This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
-
Updated
Oct 8, 2022 - Python
This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Cyber Attack Detection thanks to Machine Learning Algorithms
Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
This repository contains the code for paper, ''Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles"
This repository contains the code for paper, "Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge"
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
This is code reproduced according to the description in the paper "Network Anomaly Detection With Temporal Convolutional Network and U-Net Model".
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
Python Ransomware
Code for: "Vision-Based Learning for Cyberattack Detection in Blockchain Smart Contracts and Transactions," ISCIT, 2025.
This repository features a Python script that simulates a basic Denial of Service (DoS) attack for educational purposes. Users can explore how these attacks work and improve their cybersecurity knowledge through hands-on experience. 🐙💻
Dissertation project exploring cyberattack detection. Implements Artificial Neural Networks on the HIKARI-2022 dataset, with extensive hyperparameter tuning, evaluation metrics, and variable importance analysis using DeepSHAP and PFI.
This project focuses on penetration testing of web pages to identify and exploit common vulnerabilities.
InsightMonitor is a comprehensive system monitoring solution designed to provide real-time insights into various aspects of system performance and resource utilization. It works by deploying lightweight agents on monitored systems to continuously collect data on key metrics such as CPU usage, memory utilization, disk activity, and network traffic.
Open-source tool to scan GitHub organizations for vulnerable NPM packages compromised in the September 2025 supply chain attack. Automatically analyzes nested dependency files in all repositories to help startups, freelancers, and dev teams manage supply chain risks without dedicated security experts.
Add a description, image, and links to the cyberattack topic page so that developers can more easily learn about it.
To associate your repository with the cyberattack topic, visit your repo's landing page and select "manage topics."