This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
-
Updated
Oct 8, 2022 - Python
This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
Aggregation of lists of malicious IP addresses, to be blocked in the WAN > LAN direction, integrated into firewalls: FortiGate, Palo Alto, pfSense, IPtables
Cyber Attack Detection thanks to Machine Learning Algorithms
A .NET Standard library for pentesting web apps against credential stuffing attacks.
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Fraud Detection for VoIP. Use SentryPeer® HQ to help prevent VoIP cyberattacks and fraudulent VoIP phone calls (toll fraud) at https://sentrypeer.com
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Best Tools For DoS
An ongoing collection of Python language tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.
Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.
Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks
Small collection of Ransomwares.
Framework for P300 wave detection and noise-based cyberattacks in Brain-Computer Interfaces - Enrique Tomás Martínez Beltrán
Safety Backup System is a project complete of Client, Server and Remote Access software, developed to improve security of users. It's extremely useful to prevent data loss in case of cyberattack or hardware malfunction. SBS can backup computer files and send them to a remote server or store them in an external device.
Add a description, image, and links to the cyberattack topic page so that developers can more easily learn about it.
To associate your repository with the cyberattack topic, visit your repo's landing page and select "manage topics."