cyberattack
There are 49 repositories under cyberattack topic.
MayankFawkes/Python-Botnet
This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
Anish-M-code/URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
qeeqbox/raven
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
evyatar9/Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
mytechnotalent/turbo-attack
A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
romainmarcoux/malicious-ip
Aggregation of lists of malicious IP addresses, to be blocked in the WAN > LAN direction, integrated into firewalls: FortiGate, Palo Alto, pfSense, IPtables
antoinedelplace/Cyberattack-Detection
Cyber Attack Detection thanks to Machine Learning Algorithms
Laiteux/Milky
A .NET Standard library for pentesting web apps against credential stuffing attacks.
paulveillard/cybersecurity-malware-analysis
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
paulveillard/cybersecurity-threat-intelligence
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
SentryPeer/SentryPeerHQ
Fraud Detection for VoIP. Use SentryPeer® HQ to help prevent VoIP cyberattacks and fraudulent VoIP phone calls (toll fraud) at https://sentrypeer.com
leoisrael/Ghost_Dir
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Mr-Pstar7/ZeroDoS
Best Tools For DoS
eightus/Cyder
Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
paulveillard/cybersecurity-python-security
An ongoing collection of Python language tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.
paulveillard/cybersecurity-tools
A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.
qeeqbox/cyber-kill-chain
Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks
aktechnohacker/Ransomware-samples
Small collection of Ransomwares.
enriquetomasmb/bci
Framework for P300 wave detection and noise-based cyberattacks in Brain-Computer Interfaces - Enrique Tomás Martínez Beltrán
nicholasmarasco95/SafetyBackupSystem
Safety Backup System is a project complete of Client, Server and Remote Access software, developed to improve security of users. It's extremely useful to prevent data loss in case of cyberattack or hardware malfunction. SBS can backup computer files and send them to a remote server or store them in an external device.
SentryPeer/SentryPeer-FreePBX-Module
This module queries the SentryPeer Phone Number API when making outbound calls from your FreePBX system to help prevent VoIP cyberattacks, fraudulent VoIP phone calls (toll fraud) and improve cybersecurity by detecting early stage reconnaissance attempts.
Thelin90/CyberAttacks
Relational Graph Visualization with (React-D3 - Python Flask - OrientDB (NoSQL))
uamughal/Stealthy-False-Data-Injection-Attack
This repository contains the code for paper, "Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge"
Heewon-Hailey/cyberattack-analysis
implement of ML-based anomaly detection models to identify cyberattacks from NetFlow data
kh4sh3i/cyber-attacks-in-iran
A curated list of awesome cyber attacks in iran, we want to review and explain some advanced attack that happened in iran, in order to learned some security tips.
Loai-Houmane/QR-Code-Malware-Detection
🛡️ This project aims to detect malware embedded within QR codes, assisting law enforcement in scanning public QR codes, such as those found in subways and other public areas. 🏙️ It enhances public safety by identifying potentially malicious QR codes before they can cause harm. 🚨
paulveillard/cybersecurity-cyberloss
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Loss in Cybersecurity.
uamughal/Machine-Learning-Based-Intrusion-Detection-System
This repository contains the code for paper, ''Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles"
abc744587/Network-Anomaly-Detection-With-Temporal-Convolutional-Network-and-U-Net-Model
This is code reproduced according to the description in the paper "Network Anomaly Detection With Temporal Convolutional Network and U-Net Model".
alvin-tosh/MORAN-Blog
sort of a back up for MORAN blog for now
kowshik14/attention-LSTM-multi-step-cyber-attack-detection
Developed an attention-based RNN model with LSTM and Attention layers for detecting multi-step cyber-attacks. Leveraged Particle Swarm Optimization (PSO) for feature reduction, achieving a 72.73% decrease in features, 3x faster processing, and over 1% accuracy improvement. Outperformed traditional classifiers in key metrics for intrusion detection.
Rc-W024/CyberAttk-SP
🛡 A brief introduction and theoretical research of computer virus weapons, and the simulation of its basic framework and functions.
tianyi17/simulations_IV24
Simulate mixed traffic on a ring road to analyze interactions between human-driven and ACC-equipped vehicles under various conditions, including disruptions.
txuswashere/Cyber-Attacks-Mitigation
Cyber Attacks Mitigation