Skip to content

DeadmanXXXII/CyberWarrior

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CyberWarrior

Once you have added your extras to both, make it a Cargo.toml load then. Please know this tool is only as good as your knowledge if you think this is a good fit give it to your red/blue/purple team engineer to sort out.

cargo run --bin CyberWarrior.rs

Instructions for use. Make sure you have all the necessities required like rustup, attack vectors, file paths, IPs and various different inputs and files that need configured to design your cyber warriors arsenal first then assemble in this order for use. CyberWarrior back and front end.rs Then use ultra link to input all.

Your tools in this order Seeker, Prophet, threat intelligence gathering, Malware detection unit, Prevalence, Scanner and IDS, Battle suit, Labyrinth, Illumination, ComShark Infinite Blue Recon unit, Infinite Blue, compliance checker and Transparency.

If something isn't working check the code parameters, I know there's a lot to do but once done correctly the network/system protects, updates and security tests itself while logging it and prioritizes it all. All alterable parameters have comments to say where and what to do.

Also where ever it says unimplemented! you need to implement your API keys or search logic. I have ran this on a continuous process and it works fine on 8080.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages