You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Educational security research notes documenting USB HID (BadUSB/Rubber Ducky) concepts from a defensive perspective. The repository preserves historical filenames while emphasizing detection, prevention, user awareness, and ethical lab use. No payloads, automation scripts, or actionable exploits are provided.
"Dead1ock-h4ck" is an open-source project dedicated to exploring cybersecurity and ethical hacking techniques. The project aims to provide resources and tools for learning about network security, cryptography, and penetration testing.
C++ trojan spyware that logs keystrokes, spreads via USB drives & exfiltrates data via email. Built for learning malware internals. For educational use only.
A Python Flask web dashboard that aggregates and displays the latest cybersecurity news from multiple RSS feeds, organized by category. Quickly see titles, summaries, and publication dates of top threat intelligence sources.
DDoS detection using anomaly detection in high-speed ITP networks. Comparing Autoencoder, Isolation Forest, Local Outlier Factor, and One-Class SVM across real ITP datasets, different aggregation windows, and feature selections using Pearson’s correlation coefficient.
A professional AiTM Phishing Research Platform simulating legacy vs. modern authentication defenses (FIDO2/WebAuthn). Fully containerized & production-ready.
Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, with GUI & CLI. Open source by AUX-441 Team.
IP2Domain is an advanced network reconnaissance tool designed for cybersecurity professionals, threat researchers, and system administrators. Its purpose is to enable deep and efficient analysis of large-scale networks, focusing on discovering web servers and analyzing IP addresses while always maintaining user privacy and security.
A collection of tiny but powerful programs that demonstrate how computers can be overwhelmed by CPU overload, RAM exhaustion, process storms, and system resource abuse. Cute… but deadly.
AI-Driven Threat Detection Research A defense suite leveraging FFNNs, GNNs, and Transformers (BERT, UniXcoder) to detect Malware, Zero-Day Intrusions, and Bash Attacks. Features unsupervised NIDS and MITRE ATT&CK tactic recognition.
High-performance Intermittent Encryption engine using Salsa20 Cipher and Memory-Mapped Files (MMF). Designed for ultra-fast large-file processing with optimized resource usage.
Ein modulares Malware-Simulationsframework für Bildungs- und Forschungszwecke. Dieses Projekt demonstriert verschiedene Techniken moderner Malware (Netzwerkverbreitung, Persistence, Evasion, C2) in einer sicheren Sandbox-Umgebung ohne tatsächliche schädliche Aktionen. Alle Funktionen werden nur simuliert und protokolliert