What this mode actually covers
The upstream README presents six exploit-oriented phases. This is not a beginner mode and it should never be described as casual scanning.
- Web exploitation
- Authentication attacks
- Exploit and CVE search
- Post-exploitation
- Lateral movement
- Persistence and exfiltration
Use boundary
CyberMind explicitly frames the product for authorized security research, pentesting with written permission, CTF competition, and education.