Decrypt encrypted messages with the correct password
- Database Storage: Encrypted messages are stored in SQLite with metadata for reference
- Key Security: Encryption keys are generated using PBKDF2 for additional security
- Activity Logging: Application activities are automatically recorded in log files for monitoring
Create a virtual environment (optional but recommended):
python -m venv myenv
source myenv/bin/activate # For Linux/MacOS
myenv\Scripts\activate # For Windows
python AES.py
- 1: Encrypt a new message
- 2: Decrypt an encrypted message
- 3: View list of saved messages
- 4: Exit application
Python 3.10+
- Cryptography: For message encryption and decryption
- SQLite: As local database storage
- Logging: For recording application activities
To find out the results of this project preview, please click here!
π‘ Tip: Use CBC mode for enhanced security in most scenarios!
A tool to generate strong passwords and secure your sensitive data. This project provides solutions for password creation and security using encryption technology.
- Smart Password Generator
- Highly secure random password generation
- Full control over password complexity
- Reliable generation algorithm (error-free)
- Advanced Encryption Methods
- Support for multiple hash algorithms
- Password conversion to encrypted format
- Password strength analysis
- Protection against brute force attacks
- Encryption Algorithms:
- SHA-256
- BCrypt
- PBKDF2
- Programming Language: Python
- No storage of raw passwords
- End-to-end encryption
- Maximum data protection
HASH encryption is the process of converting data into a unique one-way code. This means:
- Once data is converted to HASH, it's virtually impossible to revert to its original form
- Each different input will generate a different HASH
- Small changes in input will result in completely different HASH outputs
- Non-Reversible: No mathematical way to "decode" HASH back to original text
- Secure: Each character combination produces a different HASH
- Consistent: Same input always produces the same HASH
To "crack" a HASH, attackers must use:
- Brute Force Attack
- Try all possible combinations
- Can take thousands/millions of years
- Highly inefficient
- Rainbow Table Attack
- Pre-processed tables of various HASH combinations
- Modern techniques like "salt" make this method ineffective
- Online Decryption Services
Using websites like
Or
https://crackstation.net/
https://hashes.com/
- Only effective for common/weak HASHes
- No guarantee of successful decryption
MANDATORY: Store Original Passwords Safely
- Use encrypted password managers
- Write in personal notebook
- Store in hidden location
- NEVER store passwords in:
- Computer files
- Unencrypted cloud storage
Input: "Admin123!"
HASH SHA-256:
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
- SHA-256
- BCrypt
- Argon2
- PBKDF2
- HASH is designed NOT to be reversible
- Always store original passwords securely like on paper or notes
- Use complex character combinations
πͺ Strength Tip: Mix characters, numbers, and symbols for maximum security!
Educational malware analysis in a safe environment:
- Controlled environment
- Detailed documentation
- Learning resources
- Safety mechanisms
- Analysis tools
β οΈ Safety First: Always use in an isolated environment!
π URL Scanner
Simple URL Checker is a tool for analyzing and assessing URL security. Designed to protect users from potential online threats, this project provides analytical reports about the security and risks associated with web links.
- Security Detection
- Checking against malicious URL databases
- Analysis of suspicious URL structures and patterns
- Identification of potential phishing and malware sites
- Multi Protocol Support
- Compatible with HTTP and HTTPS
- SSL certificate verification
- Network security configuration validation
- Great Performance
- Fast scanning in milliseconds
- Optimized algorithms for processing efficiency
- Low computational resource consumption
- Python 3.7+
- pip
- Internet connection
# Install dependencies
pip install requests beautifulsoup4
import requests
import json
import csv
from urllib.parse import urljoin, urlparse
from bs4 import BeautifulSoup
# Check URL security
target_url = input("Enter website URL for testing (example: http://example.com): ")
# Preview
--- Phishing Detection Results ---
URL: https://vsbattles.fandom.com/wiki/VS_Battles_Wiki
Risk Score: 0
Risk Status: Safe
URL Checker uses multiple layers to assess security:
- Global Blacklist
- Cross-reference with international malicious URL databases
- Regular threat list updates
- URL Structural Analysis
- Detection of suspicious URL patterns
- Identification of unusual subdomain usage
- Checking for suspicious characters and encoding
- Certificate Verification
- SSL certificate validity checks
- Detection of expired or untrusted certificates
- Content Scanning
- Metadata analysis
- Checking for potential malicious redirects
π‘οΈ Security Tip: Scan unknown URLs before clicking!
Get up and running in minutes:
# Clone with style
git clone https://github.com/IVerse-VDV/CyberVoid.git
# Enter the matrix
cd cyber-tools
# Power up
pip install -r requirements.txt
# Launch your first tool
python cyber-tools/ip-check/main/react-ip-checker.py
- π₯ Modern Interface: Clean, intuitive, and powerful
- π Lightning Fast: Optimized for performance
- π‘οΈ Security First: Built with security best practices
- π± Cross-Platform: Works on Windows, Linux, and MacOS
- π§ Extensible: Easy to modify and enhance
- π Well Documented: Clear, comprehensive documentation
Your contributions make CyberTools better! Whether you're:
- π Hunting bugs
- β¨ Adding features
- π Improving documentation
- π¨ Enhancing UI/UX
We welcome your pull requests!
Got questions? We've got answers:
Released under the MIT License - see the LICENSE file for details.
β Star us on GitHub and join our community!