An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: cyberattack

romainmarcoux/malicious-ip

Aggregation of lists of malicious IP addresses, to be blocked in the WAN > LAN direction, integrated into firewalls: FortiGate, Palo Alto, pfSense, IPtables

Size: 8.88 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 149 - Forks: 6

SentryPeer/SentryPeerHQ

Fraud Detection for VoIP. Use SentryPeer® HQ to help prevent VoIP cyberattacks and fraudulent VoIP phone calls (toll fraud) at https://sentrypeer.com

Language: Elixir - Size: 4.45 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 23 - Forks: 1

JPablo13/Introductory-Course-to-Cybersecurity

Size: 2.79 MB - Last synced at: 12 days ago - Pushed at: 12 days ago - Stars: 1 - Forks: 0

johnmomajr/cybersecurity-projects

This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.

Language: Jupyter Notebook - Size: 1.95 KB - Last synced at: 12 days ago - Pushed at: 12 days ago - Stars: 0 - Forks: 0

Anish-M-code/URL-obfuscator

Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.

Language: Python - Size: 1.57 MB - Last synced at: 13 days ago - Pushed at: 14 days ago - Stars: 181 - Forks: 37

MrCabss69/Sandworm-Spain-04-2025

Public data-driven investigation of the 28-04-2025 Iberian Blackout using REE, IODA & Downdetector data.

Language: Jupyter Notebook - Size: 4.16 MB - Last synced at: 15 days ago - Pushed at: 15 days ago - Stars: 0 - Forks: 0

MNK-hub/d4t4r34p3r

In 2025, the cybersecurity landscape was rocked by a real and unprecedented event. A solo hacker, known as d4t4r34p3r, compromised approximately 19,248 websites in just two days. This wasn’t a fictional tale—it was a significant incident that unfolded in cyberspace, exposing vulnerabilities and sparking widespread discussion.

Size: 0 Bytes - Last synced at: about 1 month ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

karami-mehdi/CyberattackDetection

This project focuses on detecting cyberattacks using advanced analytical techniques and a deep learning model. It leverages structured datasets and explores the use of algorithms for detecting anomalies or malicious behavior in network traffic or system logs.

Language: Jupyter Notebook - Size: 405 KB - Last synced at: about 1 month ago - Pushed at: 3 months ago - Stars: 8 - Forks: 0

paulveillard/cybersecurity-malware-analysis

A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.

Size: 339 KB - Last synced at: about 2 months ago - Pushed at: about 2 years ago - Stars: 46 - Forks: 9

paulveillard/cybersecurity-threat-intelligence

An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.

Size: 514 KB - Last synced at: about 2 months ago - Pushed at: over 2 years ago - Stars: 44 - Forks: 16

Laiteux/Milky 📦

A .NET Standard library for pentesting web apps against credential stuffing attacks.

Language: C# - Size: 499 KB - Last synced at: 3 days ago - Pushed at: over 3 years ago - Stars: 58 - Forks: 15

mytechnotalent/turbo-attack

A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.

Language: Go - Size: 12.4 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 135 - Forks: 28

qeeqbox/cyber-kill-chain

Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks

Size: 117 KB - Last synced at: 2 months ago - Pushed at: over 1 year ago - Stars: 10 - Forks: 4

tanishq-ctrl/Cyberattack-Analysis-and-Insights

This repository contains an in-depth analysis of a cybersecurity dataset. The primary goal is to identify patterns, vulnerabilities, and trends in cyberattacks by leveraging various visualizations and statistical insights. The project provides actionable insights for enhancing cybersecurity measures.

Language: Jupyter Notebook - Size: 11.8 MB - Last synced at: about 2 months ago - Pushed at: 5 months ago - Stars: 8 - Forks: 0

qeeqbox/raven

Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)

Language: JavaScript - Size: 24.7 MB - Last synced at: about 2 months ago - Pushed at: almost 2 years ago - Stars: 183 - Forks: 47

evyatar9/Writeups

This repository contains writeups for various CTFs I've participated in (Including Hack The Box).

Language: HTML - Size: 285 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 148 - Forks: 13

cyasar34/NETWORK-ATTACK-SIMULATION-WANNACRY-RANSOMWARE-ATTACK

AĞ SALDIRI SİMÜLASYONU: WANNACRY RANSOMWARE ATTACK

Size: 552 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

cyasar34/KEYLOGGER-ATTACK-SCENARIO-AND-SECURITY-MEASURES

KEYLOGGER SALDIRI SENARYOSU VE GÜVENLİK ÖNLEMLERİ

Size: 1.12 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

paulveillard/cybersecurity-python-security

An ongoing collection of Python language tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.

Size: 18.6 KB - Last synced at: about 1 month ago - Pushed at: over 3 years ago - Stars: 13 - Forks: 4

paulveillard/cybersecurity-tools

A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.

Size: 89.8 KB - Last synced at: about 2 months ago - Pushed at: about 1 year ago - Stars: 12 - Forks: 3

txuswashere/Cyber-Attacks-Mitigation

Cyber Attacks Mitigation

Size: 27.3 KB - Last synced at: about 2 months ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

CSCRC-SCREED/QUT-ZSS-2023-SV

The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.

Language: Python - Size: 347 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

paulveillard/cybersecurity-cyberloss

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Loss in Cybersecurity.

Size: 8.79 KB - Last synced at: about 2 months ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 0

DanielVandH/ALTS

Robust regression for electricity demand forecasting against cyberattacks

Language: R - Size: 4.18 MB - Last synced at: about 2 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 1

Magarevedant/Pandora

Language: Python - Size: 20.5 KB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

Loai-Houmane/QR-Code-Malware-Detection

🛡️ This project aims to detect malware embedded within QR codes, assisting law enforcement in scanning public QR codes, such as those found in subways and other public areas. 🏙️ It enhances public safety by identifying potentially malicious QR codes before they can cause harm. 🚨

Language: C++ - Size: 14.4 MB - Last synced at: 9 months ago - Pushed at: 10 months ago - Stars: 2 - Forks: 1

iker-gonzalez/darkly

This project focuses on penetration testing of web pages to identify and exploit common vulnerabilities.

Language: Python - Size: 2.12 MB - Last synced at: 2 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

henrywoody/cyber-attacks

Exploring cyber attacks

Language: Go - Size: 7.81 KB - Last synced at: about 2 years ago - Pushed at: almost 5 years ago - Stars: 0 - Forks: 0

Mr-Pstar7/ZeroDoS

Best Tools For DoS

Language: C++ - Size: 31.3 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 5 - Forks: 0

CSCRC-SCREED/QUT-ZSS-2023-GOOSE

The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.

Language: Python - Size: 376 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

ECCENTRIX-CA/SQL-Injection-Attack-Understanding-the-Threat-in-Cybersecurity

This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.

Size: 2.93 KB - Last synced at: 3 months ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

Aryan-Parashar/InsightMonitor

InsightMonitor is a comprehensive system monitoring solution designed to provide real-time insights into various aspects of system performance and resource utilization. It works by deploying lightweight agents on monitored systems to continuously collect data on key metrics such as CPU usage, memory utilization, disk activity, and network traffic.

Language: Python - Size: 15.6 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

Rc-W024/CyberAttk-SP

🛡 A brief introduction and theoretical research of computer virus weapons, and the simulation of its basic framework and functions.

Language: MATLAB - Size: 60.5 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

luiz-linkezio/Tarefas-Deteccao_de_Intrusao-EC-CIn-UFPE-2023.2

Tarefas com o uso de inteligência artificial para detecção de anomalias e ataques adversariais, fazer testes de modelos, hiperparâmetros e produzir relatórios. Tarefas da cadeira de Detecção de Intrusão do curso de Engenharia da Computação (EC) do CIn da UFPE, cadeira cursada por mim de 2023 a 2024.

Language: Jupyter Notebook - Size: 11.9 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

enriquetomasmb/bci

Framework for P300 wave detection and noise-based cyberattacks in Brain-Computer Interfaces - Enrique Tomás Martínez Beltrán

Language: Jupyter Notebook - Size: 117 MB - Last synced at: 9 months ago - Pushed at: over 3 years ago - Stars: 6 - Forks: 2

SentryPeer/SentryPeer-FreePBX-Module

This module queries the SentryPeer Phone Number API when making outbound calls from your FreePBX system to help prevent VoIP cyberattacks, fraudulent VoIP phone calls (toll fraud) and improve cybersecurity by detecting early stage reconnaissance attempts.

Language: PHP - Size: 188 KB - Last synced at: 12 months ago - Pushed at: almost 2 years ago - Stars: 5 - Forks: 0

tianyi17/simulations_IV24

Simulate mixed traffic on a ring road to analyze interactions between human-driven and ACC-equipped vehicles under various conditions, including disruptions.

Language: Jupyter Notebook - Size: 75.2 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

uamughal/Stealthy-False-Data-Injection-Attack

This repository contains the code for paper, "Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge"

Language: Python - Size: 18.6 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

uamughal/Machine-Learning-Based-Intrusion-Detection-System

This repository contains the code for paper, ''Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles"

Language: Python - Size: 48.8 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

Harry-Deng/Yawn-Suite

A cyber attack software similar to Burp Suite, enabling ARP and DDoS attacks on hosts within LAN

Language: Java - Size: 344 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

abc744587/Network-Anomaly-Detection-With-Temporal-Convolutional-Network-and-U-Net-Model

This is code reproduced according to the description in the paper "Network Anomaly Detection With Temporal Convolutional Network and U-Net Model".

Language: Python - Size: 19.3 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

MayankFawkes/Python-Botnet

This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.

Language: Python - Size: 182 KB - Last synced at: over 1 year ago - Pushed at: over 2 years ago - Stars: 214 - Forks: 62

SherinBK/IoT-cyber-attack-analysis

To use the UNSW-NB15 data set to classify cyber attack. It is an IoT-based dataset that contains network traffic captured by a residential gateway.

Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

Heewon-Hailey/cyberattack-analysis

implement of ML-based anomaly detection models to identify cyberattacks from NetFlow data

Language: Jupyter Notebook - Size: 88.9 KB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 2 - Forks: 0

antoinedelplace/Cyberattack-Detection

Cyber Attack Detection thanks to Machine Learning Algorithms

Language: Python - Size: 11.7 KB - Last synced at: about 2 years ago - Pushed at: over 5 years ago - Stars: 59 - Forks: 38

leoisrael/Ghost_Dir

Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.

Language: JavaScript - Size: 14.5 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 6 - Forks: 3

kh4sh3i/cyber-attacks-in-iran

A curated list of awesome cyber attacks in iran, we want to review and explain some advanced attack that happened in iran, in order to learned some security tips.

Size: 1.68 MB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 2 - Forks: 0

Thelin90/CyberAttacks

Relational Graph Visualization with (React-D3 - Python Flask - OrientDB (NoSQL))

Language: JavaScript - Size: 9.41 MB - Last synced at: about 2 years ago - Pushed at: about 7 years ago - Stars: 3 - Forks: 2

eightus/Cyder 📦

Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database

Language: Python - Size: 43 KB - Last synced at: over 1 year ago - Pushed at: almost 3 years ago - Stars: 7 - Forks: 3

aktechnohacker/Ransomware-samples

Small collection of Ransomwares.

Size: 14 MB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 4 - Forks: 1

nicholasmarasco95/SafetyBackupSystem

Safety Backup System is a project complete of Client, Server and Remote Access software, developed to improve security of users. It's extremely useful to prevent data loss in case of cyberattack or hardware malfunction. SBS can backup computer files and send them to a remote server or store them in an external device.

Language: Java - Size: 7.25 MB - Last synced at: about 2 years ago - Pushed at: about 6 years ago - Stars: 5 - Forks: 1

alvin-tosh/MORAN-Blog

sort of a back up for MORAN blog for now

Language: HTML - Size: 50.8 MB - Last synced at: about 2 years ago - Pushed at: almost 3 years ago - Stars: 1 - Forks: 0