A comprehensive repository of malware hashes for cybersecurity research and analysis. Regularly updated and community-driven. Contributions are welcome to help improve and expand this resource!
-
Updated
Jun 18, 2024
A comprehensive repository of malware hashes for cybersecurity research and analysis. Regularly updated and community-driven. Contributions are welcome to help improve and expand this resource!
Educational security research notes documenting USB HID (BadUSB/Rubber Ducky) concepts from a defensive perspective. The repository preserves historical filenames while emphasizing detection, prevention, user awareness, and ethical lab use. No payloads, automation scripts, or actionable exploits are provided.
"Dead1ock-h4ck" is an open-source project dedicated to exploring cybersecurity and ethical hacking techniques. The project aims to provide resources and tools for learning about network security, cryptography, and penetration testing.
Collection of Notes on How-to get started in Cybersecurity Vulnerability Research
A Python Flask web dashboard that aggregates and displays the latest cybersecurity news from multiple RSS feeds, organized by category. Quickly see titles, summaries, and publication dates of top threat intelligence sources.
DDoS detection using anomaly detection in high-speed ITP networks. Comparing Autoencoder, Isolation Forest, Local Outlier Factor, and One-Class SVM across real ITP datasets, different aggregation windows, and feature selections using Pearson’s correlation coefficient.
A high-concurrency distributed botnet simulation framework built with Golang (C2) and Rust (Agents), orchestrated via Docker.
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.
Portable Executable (PE) of Malimg Dataset
Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, with GUI & CLI. Open source by AUX-441 Team.
A professional AiTM Phishing Research Platform simulating legacy vs. modern authentication defenses (FIDO2/WebAuthn). Fully containerized & production-ready.
IP2Domain is an advanced network reconnaissance tool designed for cybersecurity professionals, threat researchers, and system administrators. Its purpose is to enable deep and efficient analysis of large-scale networks, focusing on discovering web servers and analyzing IP addresses while always maintaining user privacy and security.
Advanced DuckDuckGo Dork Generator — GUI search tool for ethical reconnaissance & research.
Adaptive AI Frameworks for Scalable and Privacy-Preserving Web Application Firewalls
Technical leader with extensive experience implementing, securing, and optimising enterprise-scale infrastructure.
Official CYBERDUDEBIVASH® Enterprise Website — A production-grade cybersecurity & AI automation platform showcasing security tools, threat intelligence, research, enterprise services, and defensive solutions aligned with real-world cyber incidents.
High-performance Intermittent Encryption engine using Salsa20 Cipher and Memory-Mapped Files (MMF). Designed for ultra-fast large-file processing with optimized resource usage.
🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced security research on CVE-2025-6554.
Ein modulares Malware-Simulationsframework für Bildungs- und Forschungszwecke. Dieses Projekt demonstriert verschiedene Techniken moderner Malware (Netzwerkverbreitung, Persistence, Evasion, C2) in einer sicheren Sandbox-Umgebung ohne tatsächliche schädliche Aktionen. Alle Funktionen werden nur simuliert und protokolliert
This repository serves as a centralised collection of my significant projects, highlighting key outcomes and methodologies. It provides secure links to detailed documentation, ensuring easy navigation for professional reviews, skill verification, and personal reference.
Add a description, image, and links to the cybersecurity-research topic page so that developers can more easily learn about it.
To associate your repository with the cybersecurity-research topic, visit your repo's landing page and select "manage topics."