Skip to content
#

defensive-security

Here are 74 public repositories matching this topic...

Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.

  • Updated Jan 27, 2025
  • Python

Python-based keylogger for ethical use, capturing keystrokes and emailing logs. Features include retry logic for email delivery, log file management, and cross-platform support (Windows/Linux). Configurable for auto-start via systemd or Startup folder. Designed for educational purposes, penetration testing with consent, and self-monitoring.

  • Updated May 25, 2025
  • Python

A hands-on security lab demonstrating how weak authentication code can be exploited and how to harden it. Includes a vulnerable Flask login page and an attacker script to simulate brute-force credential stuffing. Learn common auth flaws, defensive coding practices, and concrete steps to secure real-world apps.

  • Updated Oct 1, 2025
  • Python

DeauthNet is a versatile software designed to perform de-authentication attacks across multiple and configurable frequency bands (the default ones are 2.4 & 5 GHz). It also provides capabilities to detect and block ongoing attacks, offering comprehensive solutions to safeguard Wi-Fi networks against the de-authentication threats.

  • Updated Jul 14, 2024
  • Python

The Tor Network Toolkit (TNT) is a multi-OS demonstration framework that showcases how to interact with the Tor network programmatically and how to run local packet-crafting operations using Scapy. Tor traffic and Scapy traffic remain strictly separated, as raw ICMP and TCP packets cannot be routed through Tor.

  • Updated Dec 7, 2025
  • Python

A step-by-step Python learning path for cybersecurity, guiding beginners through secure software development, automation, logging, integrity checks, and a final capstone project, aligned with the NICE Cybersecurity Workforce Framework.

  • Updated Jan 12, 2026
  • Python

Improve this page

Add a description, image, and links to the defensive-security topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the defensive-security topic, visit your repo's landing page and select "manage topics."

Learn more