Skip to content

Latest commit

 

History

History
50 lines (37 loc) · 2.49 KB

README.md

File metadata and controls

50 lines (37 loc) · 2.49 KB

🛡️ Python for Security - Building Security Tools with Python 🔍

This repository contains various security-focused tools built with Python, covering areas like network security, penetration testing, cryptography, malware analysis, and automation.


📌 About This Repository

Python is a powerful language for security professionals, ethical hackers, and cybersecurity enthusiasts. This repo provides hands-on Python scripts to help build custom security tools, automate tasks, and understand security concepts.


🚀 Tools & Projects Included

1️⃣ Network Security & Scanning

  • 🔍 Port Scanner – Scan open ports on a target system.
  • 🌐 Network Sniffer – Capture packets and analyze network traffic.
  • 🕵️ ARP Spoofing – Intercept traffic between devices on a network.

2️⃣ Ethical Hacking & Penetration Testing

  • 🏹 Brute Force Attacker – Test login credentials with dictionary attacks.
  • 🔑 Hash Cracker – Crack hashed passwords using common algorithms.
  • 🛑 Denial-of-Service (DoS) Script – Simulate DoS attacks for testing environments.

3️⃣ Cryptography & Encryption

  • 🔐 AES/RSA Encryption & Decryption – Secure communication with cryptography.
  • 🔏 Steganography – Hide information inside images and files.
  • 📜 File Integrity Checker – Verify file authenticity with hashing.

4️⃣ Web Security & Exploits

  • 🌍 SQL Injection Tester – Detect and test SQLi vulnerabilities.
  • 🔎 XSS Scanner – Scan web applications for cross-site scripting vulnerabilities.
  • 📜 Subdomain Enumeration – Find subdomains of a target domain.

5️⃣ Malware Analysis & Reverse Engineering

  • 🕷 Keylogger – Capture keystrokes for monitoring (ethical use only).
  • 🦠 Basic Trojan – Simulate backdoor connections (for learning purposes).
  • 🔬 File Metadata Extractor – Analyze metadata from files for forensic analysis.

6️⃣ Security Automation & Monitoring

  • 📡 Log Analyzer – Monitor logs for security anomalies.
  • 🚨 Intrusion Detection System (IDS) – Detect suspicious network activities.
  • 🛠 Custom Exploit Framework – Automate vulnerability exploitation.

For PRs & Contributions:

  • 🌟 Fork this repository.
  • 🔧 Add your Python security tool.
  • 📝 Update the README with your tool's details.
  • 📌 Create a pull request.