Skip to content

Commit 03cf227

Browse files
authored
Create cyber security in python
1 parent 0bcdfbd commit 03cf227

File tree

1 file changed

+78
-0
lines changed

1 file changed

+78
-0
lines changed

cyber security in python

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
import scapy.all as scapy
2+
import paramiko
3+
import nmap
4+
import requests
5+
from bs4 import BeautifulSoup
6+
from sklearn.model_selection import train_test_split
7+
from sklearn.tree import DecisionTreeClassifier
8+
import tensorflow as tf
9+
10+
11+
def scan_ports(target):
12+
nm = nmap.PortScanner()
13+
nm.scan(target, '1-1024') # Scanning ports 1 to 1024
14+
return nm.all_hosts()
15+
16+
17+
def sniff_packets(interface):
18+
scapy.sniff(iface=interface, store=False, prn=process_packet)
19+
20+
def process_packet(packet):
21+
print(packet.summary())
22+
23+
24+
def scrape_website(url):
25+
response = requests.get(url)
26+
soup = BeautifulSoup(response.text, 'html.parser')
27+
return [a['href'] for a in soup.find_all('a', href=True)]
28+
29+
30+
def ssh_connect(host, username, password):
31+
client = paramiko.SSHClient()
32+
client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
33+
client.connect(host, username=username, password=password)
34+
stdin, stdout, stderr = client.exec_command('ls')
35+
print(stdout.read().decode())
36+
client.close()
37+
38+
def train_malware_classifier(data, labels):
39+
X_train, X_test, y_train, y_test = train_test_split(data, labels, test_size=0.2)
40+
clf = DecisionTreeClassifier()
41+
clf.fit(X_train, y_train)
42+
return clf.score(X_test, y_test)
43+
44+
def build_model():
45+
model = tf.keras.Sequential([
46+
tf.keras.layers.Flatten(input_shape=(28, 28)),
47+
tf.keras.layers.Dense(128, activation='relu'),
48+
tf.keras.layers.Dense(10, activation='softmax')
49+
])
50+
model.compile(optimizer='adam', loss='sparse_categorical_crossentropy', metrics=['accuracy'])
51+
return model
52+
53+
54+
if __name__ == "__main__":
55+
target = "192.168.1.1"
56+
print("Scanning ports...")
57+
print(scan_ports(target))
58+
59+
print("Sniffing packets...")
60+
sniff_packets("eth0")
61+
62+
print("Scraping website...")
63+
print(scrape_website("http://example.com"))
64+
65+
print("Connecting via SSH...")
66+
ssh_connect("192.168.1.2", "user", "password")
67+
68+
# Example data for malware detection
69+
data = [[...]] # Replace with actual data
70+
labels = [...] # Replace with actual labels
71+
print("Training malware classifier...")
72+
print(train_malware_classifier(data, labels))
73+
74+
print("Building and training deep learning model...")
75+
model = build_model()
76+
# Add code to train the model with data
77+
78+

0 commit comments

Comments
 (0)