Skip to main content

Cyberstrike is now open source! AI-powered penetration testing for security professionals. Star on GitHub

Exploitation Tools

Cyberstrike integrates exploitation tools for authorized penetration testing.

Danger

Only use exploitation tools on systems you have explicit permission to test.

SQL Injection

SQLMap

Automated SQL injection exploitation:

Terminal window
cyberstrike> Test https://example.com/page?id=1 for SQL injection with sqlmap

Web Exploitation

WPScan

WordPress vulnerability scanner:

Terminal window
cyberstrike> Scan the WordPress site at example.com with wpscan

Commix

Command injection exploitation:

Terminal window
cyberstrike> Test example.com/cmd?input=test for command injection

Password Attacks

Hydra

Network login brute-forcer:

Terminal window
cyberstrike> Brute force SSH login on 192.168.1.1 with common credentials

John the Ripper

Password hash cracker:

Terminal window
cyberstrike> Crack the password hashes in hashes.txt

Post-Exploitation

LinPEAS / WinPEAS

Privilege escalation scripts:

Terminal window
cyberstrike> Run privilege escalation enumeration on the target

Reporting

After exploitation, generate reports:

Terminal window
cyberstrike> Generate a penetration test report for this session