BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net

CIPHER

Claude Integrated Privacy & Hardening Expert Resource

The last security knowledge base you need.

Browse KnowledgeGitHub

Demo

CIPHER terminal demo
94
Articles
14,600
RAG Chunks
28
Skills
318
Tests

7 Operating Modes

RED

Offensive security, exploitation, red team ops

BLUE

Detection engineering, hardening, threat hunting

PURPLE

Purple team, ATT&CK coverage, detection gaps

PRIVACY

Privacy engineering, GDPR/CCPA, data flows

RECON

OSINT, reconnaissance, intelligence gathering

INCIDENT

Incident response, triage, containment

ARCHITECT

Security architecture, threat modeling, zero trust

Install

One-liner
curl -fsSL https://blacktemple.net/cipher/install.sh | bash
pip
pip install cipher-security
Docker
docker run -it ghcr.io/defconxt/cipher "query"

CLI Commands

cipher "query"Send a security query
cipher --smart "query"Auto-route: simple→Ollama, complex→Claude
cipher setupInteractive onboarding wizard
cipher dashboardCyberpunk terminal UI
cipher doctorDiagnostics and auto-fix
cipher statusSystem info
cipher ingestRe-index knowledge base

28 Slash Commands

Offensive
/cipher:redteam
/cipher:web
/cipher:phishing
/cipher:malware
Defensive
/cipher:hunt
/cipher:sigma
/cipher:hardening
/cipher:forensics
Architecture
/cipher:threatmodel
/cipher:cloud
/cipher:crypto
/cipher:devsecops
Intel
/cipher:threatintel
/cipher:cve
/cipher:recon
/cipher:aisec
Compliance
/cipher:audit
/cipher:report
/cipher:privacy
/cipher:ics
Cross-cutting
/cipher:purple
/cipher:insider
/cipher:mobile
/cipher:ir
Core
/cipher:cc
/cipher:ollama
/cipher:claudeapi
/cipher:smart

Knowledge Base

OverviewWeb SecurityAPI ExploitationActive DirectoryWindows InternalsLinux ExploitationNetwork AttacksCloud AttacksKubernetes AttacksC2 & Post-ExploitationRed Team InfrastructureEvasion TechniquesShells ArsenalPassword AttacksPhishing & Social EngSocial EngineeringExfiltration & TunnelingBinary ExploitationWireless & IoTBlockchain & Web3Malware & EvasionVulnerability ResearchBug BountyAttack ChainsPentest CheatsheetPentest Reporting
OverviewSynthesisHardening GuidesSIEM & SOCSigma DetectionThreat HuntingLogging & MonitoringEDR & AV InternalsWindows Event LogsPowerShell SecuritySecOps RunbooksSecurity AutomationInsider Threat & DLPAI DefenseEvasion vs Detection
Investigation ToolsForensics ArtifactsNetwork ForensicsEmail ForensicsMalware AnalysisTimeline AnalysisIncident Playbooks
Security PatternsThreat ModelingInfrastructureNetwork SegmentationIdentity & AuthCryptography & PKIData ProtectionSupply ChainDNS & EmailContainers & K8sAWS SecurityAzure SecurityGCP SecurityCloud InfrastructureStartup Security
Privacy EngineeringRegulationsPrivacy ToolsOSINT & PrivacyData Protection
ComplianceGRC & RiskSecurity MetricsSecurity Leadership
MITRE ATT&CKPurple TeamOSINT TradecraftRecon ToolsICS/SCADAMobile SecurityThreat IntelligenceEmerging ThreatsBreach Case StudiesPurple Team ExercisesDevSecOpsSecure CodingDeveloper SecurityEncoding & ManipulationNetwork ProtocolsAI PentestingCurated ResourcesSupplementary
Security Mastery Q&ASecurity ScenariosCTF MethodologyCertifications