This is a repository containing Python code examples for educational purposes in the field of cybersecurity. The code covers topics such as malware, security strategies, and more. It is a useful resource for those interested in learning about the technical aspects of cybersecurity.
☆80Mar 18, 2025Updated last year
Alternatives and similar repositories for intro-2-cybersecurity-in-python
Users that are interested in intro-2-cybersecurity-in-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a folder with 69 files, and this is a 34 GDI effects(1 file is CMakeList.txt), 34 - compiled files, 34 source code files. Thanks …☆11Mar 10, 2024Updated 2 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆50Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 4 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 4 months ago
- some python3 functions to add spreading features to any python backdoor☆56Jan 22, 2017Updated 9 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 7 months ago
- The Ranflood ransomware contrast tool☆18Dec 18, 2024Updated last year
- Ro3b - Advance Banking HTTP Botnet☆49Jun 12, 2023Updated 2 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Virus Package ( For Educational Purposes )☆37Aug 2, 2021Updated 4 years ago
- Camera Hack bot - Powered by XPH4N70M☆27May 26, 2023Updated 2 years ago
- Python Virus!☆10Mar 16, 2023Updated 3 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Apr 14, 2022Updated 4 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆22Nov 12, 2016Updated 9 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- A Windows Logon / Startup / Scheduled Task Script for Ransomware Detection & Early-Warning☆38Nov 18, 2019Updated 6 years ago
- Keep It Secure Private Data Encryption & Decryption Tool☆46Mar 11, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆17Jun 7, 2024Updated last year
- 作者为360MEMZ自制的无害特效程序☆16Aug 26, 2020Updated 5 years ago
- NapierOne. A Publicly Available Modern Mixed File Data Set. The data set is suitable for a variety of testing scenarios such as Ransomwar…☆23Jan 25, 2022Updated 4 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 4 years ago
- POC for automating the deployment of a fleet of AWS spot instance siacoin and monero cryptocurrency miners.☆18Feb 12, 2018Updated 8 years ago
- Source code of the Rensenware ransomware in .NET☆20Jul 24, 2021Updated 4 years ago
- GDI malware made by Itzsten, for educational purposes only☆13Jul 20, 2025Updated 8 months ago