I’ve been working on Cyber+, a domain-specific language designed for scripting cybersecurity and recon workflows in a simplified way.
The idea is simple:
Instead of writing long Bash/Python scripts to chain tools together, you can write:
Web_Fingerprint("example.com"); Port_Probe("scanme.nmap.org"); HTTP_Security_Audit("example.com"); Export_Report("json");
Cyber+ runs real networking and security tasks under the hood and aggregates results into structured reports (JSON / HTML).
Why I built this
When learning and practicing cybersecurity, I found that:
Toolchains are fragmented
Scripts get messy
Reporting is inconsistent
Automation requires glue code
Cyber+ aims to provide:
A unified scripting layer
Simple readable syntax
Built-in reporting
Cross-platform CLI
It’s written in Go and runs .cbp scripts through a custom interpreter.
Current features
Web fingerprinting
Port probing
HTTP header analysis
DNS / recon tasks
Structured report export
Modular command system
What it is not
Not a replacement for Nmap or Metasploit
Not an exploit framework
Not intended for illegal use
It’s primarily designed for automation, labs, and educational workflows.
I’d really appreciate technical feedback, especially on:
DSL design decisions
Architecture
Use cases I might be missing
Whether this solves a real workflow problem
GitHub: https://github.com/TanmayCzax/CyberPlus-1.0
Thanks for reading.