shantoroy / intro-2-cybersecurity-in-python
This is a repository containing Python code examples for educational purposes in the field of cybersecurity. The code covers topics such as malware, security strategies, and more. It is a useful resource for those interested in learning about the technical aspects of cybersecurity.
☆66Updated last year
Related projects ⓘ
Alternatives and complementary repositories for intro-2-cybersecurity-in-python
- "Essential Kali Linux commands for ethical hackers and penetration testers."☆55Updated last year
- Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots a…☆58Updated 5 years ago
- Remote Administration tool for Windows Systems written in pure Python☆123Updated 3 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆43Updated 5 months ago
- fsociety is a penetration toolkit inspired from MR. ROBOT☆57Updated 7 months ago
- Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||☆81Updated 4 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆52Updated last year
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆50Updated 11 months ago
- GUI based tool to track location and more info of mobile numbers☆63Updated last year
- More Advanced and Powerful Scripts made for pen-testing. Here there are Vulnerability Scanners, ARP-Poisoners, Botnets, Phishing Scripts,…☆56Updated last year
- Dogma V1.5.3☆28Updated 4 years ago
- A tool to brute force a gmail account. Use this tool to crack multiple accounts. This tool is developed to crack multiple accounts☆96Updated last week
- Rogue access point tool.☆59Updated 2 years ago
- WormGPT is a malicious AI tool promoted on the dark web as the adversary of ChatGPT. It automates the creation of convincing personalized…☆122Updated 3 months ago
- Community driven computer worm☆58Updated 2 years ago
- Advance mitm attack using fake access point☆129Updated last year
- Personal version of tools from Black Hat Python☆32Updated 2 years ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆80Updated 2 years ago
- QRLJacking A New Form of qr code phishing☆79Updated this week
- python projects for ethical hacking and the students to learn python for cyper security (<_>)☆68Updated last year
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆153Updated 3 years ago
- Hacking every email by use script Mr.Robot☆46Updated 6 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆110Updated 2 weeks ago
- Simple script masks the phishing link under the normal URL☆76Updated 3 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆44Updated 5 years ago
- This package implements a complete SpyWare.☆80Updated this week
- Python written hacking tool 🐉☆92Updated 8 months ago
- An Android app which attempts to prevent you from using your device without becoming the administrator.☆61Updated last year
- A social engineering toolkit for performing smishing, and other sms attacks☆70Updated 4 months ago