Security hardening and vulnerability assessment tools. Ethical security testing framework for system protection.
This repository contains security research tools and templates for:
- Vulnerability assessment
- Security hardening
- Penetration testing (authorized only)
- Security research and education
- CTF competitions
Pre-built security testing templates from the Nuclei project:
- CVE detection templates
- Misconfiguration checks
- Vulnerability patterns
- Security scanning rules
Note: These are test patterns for vulnerability scanning, not real exploits or malware.
These tools must ONLY be used for:
- ✅ Authorized penetration testing engagements
- ✅ Security research on systems you own
- ✅ CTF (Capture The Flag) competitions
- ✅ Educational purposes in controlled environments
- ✅ Defensive security and hardening
You may NOT use these tools for:
- ❌ Unauthorized access to systems
- ❌ Malicious attacks
- ❌ DoS (Denial of Service) attacks
- ❌ Mass scanning without permission
- ❌ Any illegal activities
- Basic understanding of security concepts
- Authorization to test target systems
- Responsible disclosure practices
- Ethical hacking principles
# Clone repository
git clone <repository-url>
cd 19-Security_Research
# Install nuclei (if using nuclei templates)
go install -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest# Scan a single target (authorized only)
nuclei -u https://example.com -t nuclei-templates/
# Scan with specific templates
nuclei -u https://example.com -t nuclei-templates/cves/
# Generate report
nuclei -u https://example.com -t nuclei-templates/ -o report.txtIf you discover vulnerabilities using these tools:
- Do not disclose publicly until vendor has patched
- Report to vendor's security team
- Allow reasonable time for patch (typically 90 days)
- Follow coordinated disclosure practices
For questions about proper usage or security research:
- Email: daniel@batesai.org
- Website: https://batesai.org
See LICENSE file for details.
Disclaimer: The author is not responsible for misuse of these tools. Always obtain proper authorization before testing any systems.
Last Updated: January 2025