cyberattack

There are 49 repositories under cyberattack topic.

  • MayankFawkes/Python-Botnet

    This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.

    Language:Python253101962
  • Anish-M-code/URL-obfuscator

    Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.

    Language:Python1707040
  • qeeqbox/raven

    Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)

    Language:JavaScript16210945
  • evyatar9/Writeups

    This repository contains writeups for various CTFs I've participated in (Including Hack The Box).

    Language:HTML1468313
  • mytechnotalent/turbo-attack

    A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.

    Language:Go1355027
  • romainmarcoux/malicious-ip

    Aggregation of lists of malicious IP addresses, to be blocked in the WAN > LAN direction, integrated into firewalls: FortiGate, Palo Alto, pfSense, IPtables

  • antoinedelplace/Cyberattack-Detection

    Cyber Attack Detection thanks to Machine Learning Algorithms

    Language:Python975649
  • Laiteux/Milky

    A .NET Standard library for pentesting web apps against credential stuffing attacks.

    Language:C#5991415
  • paulveillard/cybersecurity-malware-analysis

    A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.

  • paulveillard/cybersecurity-threat-intelligence

    An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.

  • SentryPeerHQ

    SentryPeer/SentryPeerHQ

    Fraud Detection for VoIP. Use SentryPeer® HQ to help prevent VoIP cyberattacks and fraudulent VoIP phone calls (toll fraud) at https://sentrypeer.com

    Language:Elixir20211
  • leoisrael/Ghost_Dir

    Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.

    Language:JavaScript15331
  • Mr-Pstar7/ZeroDoS

    Best Tools For DoS

    Language:C++14100
  • eightus/Cyder

    Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database

    Language:Python12105
  • paulveillard/cybersecurity-python-security

    An ongoing collection of Python language tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.

  • paulveillard/cybersecurity-tools

    A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.

  • cyber-kill-chain

    qeeqbox/cyber-kill-chain

    Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks

  • Ransomware-samples

    aktechnohacker/Ransomware-samples

    Small collection of Ransomwares.

  • enriquetomasmb/bci

    Framework for P300 wave detection and noise-based cyberattacks in Brain-Computer Interfaces - Enrique Tomás Martínez Beltrán

    Language:Jupyter Notebook6302
  • nicholasmarasco95/SafetyBackupSystem

    Safety Backup System is a project complete of Client, Server and Remote Access software, developed to improve security of users. It's extremely useful to prevent data loss in case of cyberattack or hardware malfunction. SBS can backup computer files and send them to a remote server or store them in an external device.

    Language:Java5102
  • SentryPeer/SentryPeer-FreePBX-Module

    This module queries the SentryPeer Phone Number API when making outbound calls from your FreePBX system to help prevent VoIP cyberattacks, fraudulent VoIP phone calls (toll fraud) and improve cybersecurity by detecting early stage reconnaissance attempts.

    Language:PHP5200
  • Thelin90/CyberAttacks

    Relational Graph Visualization with (React-D3 - Python Flask - OrientDB (NoSQL))

    Language:JavaScript4202
  • uamughal/Stealthy-False-Data-Injection-Attack

    This repository contains the code for paper, "Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge"

    Language:Python4100
  • Heewon-Hailey/cyberattack-analysis

    implement of ML-based anomaly detection models to identify cyberattacks from NetFlow data

    Language:Jupyter Notebook3300
  • kh4sh3i/cyber-attacks-in-iran

    A curated list of awesome cyber attacks in iran, we want to review and explain some advanced attack that happened in iran, in order to learned some security tips.

  • Loai-Houmane/QR-Code-Malware-Detection

    🛡️ This project aims to detect malware embedded within QR codes, assisting law enforcement in scanning public QR codes, such as those found in subways and other public areas. 🏙️ It enhances public safety by identifying potentially malicious QR codes before they can cause harm. 🚨

    Language:C++2101
  • paulveillard/cybersecurity-cyberloss

    An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Loss in Cybersecurity.

  • uamughal/Machine-Learning-Based-Intrusion-Detection-System

    This repository contains the code for paper, ''Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles"

    Language:Python2220
  • abc744587/Network-Anomaly-Detection-With-Temporal-Convolutional-Network-and-U-Net-Model

    This is code reproduced according to the description in the paper "Network Anomaly Detection With Temporal Convolutional Network and U-Net Model".

    Language:Python1201
  • alvin-tosh/MORAN-Blog

    sort of a back up for MORAN blog for now

    Language:HTML120
  • kowshik14/attention-LSTM-multi-step-cyber-attack-detection

    Developed an attention-based RNN model with LSTM and Attention layers for detecting multi-step cyber-attacks. Leveraged Particle Swarm Optimization (PSO) for feature reduction, achieving a 72.73% decrease in features, 3x faster processing, and over 1% accuracy improvement. Outperformed traditional classifiers in key metrics for intrusion detection.

    Language:Jupyter Notebook1
  • Rc-W024/CyberAttk-SP

    🛡 A brief introduction and theoretical research of computer virus weapons, and the simulation of its basic framework and functions.

    Language:MATLAB1200
  • tianyi17/simulations_IV24

    Simulate mixed traffic on a ring road to analyze interactions between human-driven and ACC-equipped vehicles under various conditions, including disruptions.

    Language:Jupyter Notebook1101
  • Magarevedant/Pandora

    Language:Python10