This is a repository containing Python code examples for educational purposes in the field of cybersecurity. The code covers topics such as malware, security strategies, and more. It is a useful resource for those interested in learning about the technical aspects of cybersecurity.
☆80Mar 18, 2025Updated last year
Alternatives and similar repositories for intro-2-cybersecurity-in-python
Users that are interested in intro-2-cybersecurity-in-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a folder with 69 files, and this is a 34 GDI effects(1 file is CMakeList.txt), 34 - compiled files, 34 source code files. Thanks …☆11Mar 10, 2024Updated 2 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Jul 6, 2017Updated 8 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆48Mar 20, 2026Updated last week
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- A poc to demonstrate how ransomware can spread to enterprise apps through libraries☆11Mar 28, 2018Updated 7 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- A python trojan with spyware, info stealing and ransomware abilities.☆34Sep 12, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- My personalized Hosts file collection of various sources, cleaned and optimized specially for pDNSf☆31Updated this week
- Ro3b - Advance Banking HTTP Botnet☆50Jun 12, 2023Updated 2 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Camera Hack bot - Powered by XPH4N70M☆25May 26, 2023Updated 2 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!☆33Jan 10, 2021Updated 5 years ago
- C++ GDI Malware (no skid). I'm not responsible for any damages☆12Oct 9, 2022Updated 3 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 11 months ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆20Apr 14, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆22Nov 12, 2016Updated 9 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- Keep It Secure Private Data Encryption & Decryption Tool☆46Mar 11, 2018Updated 8 years ago
- Vaccinating against WannaCry ransomware: a free tool by Minerva's research team☆24May 15, 2017Updated 8 years ago
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 作者为360MEMZ自制的无害特效程序☆16Aug 26, 2020Updated 5 years ago
- POC for automating the deployment of a fleet of AWS spot instance siacoin and monero cryptocurrency miners.☆18Feb 12, 2018Updated 8 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- GDI malware made by Itzsten, for educational purposes only☆13Jul 20, 2025Updated 8 months ago
- Another yet easy to use editor for rich text editing and formatting, extended from HTML.☆11Feb 4, 2018Updated 8 years ago
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- ☆17Aug 18, 2022Updated 3 years ago