Complete Guide
CyberMind CLI — Full Workflow
Everything from fresh install to overnight bug bounty hunting. Every command, every flag, every workflow — in order.
On this page
1. Install CyberMind CLI
Linux / Kali (recommended)
curl -sL https://cybermindcli1.vercel.app/install.sh | bashOne-command install. Downloads pre-built binary, installs to /usr/local/bin.
CYBERMIND_KEY=cp_live_xxx curl -sL https://cybermindcli1.vercel.app/install.sh | bashInstall and save your API key in one step.
cybermind --versionVerify install. Should show v2.5.7 or later.
Windows (PowerShell)
(iwr https://cybermindcli1.vercel.app/install.ps1 -UseBasicParsing).Content | iexRun in PowerShell (Admin recommended).
$env:CYBERMIND_KEY="cp_live_xxx"; (iwr https://cybermindcli1.vercel.app/install.ps1 -UseBasicParsing).Content | iexInstall with API key pre-saved.
Manual binary install (if curl fails)
wget https://cybermindcli1.vercel.app/cybermind-linux-amd64 -O /tmp/cm
chmod +x /tmp/cm
sudo cp /tmp/cm /usr/local/bin/cybermind
sudo cp /tmp/cm /usr/local/bin/cbmDownload binary directly and install manually.
2. Doctor — Install All Tools
Run doctor after install. It checks every recon/hunt/exploit tool, installs missing ones automatically, and updates the CLI binary.
sudo cybermind /doctorFull health check + auto-install all missing tools. Takes 10-20 min on first run.
What doctor installs
Recon (35 tools)
nmap, subfinder, amass, httpx, nuclei, rustscan, ffuf, katana, dnsx, tlsx, wafw00f, shodan, h8mail, exiftool, recon-ng, spiderfoot, metagoofil, theHarvester, feroxbuster, gobuster, nikto, whatweb, masscan, zmap, naabu, reconftw, crlfuzz, tinja, sstimap, gitxray, binwalk3, wpprobe, dig, whois, amass
Hunt (28 tools)
dalfox, gau, waybackurls, hakrawler, gospider, cariddi, trufflehog, mantra, paramspider, arjun, x8, smuggler, jwt_tool, graphw00f, xsstrike, kxss, bxss, corsy, gf, ssrfmap, tplmap, liffy, gopherus, waymore, subjs, httprobe, urlfinder, beef-xss
Exploit (38 tools)
sqlmap, commix, wpscan, nosqlmap, xxeinjector, hydra, john, hashcat, kerbrute, searchsploit, msfconsole, linpeas, pspy, bloodhound-python, certipy, bloodyAD, pywhisker, crackmapexec, netexec, evil-winrm, impacket-secretsdump, coercer, mitm6, chisel, ligolo-ng, iodine, empire, sliver, evilginx2, routersploit, sprayhound, wpscan, rubeus, ldeep, adaptixc2, fluxion, donut-shellcode, bopscrk
3. Save Your API Key
cybermind --key cp_live_YOUR_KEY_HERESave your Elite/Pro/Starter API key. Stored in ~/.cybermind/config.json.
cybermind whoamiVerify key — shows your plan, usage, and limits.
Plan features:
4. AI Chat
cybermindLaunch interactive AI security chat. Works on all platforms.
cybermind --localUse local Ollama AI instead of cloud (set CYBERMIND_LOCAL=true).
Chat slash commands
/recon <target>Run full automated recon (Linux only)/hunt <target>Run vulnerability hunt (Linux only)/plan <target>OMEGA planning mode (Linux only)/scan <target>AI-guided network scan (all platforms)/osint <target>OSINT lookup (all platforms)/cve --latestLatest critical CVEs/cve <CVE-ID>CVE details and exploit info/payloadGenerate reverse shell payloads/wordlist <target>Generate custom wordlist/doctorHealth check + auto-update/uninstallRemove CyberMind completelyreportGenerate pentest report from chat historyclearClear chat history5. Recon Mode
Full automated recon pipeline — passive OSINT → subdomain enum → port scan → HTTP fingerprint → vuln scan → AI analysis.
sudo cybermind /recon example.comFull recon on a target domain.
sudo cybermind /recon example.com --tools nmap,httpx,nucleiRun only specific tools.
sudo cybermind /recon example.com --passivePassive recon only (no active scanning).
Flags
--tools <list>Comma-separated tool names to run. E.g. nmap,subfinder,httpx--passivePassive mode only — no active port scanning or fingerprinting--output <file>Save results to fileRecon pipeline (in order)
6. Hunt Mode
Deep vulnerability hunting — URL collection → parameter discovery → XSS/SSRF/IDOR/SQLi hunting → AI triage.
sudo cybermind /hunt example.comFull hunt on a target.
sudo cybermind /hunt example.com --tools dalfox,nuclei,gauRun specific hunt tools only.
Flags
--tools <list>Specific hunt tools to run--focus xss,idor,ssrfFocus on specific vulnerability typesHunt pipeline (in order)
7. OMEGA Planning Mode
The most powerful mode. Runs full recon → hunt → exploit pipeline automatically. Best for overnight bug bounty runs.
sudo cybermind /plan example.comFull OMEGA plan on a specific target.
sudo cybermind /plan --auto-targetAI picks the best HackerOne target for you automatically.
sudo cybermind /plan --auto-target --skill intermediate --focus idor,xss,ssrfAuto-target with skill level and bug focus.
sudo cybermind /plan example.com --focus xss,idor --skill beginnerTarget with focus and skill level.
Flags
--auto-targetAI fetches best HackerOne bug bounty target based on your skill + focus. No domain needed.--skill <level>beginner | intermediate | advanced — adjusts tool aggression and AI recommendations--focus <types>Comma-separated: xss, idor, ssrf, sqli, rce, lfi, xxe, ssti, auth, logic — focuses the huntOMEGA pipeline (in order)
sudo cybermind /plan --auto-target --skill intermediate --focus idor,xss,ssrf — leave it running, check results in the morning.8. Abhimanyu — Exploit Engine
Elite-only exploit engine. Takes recon findings and runs targeted exploitation — SQLi, XSS, RCE, auth bypass, CVE chains.
sudo cybermind /abhimanyu example.comRun full exploit pipeline on target.
sudo cybermind /abhimanyu example.com sqliFocus on SQL injection exploitation.
sudo cybermind /abhimanyu example.com xssFocus on XSS exploitation.
Supported vulnerability types
sqlixssrcessrflfixxesstiidorauthcsrfopen-redirectcveTools used by Abhimanyu
9. AI Coding Assistant
AI coding assistant — works in any project directory. Reads your codebase, writes code, runs commands.
cybermindLaunch AI coding assistant in current directory.
cbmShort alias — same as cybermind.
AI Coding slash commands
/buildBuild the project/testRun tests/fixAuto-fix errors in current file/explainExplain selected code/refactorRefactor current file/securitySecurity audit of codebase/fullstackFull-stack feature implementation/deployDeployment guide for current project10. Utility Commands
Network scan
cybermind /scan 192.168.1.0/24AI-guided network scan (all platforms).
cybermind /portscan example.comPort scan with AI analysis.
OSINT
cybermind /osint example.comFull OSINT lookup — whois, DNS, emails, subdomains.
CVE intelligence
cybermind /cve --latestLatest critical CVEs (last 7 days).
cybermind /cve CVE-2024-1234Specific CVE details + exploit info.
cybermind /cve --keyword apacheSearch CVEs by keyword.
Payload generation
cybermind /payloadInteractive payload generator — reverse shells, web shells, encoders.
cybermind /wordlist example.comGenerate custom wordlist for target.
Report generation
cybermind reportGenerate full pentest report from current chat/session history.
11. Update and Uninstall
Update to latest version
sudo cybermind /doctorAuto-updates CLI binary + installs any new tools.
Uninstall completely
sudo cybermind /uninstallRemoves binary + config. Clean uninstall.
sudo rm -f /usr/local/bin/cybermind /usr/local/bin/cbm && rm -rf ~/.cybermindManual uninstall if CLI is broken.
Reinstall fresh
CYBERMIND_KEY=cp_live_xxx curl -sL https://cybermindcli1.vercel.app/install.sh | bashFresh install with API key.
Quick reference — most used commands
sudo cybermind /doctorInstall/update all toolssudo cybermind /plan --auto-targetOvernight bug bounty (auto picks target)sudo cybermind /recon example.comFull reconsudo cybermind /hunt example.comVulnerability huntcybermind /cve --latestLatest CVEscybermindAI coding assistantcybermind whoamiCheck plan + usage