Skip to content

Commit c1edbaf

Browse files
authored
Update README.md
Signed-off-by: Aakash G <[email protected]>
1 parent 55b9f95 commit c1edbaf

File tree

1 file changed

+0
-29
lines changed

1 file changed

+0
-29
lines changed

README.md

Lines changed: 0 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -28,37 +28,8 @@ A collection of beginner-level Python tools to understand cybersecurity concepts
2828
## ⚠️ Ethical Notice
2929
This repository is strictly for educational purposes. Do not use any tools from this repo without proper authorization or consent.
3030

31-
32-
# cybersecurity-python-projects
33-
34-
# 🔐 Basic Cybersecurity Tools
35-
36-
A collection of beginner-level Python tools to understand cybersecurity concepts through code. Each project is isolated, well-documented, and designed to strengthen your security fundamentals and Python skills.
37-
38-
---
39-
40-
## 📦 Tool Summary
41-
42-
| Tool Name | Description | Key Concepts | Link |
43-
|---------------------------|-----------------------------------------------------------------------------|----------------------------------------|----------------------------------------------|
44-
| **Password Strength Checker** | Evaluates password strength based on length, character types, etc. | Input validation, regex, logic | [Go to Tool](./password_strength_checker/) |
45-
| **Image Encryption Tool** | Encrypts images via pixel manipulation (swapping, math ops) | Image data, loops, pixel math | [Go to Tool](./image_encryption_tool/) |
46-
| **Caesar Cipher** | Classic text encryption/decryption using character shifting | ASCII operations, strings, logic | [Go to Tool](./caesar_cipher/) |
47-
| **Keylogger** | Logs user keystrokes to a file (ethical use only) | File I/O, OS-level hooks, event capture| [Go to Tool](./keylogger/) |
48-
4931
---
5032

51-
## 🎯 Objectives
52-
53-
- Understand security tool logic by building them from scratch.
54-
- Practice Python syntax and core programming patterns.
55-
- Bridge the gap between theory and applied cybersecurity.
56-
57-
---
58-
## ⚠️ Ethical Notice
59-
This repository is strictly for educational purposes. Do not use any tools from this repo without proper authorization or consent.
60-
61-
6233
## 🚀 Getting Started
6334

6435
```bash

0 commit comments

Comments
 (0)