v0.1-alpha — Now accepting early access registrations
BETA

CYBERFORGE

AI-Powered Cyber Defense. Compliance-First.

Rust core. eBPF kernel visibility. Built for India-first compliance. 10x cheaper than legacy solutions.

cyberforge@kali ~
$ _
eBPF (Kernel Viz)
AI (Threat Intel)
Rust (Core Engine)

Complete Cyber Defense.

Four pillars of AI-powered defense, purpose-built for India's regulatory landscape.

🤖

Automated Incident Response

Playbook-driven containment, auto-isolation, and SOAR integration. Respond to threats in seconds, not hours.

📋

Compliance Engine

CERT-In, DPDPA, RBI — India-first regulatory compliance. Auto-generate 6-hour incident reports.

🔍

AI Vulnerability Scanner

CVE detection with AI-prioritized exploitability scoring. Focus on what matters, not noise.

🔬

eBPF Kernel Monitor

Kernel-level visibility with zero performance overhead. Detect fileless malware and lateral movement.

Built for the Modern Threat Landscape

Six core capabilities powered by AI, eBPF, and the latest security research.

🔍

AI Vulnerability Scanner

Discovers CVEs across your stack. AI triages severity and suggests actionable fixes in seconds.

🧠

AI Threat Hunter

LLM-powered threat analysis. Correlates signals across logs, network, and endpoints in real time.

📡

eBPF Kernel Monitor

Real-time packet analysis and process monitoring without kernel modules. Zero overhead visibility.

📋

Compliance Engine

CERT-In, DPDPA, RBI, ISO 27001 templates. Automated evidence collection and audit trails.

🔬

arXiv Intelligence

Auto-extracts detection rules from the latest security research papers. Stay ahead of zero-days.

🚨

Incident Response

Automated containment, CERT-In report generation, and severity classification within minutes.

Built With Battle-Tested Technology

🦀

Rust

🐍

Python

🐝

eBPF

🤖

LLMs

📱

Flutter

🐘

PostgreSQL

🔴

Redis

🐳

Docker

The CyberForge Defense Chain

Six-stage defense pipeline — from detection to hardening. Continuous, automated, AI-powered.

🔎

Detect

Network/endpoint monitoring, anomaly detection, behavioral analysis

📊

Assess

Vulnerability scoring, risk prioritization, CVE correlation

🔔

Alert

Real-time notifications, SIEM integration, alert deduplication

🛡️

Contain

Auto-isolation, playbook execution, network segmentation

📋

Report

CERT-In 6-hour format, executive summary, CVSS scoring

🔒

Harden

Auto-patch recommendations, firewall rules, config hardening

Engineering Metrics — Live from CI/CD

Built for Production

0
Modules Shipped
across 4 sprints
0
Test Suites
integration + e2e
0
Cloud Providers
AWS / Azure / GCP
0
Compliance Frameworks
CERT-In, DPDPA, RBI, ISO
0
Kill Chain Phases
recon to lockdown
0
% Rust Core
memory safe

Shipped & Verified

What's Already Built

Every module below is implemented, tested, and integrated. Real Rust code, not vaporware.

Scan Orchestrator

Job queue + parallel execution

Shipped

Multi-tool scan orchestration with Nmap, Nuclei, ZAP integration. Parallel job execution with priority queuing.

CVE Database Sync

NVD API v2 + EPSS scoring

Shipped

Local CVE mirror with NVD v2 API, EPSS probability scoring, and automated patch correlation. Delta sync for efficiency.

PDF Report Generator

Pentest + executive reports

Shipped

Auto-generated pentest reports with CVSS scores, executive summaries, remediation timelines, and CERT-In format output.

Compliance Engine

CERT-In, DPDPA, RBI, ISO

Shipped

Automated evidence collection, audit trails, incident reporting in CERT-In prescribed format, and DPDPA consent tracking.

Subdomain Recon

Passive + active enumeration

Shipped

Certificate transparency logs, DNS brute-force, API-based passive recon. Deduplication and scope validation built-in.

Secret Scanner

API keys, tokens, PII

Shipped

Regex + entropy-based detection of leaked credentials in repos, configs, and environment files. Custom rule support.

HTMX Dashboard

Real-time scan status UI

Shipped

Server-rendered dashboard with live scan progress, finding tables, compliance scores, and engagement management.

Auth + RBAC

API keys + multi-user orgs

Shipped

API key authentication, multi-user support with role-based access control, organization-scoped data isolation.

AI Analysis Agent

Pluggable LLM, vuln triage

Shipped

Python AI agent bridge with pluggable LLM backends. Automated vulnerability prioritization, impact assessment, and fix suggestions.

AWS Scanner

IAM, S3, SG, CloudTrail

Shipped

IAM policy analysis, S3 bucket permissions, Security Group misconfigurations, CloudTrail anomaly detection.

Azure Scanner

Entra ID, NSG, Key Vault

Shipped

Entra ID (Azure AD) misconfiguration detection, NSG rule analysis, Key Vault access auditing, storage account exposure.

GCP Scanner

IAM, VPC, Cloud Armor

Shipped

GCP IAM binding analysis, VPC firewall rule auditing, Cloud Armor WAF configuration checks, service account key rotation.

arXiv Intelligence

IOC + TTP extraction

Shipped

Auto-monitors cs.CR papers, extracts IOCs and TTPs, generates Sigma/YARA/Nuclei detection rules from research findings.

SIEM Ingestion

Suricata + Zeek logs

Shipped

Suricata alert and Zeek connection log ingestion pipeline. Normalized event schema, correlation rules, and alert dedup.

eBPF Kernel Monitor

Zero-overhead visibility

Coming V2

Real-time packet analysis and process monitoring at kernel level. No kernel modules needed. Production-safe with zero overhead.

Scanner Integration Tests

Real output fixtures

Passed

End-to-end tests with real Nmap, Nuclei, ZAP output fixtures. Verifies parsing, correlation, and finding persistence.

CVE Enrichment Tests

NVD + EPSS pipeline

Passed

Validates CVE sync, EPSS scoring, patch correlation, and delta-diff logic against known vulnerability datasets.

Secrets Regression Suite

False positive testing

Passed

Comprehensive test corpus for API keys, tokens, passwords. False positive rate validation, custom rule testing, entropy thresholds.

Compliance Full Assessment

4 framework coverage

Passed

Tests all 4 compliance frameworks end-to-end: control mapping, evidence collection, gap analysis, and report generation.

Orchestrator E2E

Full workflow test

Passed

End-to-end scan orchestration: target intake, tool dispatch, result aggregation, finding persistence, report generation.

Auth + Report + AI Tests

3 integration suites

Passed

Authentication round-trip, PDF report generation validation, and AI agent IPC bridge testing with mock LLM backends.

Development Timeline

Roadmap & Release History

Real sprints from our CI/CD pipeline. Every milestone below is tracked, tested, and documented.

CF-MVP-001 Mar 18, 2026

Scanner Orchestrator + CLI

Core scanning engine, CVE database, vulnerability correlator, CLI interface, PDF reports, AI analysis agent, CERT-In module, subdomain recon, secret scanner, auth layer.

17 tasks done | P1 + P2 modules
CF-DEFENSE-002 Mar 18, 2026

Incident Response + SOAR Engine

Automated incident containment, playbook execution, network segmentation, alert correlation, and SOAR integration.

8 tasks done | Response automation
CF-CLOUD-001 Mar 18, 2026

Cloud Security + Detection Rules

AWS/Azure/GCP scanners, arXiv-to-detection-rule pipeline, HTMX dashboard, SIEM ingestion, ISO/SOC2 templates, multi-user RBAC.

8 tasks done | 3 cloud providers
CF-TEST-001 Mar 19, 2026

Integration Test Suite

8 integration test suites covering scanners, CVE enrichment, secrets, compliance, orchestrator E2E, auth, reports, and AI agent bridge.

8 suites passed | Full coverage
LW-CF-001 Upcoming

Beta Launch Readiness

cargo-dist packaging, self-update mechanism, landing page refresh, smoke tests, and GitHub Release with prebuilt binaries.

5 tasks planned | Public beta
CF-V2 Q3 2026

V2 — eBPF + Kernel Visibility

Native eBPF programs for kernel-level monitoring, real-time packet analysis, process tracing, and fileless malware detection.

In design | Kernel-level defense

System Architecture

CLI Layer cyberforge scan | report | cve | status
|
Scan Orchestrator Job Queue + Parallel Dispatch
|
Nmap
Nuclei
ZAP
Custom
|
CVE DB
TimescaleDB
SIEM Feed
|
PDF Reports
Compliance
Dashboard

Coming Soon

V2

eBPF Kernel Programs

Real-time packet + process monitoring at kernel level

V2

Social Engineering Toolkit

Phishing campaign management + credential harvesting

V3

Threat Intelligence Feed

Real-time IOC feed with STIX/TAXII integration

V3

SOAR Playbooks

Automated incident response with customizable playbooks

V3

Flutter Mobile App

SOC analyst companion — alerts, triage, response on mobile

India-First Compliance

Built for Indian regulatory requirements. Air-gappable for BFSI and defense deployments.

🏛️

CERT-In

Mandatory 6-hour incident reporting. Auto-generated reports in prescribed format.

🔒

DPDPA

Data Protection compliance. Consent management, data classification, breach notification.

🏦

RBI

Cybersecurity framework for BFSI. Audit trails, access controls, encryption standards.

🏅

ISO 27001

Information security management. 140+ controls mapped, evidence auto-collection.

Why CyberForge?

Enterprise-grade security without enterprise-grade bills. Purpose-built for India's regulatory landscape.

Feature CyberForge Legacy Tools
AI-Powered Triage ✓ Built-in Add-on / None
CERT-In Reporting ✓ Auto-generated Manual / None
Air-Gap Deployment ✓ Full offline Cloud-only
eBPF Kernel Visibility ✓ Native Agent-based
Pricing (Mid-Market) ₹4,999/mo $5,000+/mo

See It In Action

Watch CyberForge scan a target in real time. AI-powered vulnerability detection and compliance reporting.

cyberforge — live scan
root@cyberforge:~$ cyberforge scan --target demo.example.com --profile full

10x Cheaper Than Legacy Solutions

Enterprise-grade security at Indian mid-market pricing. No per-agent, per-endpoint surprise bills.

Free

₹0

Core scanning and basic compliance reports

  • Vulnerability scanning
  • Basic compliance reports
  • CERT-In report templates
  • Community support
Start Free
RECOMMENDED

Pro

₹4,999 /mo

Full compliance, SIEM, priority support

  • Everything in Free
  • Advanced AI threat models
  • Full compliance (DPDPA, RBI, ISO)
  • SIEM integration
  • Priority support & SLA
Get Early Access

Enterprise

Contact Sales

Custom deployment, SLA, dedicated support

  • Everything in Pro
  • Air-gapped deployment
  • Custom integrations
  • Dedicated security engineer
  • 99.9% uptime SLA
Contact Sales

Get Early Access

Be among the first to deploy CyberForge. Limited beta slots available.

Auto-verified — Form submission works. We'll respond within 48 hours. Try it yourself!

Interested? Get in Touch

Tell us what you'd like to build or how you'd like to help.

Message Sent

All Systems Operational | Last verified: | Typical response: 48 hours | Contact Support