top of page


















A powerful Python Toolkit developed by Intercuba.Net, with Krintoxi as the chief developer. This toolkit is designed to provide cybersecurity professionals, data analysts, and project managers with a comprehensive suite of tools. It offers a versatile and modular solution that empowers users to effectively tackle various tasks related to cybersecurity, data analysis, and project management.

Modules offers a plethora of commands and modules, including but not limited to:

apf, terminal, panel, sys, sqli, vulscan, itor, stor, dvpn, shells, phptools, backdoorssh, discover, dinfo, hash type, numconverter, hexconv, update, converters, aconv, osint, steghide, ddos, tsqli, encdns, stegattack, clear, home, uihanalysis, exit, toolbox, spoof my mac, exif, localports, portscan, sqlscan, noobpasswd, wle, vpn, toxicdork, t-cipher, firewall.


Access to the toolkit's features is secured through an access key, ensuring that only authorized users can leverage its capabilities.

Admin Panel Finder (apf)

Quickly discover hidden admin panels on websites with the help of the script. This feature aids in locating entry points for website exploration.

Terminal Access (terminal)

Gain access to a secure terminal environment. If the required terminal emulator is not available, the toolkit will automatically install it.

Cybersecurity Utilities

Utilize a range of cybersecurity tools, including SQL injection detection (sqli), vulnerability scanning (vulscan), analysis of different hash types, and more.

Data Analysis Tools

Effortlessly perform data analysis tasks with tools such as dataset breakdown (analyze_dataset), report generation (generate_report), data visualization (visualize_data), and more.

Project Management Features (panel)

Take advantage of project management tools for tasks, intelligence gathering, and collaboration, all integrated within the toolkit.

System Information (sys)

Obtain insights into the operating environment by using the lsb_release -a command.

Miscellaneous Options

Expand the toolkit's capabilities with versatile functionalities like configuring Tor (itor), accessing shells (shells), using PHP tools (phptools), and more.

Local and Network Port Scanning

Conduct discreet scans of local and network ports to gather information about potential vulnerabilities.


Open-Source Intelligence (OSINT) (osint)

Leverage OSINT techniques to extract valuable information from publicly available sources.


Image Metadata Extraction and Removal (exif)

Analyze image metadata using the script, enabling the extraction and sanitization of metadata to reveal hidden insights.


Local MAC Address Spoofing (spoof my mac)

Enhance anonymity by utilizing the script to change your device's MAC address.


Easter Eggs:

Discover hidden features within the toolkit for delightful surprises and experiences such as.


This module likely focuses on gathering information about content management systems



and web applications, which can be crucial for identifying potential vulnerabilities.

DDOS (Distributed Denial of Service):

A module for detecting and mitigating distributed denial-of-service attacks, which can disrupt network services.


DNS (Domain Name System):

Tools related to DNS, which may include DNS query analysis and management.



Likely includes tools and features related to configuring and managing firewalls for network security.



A module for identifying and categorizing different types of hashes.



Possibly a module for secure instant messaging or communication within the toolkit.



Tools for MAC address spoofing, which can be used for network reconnaissance or deception.



A module for password cracking, often used for penetration testing and security assessments.



Tools for vulnerability scanning and assessment.



Possibly a module related to dashboard or control panel management within the toolkit.



Tools related to PHP-based web applications and scripting.



Tools for scanning and analyzing open network ports on target systems.



This module may involve sentinel or monitoring functions to detect and respond to potential threats.



Tools for detecting and exploiting SQL injection vulnerabilities.



Likely related to encryption and decryption techniques.



Tools for web crawling and data extraction, often used for information gathering.



A module related to Google dorking, which involves using advanced search queries to find vulnerable websites or information.

Installation and Usage

To start using, simply run the following command:


Upon launching the script, users will be prompted for an access key. Once authenticated, users gain access to the main menu with a variety of options tailored to their objectives.

bottom of page