Welcome, Cyberpsycho 🦾
SANDEVISTAN is your ultimate cybersecurity toolkit — a unified platform where reconnaissance, exploitation, and post-exploitation tools converge. No more context switching between dozens of platforms. Everything you need is here, optimized and ready to deploy.
Quick Start
# If you don't have Python3
sudo apt install python3
# Clone the repository
git clone https://github.com/WhiteMuush/sandevistan.git
# Navigate to the directory
cd sandevistan
# Make the script executable and run
chmod +x sandevistan.sh
sudo bash sandevistan.sh
Features
- All-in-One Arsenal: Comprehensive suite of security tools in one place
- Streamlined Workflow: No more tool hunting — everything at your fingertips
- Optimized Performance: Pre-configure…
Welcome, Cyberpsycho 🦾
SANDEVISTAN is your ultimate cybersecurity toolkit — a unified platform where reconnaissance, exploitation, and post-exploitation tools converge. No more context switching between dozens of platforms. Everything you need is here, optimized and ready to deploy.
Quick Start
# If you don't have Python3
sudo apt install python3
# Clone the repository
git clone https://github.com/WhiteMuush/sandevistan.git
# Navigate to the directory
cd sandevistan
# Make the script executable and run
chmod +x sandevistan.sh
sudo bash sandevistan.sh
Features
- All-in-One Arsenal: Comprehensive suite of security tools in one place
- Streamlined Workflow: No more tool hunting — everything at your fingertips
- Optimized Performance: Pre-configured for maximum efficiency
- Easy Deployment: Simple installation and setup process
6 integrated modules:
Network Reconnaissance
Quick discovery and footprinting to map targets and enumerate services.
- Tools: Nmap, Masscan, Amass, Recon-ng, Sublist3r, theHarvester, dnsenum (search), WhatWeb, DirBuster
Vulnerability Scanning
Automated checks to find common and custom vulnerabilities across web and network surfaces.
Exploitation Framework
Frameworks and targeted exploit tools for validating vulnerabilities and gaining initial access.
Post-Exploitation
Tools for lateral movement, persistence, and deeper system enumeration after compromise.
- Tools: PEASS-ng (LinPEAS / WinPEAS), LaZagne, Mimikatz, PowerSploit, Linux Smart Enumeration, Impacket
Credential Harvesting
Password cracking, credential capture, and network credential abuse utilities.
Payload Generation
Generators and obfuscators for custom payload creation and delivery.
- Tools: msfvenom (Metasploit), Veil, TheFatRat, Hoaxshell, Donut, ScareCrow (search)
A Unique Cyberpunk Interface Style
Experience a visually stunning and immersive interface that embodies the essence of cyberpunk aesthetics. Our design combines futuristic elements with a user-friendly layout, ensuring that you not only work efficiently but also enjoy the process. Dive into a world where technology meets art, enhancing your cybersecurity tasks with a unique flair.
License
This project is licensed under the MIT License. Feel free to use, modify, and distribute it, but please credit the original authors ( Melvin PETIT / WhiteMuush ).
Disclaimer
This tool is intended for educational purposes and authorized security testing only. Use at your own risk. The authors and contributors accept no responsibility or liability for any misuse, damages, data loss, service disruption, or legal consequences resulting from its use. Ensure you have explicit permission and comply with all applicable laws. No warranties, express or implied.