shantoroy / intro-2-cybersecurity-in-pythonLinks
This is a repository containing Python code examples for educational purposes in the field of cybersecurity. The code covers topics such as malware, security strategies, and more. It is a useful resource for those interested in learning about the technical aspects of cybersecurity.
☆70Updated 4 months ago
Alternatives and similar repositories for intro-2-cybersecurity-in-python
Users that are interested in intro-2-cybersecurity-in-python are comparing it to the libraries listed below
Sorting:
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆172Updated 4 years ago
- Community driven computer worm☆67Updated 2 years ago
- Popular Malware-Samples for research and educational purposes.(60+ Samples!)☆44Updated 3 years ago
- A collection of malwares found on the internet.☆63Updated 2 years ago
- Exploit toolkit☆59Updated 4 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆54Updated 2 years ago
- Remote Administration tool for Windows Systems written in pure Python☆131Updated last year
- Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots a…☆61Updated 6 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆53Updated last year
- More Advanced and Powerful Scripts made for pen-testing. Here there are Vulnerability Scanners, ARP-Poisoners, Botnets, Phishing Scripts,…☆60Updated 2 years ago
- Advanced Keylogger in Python with screenshot, microphone, webcam pictures taking capabilities and also Collects Network/Wifi Info, System…☆131Updated 3 years ago
- Simple Ransomware using Python PyQt5 and Cryptography libraries. You can make the design you want using the design files.☆13Updated 3 years ago
- USB Ransomware, will encrypt SOME files and steal some, you can change what it steals... once its done, just unplug it from the PC u plug…☆32Updated last year
- Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||☆88Updated 7 months ago
- Gathers network information, then simultaniously logs keys, takes screenshots, takes webcam pictures, and records mic.☆25Updated 2 years ago
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆104Updated 3 years ago
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Database☆97Updated 10 months ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆89Updated 2 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆124Updated 4 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆263Updated 4 years ago
- There are many powerful viruses 💀 that can damage your PC in a matter of seconds. Batch file virus to gain full access to another comput…☆41Updated 4 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆163Updated 2 months ago
- (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer rand…☆53Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆19Updated 3 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆35Updated 3 years ago
- Fud Crypter & Downloader☆22Updated last year
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆174Updated last year
- Dogma V1.5.3☆31Updated 5 years ago
- It is an automated phishing tool that includes more than 30 phishing templates.☆86Updated 9 months ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆41Updated 4 years ago