Skip to main content

CyberMind Docs

Core Workflows

Abhimanyu is the exploit engine and should be treated that way

This is the sharpest edge of the product and it is Linux-only.

$cybermind /abhimanyu example.com

What this mode actually covers

The upstream README presents six exploit-oriented phases. This is not a beginner mode and it should never be described as casual scanning.

  • Web exploitation
  • Authentication attacks
  • Exploit and CVE search
  • Post-exploitation
  • Lateral movement
  • Persistence and exfiltration

Use boundary

CyberMind explicitly frames the product for authorized security research, pentesting with written permission, CTF competition, and education.