CyberDeck is a terminal-based penetration testing command dictionary and cookbook with a sci-fi CRT aesthetic inspired by Alien, Blade Runner, and classic hacker films. Built in Python using curses, it delivers an immersive, retro-futuristic interface for browsing, searching, and copying commands for execution
Whether you're on a red team engagement, CTF, or just need quick access to common tools, CyberDeck keeps your workflow fast, organized, and visually epic.
| Feature | Description |
|---|---|
| Sci-Fi Themed UI | Boot/shutdown sequences with typewriter animations, CRT-style text, and Weyland-Yutani branding. |
| Dynamic Command Database | Commands pulled from remote commands.json, auto-updated on launch (configurable). |
| Categorized Commands | Organized by phase: Recon, Scanning, Exploitation, Post-Exploitation, Reverse Shells, etc. |
| Full-Text Search | Dual-panel search across commands and cookbook recipes. |
| Clipboard Integration | Press C to copy any command instantly (pyperclip required). |
| Cookbook Recipes | Step-by-step multi-command playbooks (e.g., "Lateral Movement via WMI"). |
| Related Commands | Context-aware suggestions with live navigation. |
| Customizable Appearance | Choose from 8 retro color schemes: toxic green, yellow, cyan, etc. |
| Animation Toggle | Disable boot/typewriter effects for speed. |
| Cross-Platform Tags | Commands labeled: Windows, Linux, or Win/Lin. |
| Fallback CLI Mode | If curses fails (e.g., Windows without WSL), use as a line-ending converter. |
| Error Logging | All issues logged to ~/.cyberdeck/error.log. |
git clone https://github.com/DotNetRussell/CyberDeck.git
cd CyberDeckpip install pyperclip requestsNote:
cursesis built-in on Linux/macOS.- On Windows, use WSL or install:
pip install windows-curses
python3 cyberdeck.pyFirst run creates
~/.cyberdeck/and downloads latestcommands.json.
| Action | Keys |
|---|---|
| Navigate | ↑ ↓ |
| Select | Enter |
| Go Back | Esc |
| Copy Command | C |
| Search | Search → type query |
| Switch Panel (Search) | ← → |
- Commands → Browse by category → View details
- Search → Find commands/recipes instantly
- Cookbook → Run multi-step playbooks
- Settings → Change color, toggle animations, force update
- Shutdown → Exit with style
Convert line endings:
python3 cyberdeck.py input.txt output.txt -f unixOptions:
-f unix→\n(LF)-f windows→\r\n(CRLF)-f mac→\r(CR)
- Commands: Stored in
~/.cyberdeck/commands.json - Recipes: Stored in
~/.cyberdeck/recipes/*.json - Auto-Update: Enabled by default on startup
- Force Update: Press
Fin Settings
All data synced from:
https://github.com/DotNetRussell/CyberDeck
Create your own in ~/.cyberdeck/recipes/:
{
"name": "Attack Path Visualization with BloodHound",
"description": "Load collected data into BloodHound to reveal privilege escalation routes.",
"tools": [
{
"name": "BloodHound",
"description": "AD relationship graphing tool",
"url": "https://github.com/BloodHoundAD/BloodHound"
}
],
"steps": [
{
"index": 1,
"name": "Start Services",
"command": "neo4j start; bloodhound",
"description": "Launch database and GUI."
},
{
"index": 2,
"name": "Import Dataset",
"command": "Drag domain_data.zip into BloodHound interface",
"description": "Load harvested JSON files."
},
{
"index": 3,
"name": "Pathfinding Queries",
"command": "Run: Shortest Paths from Owned to Domain Admins",
"description": "Identify viable attack chains."
}
]
}We welcome contributions! Help grow the command library and recipes.
- Fork the repo
- Add new entries to
commands.jsonor create.jsonrecipes - Submit a Pull Request
{
"Name": "Mimikatz - DCSync Administrator Hash",
"Category": 16,
"Description": "Mimikatz: Perform DCSync to retrieve Administrator account hash from DC",
"Command": "lsadump::dcsync /user:corp\\Administrator",
"OS": "Windows",
"id": 1,
"related": [
0,
2,
13,
15,
16
]
}MIT License – Free to use, modify, and distribute.
"In space, no one can hear you
nc -lvnp 4444"
— CyberDeck, probably
Built with Python · Maintained by @DotNetRussell








