shantoroy / intro-2-cybersecurity-in-pythonLinks
This is a repository containing Python code examples for educational purposes in the field of cybersecurity. The code covers topics such as malware, security strategies, and more. It is a useful resource for those interested in learning about the technical aspects of cybersecurity.
☆72Updated 4 months ago
Alternatives and similar repositories for intro-2-cybersecurity-in-python
Users that are interested in intro-2-cybersecurity-in-python are comparing it to the libraries listed below
Sorting:
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆41Updated 4 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆54Updated 2 years ago
- Python-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots a…☆60Updated 6 years ago
- Dogma V1.5.3☆29Updated 5 years ago
- Community driven computer worm☆68Updated 2 years ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆171Updated 4 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆126Updated last month
- Python script to automatically steal all the files and information from a computer using an USB device. Created just for educational purp…☆44Updated 2 months ago
- Popular Malware-Samples for research and educational purposes.(60+ Samples!)☆42Updated 3 years ago
- Python Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||☆87Updated 6 months ago
- Exploit toolkit☆57Updated 3 years ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆170Updated last year
- Remote Administration tool for Windows Systems written in pure Python☆131Updated 11 months ago
- More Advanced and Powerful Scripts made for pen-testing. Here there are Vulnerability Scanners, ARP-Poisoners, Botnets, Phishing Scripts,…☆59Updated 2 years ago
- Hatch is a brute force tool that is used to brute force most websites☆85Updated last year
- GUI based tool to track location and more info of mobile numbers☆75Updated last year
- An Advanced Tool to Crack Any Password Protected ZIP File With different Techniques. A very Beginner Friendly Script For Newbies.☆106Updated last year
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆17Updated 3 years ago
- USB Ransomware, will encrypt SOME files and steal some, you can change what it steals... once its done, just unplug it from the PC u plug…☆33Updated last year
- linux based ransomware builder tool that can create a fully offline windows ransomware executable.☆26Updated 3 months ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆53Updated last year
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Database☆97Updated 9 months ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆88Updated 2 years ago
- Rogue access point tool.☆59Updated 3 years ago
- A automated monero mining (injector) scripts which mines monero for you in targeted system☆66Updated 11 months ago
- It is an automated phishing tool that includes more than 30 phishing templates.☆85Updated 8 months ago
- Personal version of tools from Black Hat Python☆35Updated 3 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆19Updated 3 years ago
- Here are some of the most important cyber security tools.☆43Updated 2 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆48Updated 2 years ago