This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
-
Updated
Oct 8, 2022 - Python
This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Cyber Attack Detection thanks to Machine Learning Algorithms
Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
This repository contains the code for paper, "Stealthy False Data Injection Attack on Unmanned Aerial Vehicles with Partial Knowledge"
This repository contains the code for paper, ''Machine Learning-Based Intrusion Detection for Swarm of Unmanned Aerial Vehicles"
This is code reproduced according to the description in the paper "Network Anomaly Detection With Temporal Convolutional Network and U-Net Model".
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
This project focuses on penetration testing of web pages to identify and exploit common vulnerabilities.
InsightMonitor is a comprehensive system monitoring solution designed to provide real-time insights into various aspects of system performance and resource utilization. It works by deploying lightweight agents on monitored systems to continuously collect data on key metrics such as CPU usage, memory utilization, disk activity, and network traffic.
Add a description, image, and links to the cyberattack topic page so that developers can more easily learn about it.
To associate your repository with the cyberattack topic, visit your repo's landing page and select "manage topics."