Skip to content
#

cybersecurity-research

Here are 24 public repositories matching this topic...

A comprehensive repository of malware hashes for cybersecurity research and analysis. Regularly updated and community-driven. Contributions are welcome to help improve and expand this resource!

  • Updated Jun 18, 2024

Educational security research notes documenting USB HID (BadUSB/Rubber Ducky) concepts from a defensive perspective. The repository preserves historical filenames while emphasizing detection, prevention, user awareness, and ethical lab use. No payloads, automation scripts, or actionable exploits are provided.

  • Updated Oct 15, 2025

"Dead1ock-h4ck" is an open-source project dedicated to exploring cybersecurity and ethical hacking techniques. The project aims to provide resources and tools for learning about network security, cryptography, and penetration testing.

  • Updated Aug 26, 2025
  • Java

IP2Domain is an advanced network reconnaissance tool designed for cybersecurity professionals, threat researchers, and system administrators. Its purpose is to enable deep and efficient analysis of large-scale networks, focusing on discovering web servers and analyzing IP addresses while always maintaining user privacy and security.

  • Updated Apr 14, 2025
  • Python

Ein modulares Malware-Simulationsframework für Bildungs- und Forschungszwecke. Dieses Projekt demonstriert verschiedene Techniken moderner Malware (Netzwerkverbreitung, Persistence, Evasion, C2) in einer sicheren Sandbox-Umgebung ohne tatsächliche schädliche Aktionen. Alle Funktionen werden nur simuliert und protokolliert

  • Updated Mar 7, 2025
  • Python

This repository serves as a centralised collection of my significant projects, highlighting key outcomes and methodologies. It provides secure links to detailed documentation, ensuring easy navigation for professional reviews, skill verification, and personal reference.

  • Updated Jan 10, 2025

Phoenix-Evasion-Research Framework is an advanced educational platform designed for cybersecurity researchers, red teams, and defensive security professionals. This framework demonstrates modern evasion techniques to help security practitioners understand, analyze, and improve defensive capabilities

  • Updated Jan 5, 2026
  • Python

Improve this page

Add a description, image, and links to the cybersecurity-research topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the cybersecurity-research topic, visit your repo's landing page and select "manage topics."

Learn more