Wiz (cyxwiz)
Your AI Security Partner - Just describe what you need. No commands to memorize. No syntax to learn.
Why Wiz Exists
Security testing shouldn’t require memorizing hundreds of tool flags and command syntaxes.
Think about it: nmap has 130+ options. Nuclei has dozens of flags. SQLMap has over 100 parameters. Now multiply that by the 30+ tools a typical assessment requires. That’s not security work - that’s a memorization exercise.
Wiz takes a different approach. Instead of learning tool syntax, you simply describe what you want to accomplish. The AI understands your intent and figures out which tools to use, how to chain them, and how to interpret the results.
You: "check if this server is vulnerable to log4j"
Wiz: Checking 192.168.1.10 for Log4Shell vulnerability...
[Running nuclei with CVE-2021-44228 templates]
Found: CRITICAL - Log4Shell (CVE-2021-44228) confirmed
The server is vulnerable to remote code execution via JNDI injection.
Recommendation: Upgrade log4j to 2.17.1+ or apply mitigations immediately.
No flags to remember. No syntax to look up. Just describe what you need.
What Wiz Does
Wiz is an AI-powered security operations assistant. You talk to it in plain English, and it:
- Understands your intent - Whether you say "scan for open ports" or "what services are running" - same result
- Selects the right tools - Picks nmap, nuclei, nikto, or whatever fits the task
- Chains operations intelligently - Finds a web server? Automatically suggests vulnerability checks
- Explains results clearly - No raw output dumps, just actionable insights
- Tracks everything - Every finding, every command, ready for your report
Talk, Don’t Type Commands
Here’s how a real conversation with Wiz looks:
You: "I need to test this web application at https://target.com"
Wiz: I'll start with reconnaissance. Let me:
1. Check what technologies it's running
2. Look for common vulnerabilities
3. Test the authentication mechanisms
Starting now...
[After scanning]
Here's what I found:
- Running WordPress 5.8.1 (outdated - current is 6.4)
- 3 plugins with known vulnerabilities
- Admin login page exposed at /wp-admin
- No rate limiting on login attempts
Want me to dig deeper into any of these?
You: "yes, check those plugin vulnerabilities"
Wiz: Looking at the vulnerable plugins...
CRITICAL: Contact Form 7 < 5.3.2 - Unrestricted file upload
HIGH: Elementor < 3.1.2 - Authenticated XSS
MEDIUM: WooCommerce < 5.2.0 - Information disclosure
The file upload vulnerability is serious. With a valid form submission,
an attacker could upload malicious PHP files.
Should I generate a detailed report with remediation steps?
What You Can Ask
Just describe what you need in your own words: