Advanced Cyber Defense & Reconnaissance Framework
VORTEX is a comprehensive CLI-based security terminal designed for ethical hackers, system administrators, and cybersecurity enthusiasts. It integrates offensive and defensive tools into a single, unified “Hacker” style interface.
The system is divided into 3 core operational sectors:
.py, .php, .sh) to detect suspicious logic (e.g., webshells, reverse shells).SSID, BSSID, Signal Strength)..pdf, .docx, .zip) into a secure .enc format.RUN_VORTEX.bat.git clone https://github.com/Nugraa21/AI-LLM-Keamanan-Data---Malware-Detection.git
cd AI-LLM-Keamanan-Data---Malware-Detection
python -m venv .venv
.\.venv\Scripts\activate # Windows
source .venv/bin/activate # Linux/Mac
pip install -r requirements.txt
python main.py
Once the system boots, use the Number Keys to access modules.
| Command | Module | Description |
|---|---|---|
| 1 | Malware Scanner | Point to a folder to start scanning for threats. |
| 2 | System Audit | View host specs and security warnings. |
| 3 | Log AI | Run forensic analysis on event logs. |
| 4 | Network Recon | Scan IPs and Ports. |
| 5 | WiFi Monitor | View nearby APs. |
| 6 | OSINT | Information gathering on domains. |
| 7 | Crypto Lab | Encrypt/Decrypt Files & Text. |
| 8 | Steganography | Hide secrets in images. |
| 0 | Disconnect | Safe shutdown of VORTEX kernel. |
VORTEX is for EDUCATIONAL Purpose only. Usage of these tools for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.
System Architect: Nugra21