Anti-forensic macOS tray application designed to safeguard your system by monitoring USB ports.
-
Updated
Feb 10, 2025 - Python
Anti-forensic macOS tray application designed to safeguard your system by monitoring USB ports.
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
Curated collection of cybersecurity tools featured in Black Hat Arsenal events.
Incident Response (IR) tool to create a list of USB-Rubber-Ducky instructions.
RevEng.AI Toolkit and Python API
IP-Abuse Reporting System & IP/Network/ASN Risk-Databases
Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities
A scapy based module for programming offensive and defensive networking tools easier than before.
🕵️ IDS with accuracy rates of 94.4% for misuse detection and 99.0% for anomaly detection
Python-based keylogger for ethical use, capturing keystrokes and emailing logs. Features include retry logic for email delivery, log file management, and cross-platform support (Windows/Linux). Configurable for auto-start via systemd or Startup folder. Designed for educational purposes, penetration testing with consent, and self-monitoring.
A hands-on security lab demonstrating how weak authentication code can be exploited and how to harden it. Includes a vulnerable Flask login page and an attacker script to simulate brute-force credential stuffing. Learn common auth flaws, defensive coding practices, and concrete steps to secure real-world apps.
DEPRECATED: Tool for checking data leaks of social media platforms
DeauthNet is a versatile software designed to perform de-authentication attacks across multiple and configurable frequency bands (the default ones are 2.4 & 5 GHz). It also provides capabilities to detect and block ongoing attacks, offering comprehensive solutions to safeguard Wi-Fi networks against the de-authentication threats.
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
The Tor Network Toolkit (TNT) is a multi-OS demonstration framework that showcases how to interact with the Tor network programmatically and how to run local packet-crafting operations using Scapy. Tor traffic and Scapy traffic remain strictly separated, as raw ICMP and TCP packets cannot be routed through Tor.
Yet another SoC Lab
A minimal, modular MCP server that equips your AI with practical capabilities for real-world threat hunting workflows.
A step-by-step Python learning path for cybersecurity, guiding beginners through secure software development, automation, logging, integrity checks, and a final capstone project, aligned with the NICE Cybersecurity Workforce Framework.
Comprehensive reverse engineering analysis of Akira ransomware: cryptography, threading architecture, vulnerabilities (CVSS 9.1), IOCs, and detection strategies
Defensive secret scanner for Git repositories. Prevent tokens, keys, and passwords from being committed.
Add a description, image, and links to the defensive-security topic page so that developers can more easily learn about it.
To associate your repository with the defensive-security topic, visit your repo's landing page and select "manage topics."