GitHub topics: cyberattack
romainmarcoux/malicious-ip
Aggregation of lists of malicious IP addresses, to be blocked in the WAN > LAN direction, integrated into firewalls: FortiGate, Palo Alto, pfSense, IPtables
Size: 8.88 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 149 - Forks: 6

SentryPeer/SentryPeerHQ
Fraud Detection for VoIP. Use SentryPeer® HQ to help prevent VoIP cyberattacks and fraudulent VoIP phone calls (toll fraud) at https://sentrypeer.com
Language: Elixir - Size: 4.45 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 23 - Forks: 1

JPablo13/Introductory-Course-to-Cybersecurity
Size: 2.79 MB - Last synced at: 12 days ago - Pushed at: 12 days ago - Stars: 1 - Forks: 0

johnmomajr/cybersecurity-projects
This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.
Language: Jupyter Notebook - Size: 1.95 KB - Last synced at: 12 days ago - Pushed at: 12 days ago - Stars: 0 - Forks: 0

Anish-M-code/URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Language: Python - Size: 1.57 MB - Last synced at: 13 days ago - Pushed at: 14 days ago - Stars: 181 - Forks: 37

MrCabss69/Sandworm-Spain-04-2025
Public data-driven investigation of the 28-04-2025 Iberian Blackout using REE, IODA & Downdetector data.
Language: Jupyter Notebook - Size: 4.16 MB - Last synced at: 15 days ago - Pushed at: 15 days ago - Stars: 0 - Forks: 0

MNK-hub/d4t4r34p3r
In 2025, the cybersecurity landscape was rocked by a real and unprecedented event. A solo hacker, known as d4t4r34p3r, compromised approximately 19,248 websites in just two days. This wasn’t a fictional tale—it was a significant incident that unfolded in cyberspace, exposing vulnerabilities and sparking widespread discussion.
Size: 0 Bytes - Last synced at: about 1 month ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

karami-mehdi/CyberattackDetection
This project focuses on detecting cyberattacks using advanced analytical techniques and a deep learning model. It leverages structured datasets and explores the use of algorithms for detecting anomalies or malicious behavior in network traffic or system logs.
Language: Jupyter Notebook - Size: 405 KB - Last synced at: about 1 month ago - Pushed at: 3 months ago - Stars: 8 - Forks: 0

paulveillard/cybersecurity-malware-analysis
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
Size: 339 KB - Last synced at: about 2 months ago - Pushed at: about 2 years ago - Stars: 46 - Forks: 9

paulveillard/cybersecurity-threat-intelligence
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Size: 514 KB - Last synced at: about 2 months ago - Pushed at: over 2 years ago - Stars: 44 - Forks: 16

Laiteux/Milky 📦
A .NET Standard library for pentesting web apps against credential stuffing attacks.
Language: C# - Size: 499 KB - Last synced at: 3 days ago - Pushed at: over 3 years ago - Stars: 58 - Forks: 15

mytechnotalent/turbo-attack
A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
Language: Go - Size: 12.4 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 135 - Forks: 28

qeeqbox/cyber-kill-chain
Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks
Size: 117 KB - Last synced at: 2 months ago - Pushed at: over 1 year ago - Stars: 10 - Forks: 4

tanishq-ctrl/Cyberattack-Analysis-and-Insights
This repository contains an in-depth analysis of a cybersecurity dataset. The primary goal is to identify patterns, vulnerabilities, and trends in cyberattacks by leveraging various visualizations and statistical insights. The project provides actionable insights for enhancing cybersecurity measures.
Language: Jupyter Notebook - Size: 11.8 MB - Last synced at: about 2 months ago - Pushed at: 5 months ago - Stars: 8 - Forks: 0

qeeqbox/raven
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
Language: JavaScript - Size: 24.7 MB - Last synced at: about 2 months ago - Pushed at: almost 2 years ago - Stars: 183 - Forks: 47

evyatar9/Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Language: HTML - Size: 285 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 148 - Forks: 13

cyasar34/NETWORK-ATTACK-SIMULATION-WANNACRY-RANSOMWARE-ATTACK
AĞ SALDIRI SİMÜLASYONU: WANNACRY RANSOMWARE ATTACK
Size: 552 KB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

cyasar34/KEYLOGGER-ATTACK-SCENARIO-AND-SECURITY-MEASURES
KEYLOGGER SALDIRI SENARYOSU VE GÜVENLİK ÖNLEMLERİ
Size: 1.12 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

paulveillard/cybersecurity-python-security
An ongoing collection of Python language tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.
Size: 18.6 KB - Last synced at: about 1 month ago - Pushed at: over 3 years ago - Stars: 13 - Forks: 4

paulveillard/cybersecurity-tools
A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.
Size: 89.8 KB - Last synced at: about 2 months ago - Pushed at: about 1 year ago - Stars: 12 - Forks: 3

txuswashere/Cyber-Attacks-Mitigation
Cyber Attacks Mitigation
Size: 27.3 KB - Last synced at: about 2 months ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

CSCRC-SCREED/QUT-ZSS-2023-SV
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
Language: Python - Size: 347 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

paulveillard/cybersecurity-cyberloss
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Loss in Cybersecurity.
Size: 8.79 KB - Last synced at: about 2 months ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 0

DanielVandH/ALTS
Robust regression for electricity demand forecasting against cyberattacks
Language: R - Size: 4.18 MB - Last synced at: about 2 months ago - Pushed at: 7 months ago - Stars: 0 - Forks: 1

Magarevedant/Pandora
Language: Python - Size: 20.5 KB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

Loai-Houmane/QR-Code-Malware-Detection
🛡️ This project aims to detect malware embedded within QR codes, assisting law enforcement in scanning public QR codes, such as those found in subways and other public areas. 🏙️ It enhances public safety by identifying potentially malicious QR codes before they can cause harm. 🚨
Language: C++ - Size: 14.4 MB - Last synced at: 9 months ago - Pushed at: 10 months ago - Stars: 2 - Forks: 1

iker-gonzalez/darkly
This project focuses on penetration testing of web pages to identify and exploit common vulnerabilities.
Language: Python - Size: 2.12 MB - Last synced at: 2 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

henrywoody/cyber-attacks
Exploring cyber attacks
Language: Go - Size: 7.81 KB - Last synced at: about 2 years ago - Pushed at: almost 5 years ago - Stars: 0 - Forks: 0

Mr-Pstar7/ZeroDoS
Best Tools For DoS
Language: C++ - Size: 31.3 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 5 - Forks: 0

CSCRC-SCREED/QUT-ZSS-2023-GOOSE
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
Language: Python - Size: 376 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

ECCENTRIX-CA/SQL-Injection-Attack-Understanding-the-Threat-in-Cybersecurity
This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.
Size: 2.93 KB - Last synced at: 3 months ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

Aryan-Parashar/InsightMonitor
InsightMonitor is a comprehensive system monitoring solution designed to provide real-time insights into various aspects of system performance and resource utilization. It works by deploying lightweight agents on monitored systems to continuously collect data on key metrics such as CPU usage, memory utilization, disk activity, and network traffic.
Language: Python - Size: 15.6 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

Rc-W024/CyberAttk-SP
🛡 A brief introduction and theoretical research of computer virus weapons, and the simulation of its basic framework and functions.
Language: MATLAB - Size: 60.5 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

luiz-linkezio/Tarefas-Deteccao_de_Intrusao-EC-CIn-UFPE-2023.2
Tarefas com o uso de inteligência artificial para detecção de anomalias e ataques adversariais, fazer testes de modelos, hiperparâmetros e produzir relatórios. Tarefas da cadeira de Detecção de Intrusão do curso de Engenharia da Computação (EC) do CIn da UFPE, cadeira cursada por mim de 2023 a 2024.
Language: Jupyter Notebook - Size: 11.9 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

enriquetomasmb/bci
Framework for P300 wave detection and noise-based cyberattacks in Brain-Computer Interfaces - Enrique Tomás Martínez Beltrán
Language: Jupyter Notebook - Size: 117 MB - Last synced at: 9 months ago - Pushed at: over 3 years ago - Stars: 6 - Forks: 2

SentryPeer/SentryPeer-FreePBX-Module
This module queries the SentryPeer Phone Number API when making outbound calls from your FreePBX system to help prevent VoIP cyberattacks, fraudulent VoIP phone calls (toll fraud) and improve cybersecurity by detecting early stage reconnaissance attempts.
Language: PHP - Size: 188 KB - Last synced at: 12 months ago - Pushed at: almost 2 years ago - Stars: 5 - Forks: 0

tianyi17/simulations_IV24
Simulate mixed traffic on a ring road to analyze interactions between human-driven and ACC-equipped vehicles under various conditions, including disruptions.
Language: Jupyter Notebook - Size: 75.2 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

uamughal/Stealthy-False-Data-Injection-Attack
This repository contains the code for paper, "Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge"
Language: Python - Size: 18.6 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

uamughal/Machine-Learning-Based-Intrusion-Detection-System
This repository contains the code for paper, ''Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles"
Language: Python - Size: 48.8 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

Harry-Deng/Yawn-Suite
A cyber attack software similar to Burp Suite, enabling ARP and DDoS attacks on hosts within LAN
Language: Java - Size: 344 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

abc744587/Network-Anomaly-Detection-With-Temporal-Convolutional-Network-and-U-Net-Model
This is code reproduced according to the description in the paper "Network Anomaly Detection With Temporal Convolutional Network and U-Net Model".
Language: Python - Size: 19.3 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

MayankFawkes/Python-Botnet
This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
Language: Python - Size: 182 KB - Last synced at: over 1 year ago - Pushed at: over 2 years ago - Stars: 214 - Forks: 62

SherinBK/IoT-cyber-attack-analysis
To use the UNSW-NB15 data set to classify cyber attack. It is an IoT-based dataset that contains network traffic captured by a residential gateway.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

Heewon-Hailey/cyberattack-analysis
implement of ML-based anomaly detection models to identify cyberattacks from NetFlow data
Language: Jupyter Notebook - Size: 88.9 KB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 2 - Forks: 0

antoinedelplace/Cyberattack-Detection
Cyber Attack Detection thanks to Machine Learning Algorithms
Language: Python - Size: 11.7 KB - Last synced at: about 2 years ago - Pushed at: over 5 years ago - Stars: 59 - Forks: 38

leoisrael/Ghost_Dir
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Language: JavaScript - Size: 14.5 MB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 6 - Forks: 3

kh4sh3i/cyber-attacks-in-iran
A curated list of awesome cyber attacks in iran, we want to review and explain some advanced attack that happened in iran, in order to learned some security tips.
Size: 1.68 MB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 2 - Forks: 0

Thelin90/CyberAttacks
Relational Graph Visualization with (React-D3 - Python Flask - OrientDB (NoSQL))
Language: JavaScript - Size: 9.41 MB - Last synced at: about 2 years ago - Pushed at: about 7 years ago - Stars: 3 - Forks: 2

eightus/Cyder 📦
Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
Language: Python - Size: 43 KB - Last synced at: over 1 year ago - Pushed at: almost 3 years ago - Stars: 7 - Forks: 3

aktechnohacker/Ransomware-samples
Small collection of Ransomwares.
Size: 14 MB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 4 - Forks: 1

nicholasmarasco95/SafetyBackupSystem
Safety Backup System is a project complete of Client, Server and Remote Access software, developed to improve security of users. It's extremely useful to prevent data loss in case of cyberattack or hardware malfunction. SBS can backup computer files and send them to a remote server or store them in an external device.
Language: Java - Size: 7.25 MB - Last synced at: about 2 years ago - Pushed at: about 6 years ago - Stars: 5 - Forks: 1

alvin-tosh/MORAN-Blog
sort of a back up for MORAN blog for now
Language: HTML - Size: 50.8 MB - Last synced at: about 2 years ago - Pushed at: almost 3 years ago - Stars: 1 - Forks: 0
