← Back to HackerOS Tools
HACKEROS DOCUMENTATION

Cybersecurity
Mode

A professional-grade security environment for HackerOS. Offensive penetration testing and defensive auditing in one unified interface, powered by an isolated BlackArch Linux container.

Red Mode — Pentest
Blue Mode — Audit
v1.0.0
BlackArch Container

Introduction

Cybersecurity Mode is a dedicated security workstation environment designed for HackerOS. It provides a unified graphical interface for both offensive security professionals (penetration testers, red teamers) and defensive security practitioners (auditors, blue teamers), running all tools inside an isolated BlackArch Linux Podman container.

The application is designed to run as a dedicated TTY session (similar to Steam's Gamescope session) launched via cage, providing a clean, distraction-free security workspace. It can also be launched inside an existing desktop session.

🔴
Offensive Security
Penetration testing, vulnerability research, exploit development, and attack simulation using industry-standard tools.
🔵
Defensive Security
System auditing, network monitoring, hardening, compliance analysis, and incident response workflows.
📦
Isolated Container
All tools run inside BlackArch Linux via Podman — completely isolated from your host system.
📖
Built-in Education
Comprehensive in-app documentation for beginners, with command references and practical examples.

Architecture

Cybersecurity Mode is built from three separate compiled components that work together:

Components

ComponentLanguageBinaryPurpose
GUI Frontend Python 3.13 + PyQt6 cybersec-mode-main Main graphical interface, all UI panels, compiled with Nuitka to static binary
Backend Rust (tokio) cybersec-mode-backend Container lifecycle management, network scanning, IPC server over Unix socket
CLI Crystal cybersec Command-line interface, session launcher, update/plugin management

Communication Flow

cybersec (CLI)
    │
    ├── launches cybersec-mode-main (GUI)
    │       │
    │       ├── connects via Unix socket ──► cybersec-mode-backend (Rust)
    │       │       │
    │       │       └── manages ──► Podman Container (BlackArch Linux)
    │       │                           └── security tools (nmap, metasploit, …)
    │       │
    │       └── embeds ──► Terminal Panel ──► shell inside container
    │
    └── direct commands ──► container exec / podman / system
IPC Protocol: The GUI communicates with the backend using newline-delimited JSON-RPC over a Unix domain socket at /tmp/cybersec-mode-backend.sock.

Operational Modes

On first launch (or every launch if configured), Cybersecurity Mode asks you to select an operational mode. This determines which tools are prominently displayed and sets the visual theme accent color.

🔴 Red Mode — Offensive / Pentest

Designed for penetration testers and red teamers. Focuses on:

  • Network reconnaissance and port scanning (nmap, masscan)
  • Vulnerability exploitation (Metasploit, searchsploit)
  • Web application attacks (Burp Suite, sqlmap, nikto, gobuster)
  • Password attacks (hashcat, john, hydra)
  • Wireless security (aircrack-ng, airmon-ng)
  • Post-exploitation and pivoting

🔵 Blue Mode — Defensive / Audit

Designed for security auditors and blue teamers. Focuses on:

  • Network traffic analysis (Wireshark, tcpdump, Zeek)
  • Intrusion detection (Suricata, Snort, OSSEC)
  • System hardening and auditing (Lynis, auditd, chkrootkit)
  • Malware analysis (ClamAV, rkhunter, YARA)
  • Vulnerability assessment (OpenVAS, Nessus)
  • Log analysis and SIEM integration

Switching Modes

You can switch modes at any time using:

Startup Behavior

In Settings → Always ask mode at startup, you control whether the mode selection dialog appears every time. If disabled, Cybersecurity Mode remembers your last choice.

Requirements

System Requirements

ComponentMinimumRecommended
OSHackerOS (Arch-based)
RAM4 GB8+ GB
Disk20 GB free50+ GB
Display1280×8001920×1080 or higher
NetworkRequired for container image pull

Runtime Dependencies

PackagePurpose
podmanContainer engine (preferred over docker)
cageWayland compositor for TTY session mode
python3.13Python runtime (bundled in binary via Nuitka)
qt6-baseQt6 runtime libraries for PyQt6
libwaylandWayland client libraries

Installing

For HackerOS

hacker unpack cybersecurity-mode

This command will fetch and install the precompiled Cybersecurity Mode package directly on your HackerOS system.

Container Setup

All security tools run inside a BlackArch Linux Podman container. The container is created automatically when you click Start Container in the Main panel, or you can manage it manually.

Manual Container Management

bash
# Pull the BlackArch image manually
podman pull blackarchlinux/blackarch

# Create the container (done automatically by the app)
podman run -d \
  --name cybersec-mode-env \
  --privileged \
  --network host \
  --cap-add NET_ADMIN \
  --cap-add NET_RAW \
  -v /home:/home:rw \
  blackarchlinux/blackarch \
  sleep infinity

# Open a shell inside the container
podman exec -it cybersec-mode-env bash

# Install additional tools
podman exec -it cybersec-mode-env pacman -S metasploit burpsuite
Security Note: The container runs with --privileged and --network host flags to allow raw network access required by security tools. Only run this container in controlled lab environments.

Persistent Tool Data

Tool configurations and output files can be stored in /home/<user> which is bind-mounted into the container. Results saved to /home persist across container restarts.

Main Panel

The Main panel is the central dashboard showing available security tools for the currently selected mode. It displays tool cards, container status, and provides quick-launch access.

Terminal Panel

The Terminal panel provides an embedded shell connected directly to the BlackArch container. It uses bash by default (configurable in Settings).

Features

Shell Environment

terminal
# The terminal connects to:
podman exec -it cybersec-mode-env bash

# All BlackArch tools are available:
nmap --version
msfconsole --version
sqlmap --version

Docs Panel

The Docs panel provides in-app reference documentation organized by topic. It is designed to be beginner-friendly while remaining useful for experienced practitioners.

Documentation Categories

Settings Panel

All user preferences are stored in ~/.cache/HackerOS/Cybersecurity-Mode/config.json.

Available Settings

SettingOptionsDefault
Themedark_gray, dark_black, dark_slate, lightdark_gray
UI Font Size9–24 px13
Terminal Font Size9–24 px13
Always Ask Modeon / offon
Container Enginepodman, dockerpodman
Container Imageany OCI imageblackarchlinux/blackarch
Shellbash, zsh, fish, shbash
Log LevelDEBUG, INFO, WARNING, ERRORINFO

Hacker Menu

The Hacker Menu is accessible from the ⚡ Hacker Menu button in the bottom-left corner of the application. It provides quick access to system actions.

ActionDescriptionSession Only
Switch to PlasmaExit Cybersecurity Mode session and start KDE PlasmaYes
Restart AppRestart Cybersecurity Mode applicationNo
ShutdownPower off the system (systemctl poweroff)No
RebootReboot the system (systemctl reboot)No
Update SystemRun cybersec update in the terminalNo
Change ModeOpen the mode selection dialog (Red ↔ Blue)No
Session Only: "Switch to Plasma" only works when Cybersecurity Mode is running as a dedicated Wayland session via cage.

cybersec CLI Reference

The cybersec binary is installed at /usr/bin/cybersec.

CommandDescription
cybersecLaunch Cybersecurity Mode as a TTY session (requires TTY)
cybersec pleaseOpen the GUI in the current session (no TTY check)
cybersec helpShow command reference
cybersec versionPrint version string
cybersec statusShow container, binary, and config status
cybersec updateUpdate container image and application (live output)
cybersec set-mode redSwitch to Red mode (saved to config)
cybersec set-mode blueSwitch to Blue mode (saved to config)
cybersec exec <cmd>Execute a command inside the container
cybersec plugin listList installed plugins
cybersec plugin install <n>Install a plugin (placeholder)
cybersec plugin remove <n>Remove an installed plugin
cybersec plugin info <n>Show plugin metadata

CLI Examples

bash
# Start a Cybersecurity Mode session from a TTY (e.g. Ctrl+Alt+F2)
cybersec

# Open the GUI inside your current KDE/GNOME session
cybersec please

# Check everything is working
cybersec status

# Run nmap directly in the container
cybersec exec 'nmap -sV 192.168.1.0/24'

# Run a full update (shows live output in terminal)
cybersec update

# Switch to blue mode permanently
cybersec set-mode blue

# List installed plugins
cybersec plugin list

IPC Protocol

The GUI communicates with the Rust backend via newline-delimited JSON-RPC over a Unix domain socket.

Request Format

json
{"method": "container_status", "params": {"name": "cybersec-mode-env"}}

Response Format

json
{"ok": true, "result": {"name": "cybersec-mode-env", "running": true, "state": "running"}}
{"ok": false, "error": "Container not found"}

Available RPC Methods

MethodParamsReturns
ping{"pong": true}
container_statusnamerunning, state, engine
container_startimage, namestarted, reused
container_stopnamestopped
container_execname, cmdstdout, stderr, exit_code
list_toolstools[]
system_infohostname, kernel, uptime
scan_networktargetraw nmap XML output

Plugin System

Status: The plugin system is implemented as a placeholder in v1.0.0. Full plugin support is planned for v1.1.0.

Plugins extend Cybersecurity Mode with additional tools, documentation pages, and UI panels. Plugin metadata is stored as JSON files in ~/.cache/HackerOS/Cybersecurity-Mode/plugins/.

Plugin Manifest Format (planned)

json
{
  "name": "my-plugin",
  "version": "1.0.0",
  "description": "Adds custom recon tools",
  "author": "security-researcher",
  "tools": ["amass", "subfinder"],
  "docs": "docs/recon-advanced.html",
  "panel": "panels/recon.py"
}

Configuration Reference

Config file: ~/.cache/HackerOS/Cybersecurity-Mode/config.json

json — full default config
{
  "mode": null,
  "always_ask_mode": true,
  "theme": "dark_gray",
  "font_size": 13,
  "terminal_font": "JetBrains Mono",
  "terminal_font_size": 13,
  "shell": "bash",
  "container_engine": "podman",
  "container_image": "blackarchlinux/blackarch",
  "container_name": "cybersec-mode-env",
  "backend_socket": "/tmp/cybersec-mode-backend.sock",
  "session_mode": false,
  "show_welcome": true,
  "sidebar_collapsed": false,
  "log_level": "INFO",
  "keybindings": {
    "toggle_terminal": "Ctrl+T",
    "toggle_docs":     "Ctrl+D",
    "toggle_main":     "Ctrl+M",
    "toggle_settings": "Ctrl+,",
    "hacker_menu":     "Ctrl+H"
  }
}

Paths & Directories

Key runtime paths for Cybersecurity Mode:

Default Keybindings

ShortcutAction
Ctrl+MGo to Main panel
Ctrl+TGo to Terminal panel
Ctrl+DGo to Docs panel
Ctrl+,Go to Settings panel
Ctrl+HToggle Hacker Menu

All keybindings are customizable in Settings → Keybindings.

Tool Reference

Red Mode Tools

ToolCategoryDescription
nmapScanningNetwork discovery and port scanning
metasploitExploitationPenetration testing framework
burpsuiteWebWeb proxy, scanner, and attack tool
sqlmapWebAutomated SQL injection
hydraBrute-forceLogin credential brute-forcing
aircrack-ngWirelessWiFi security auditing suite
hashcatPasswordGPU-accelerated password cracking
johnPasswordJohn the Ripper password cracker
gobusterWebDirectory and DNS brute-forcing
niktoWebWeb server vulnerability scanner

Blue Mode Tools

ToolCategoryDescription
wiresharkNetworkGraphical packet analyzer
suricataIDS/IPSNetwork threat detection engine
lynisAuditSecurity auditing and hardening tool
openvasScannerFull-featured vulnerability scanner
fail2banPreventionLog-based intrusion prevention
auditdLoggingLinux kernel audit daemon
clamavMalwareOpen-source antivirus engine
rkhunterMalwareRootkit detection and scanning
tcpdumpNetworkCommand-line packet capture
snortIDS/IPSIntrusion detection and prevention