CyberKelp Cyber Secuirty Notes.
-
Updated
May 4, 2026 - JavaScript
CyberKelp Cyber Secuirty Notes.
Use signed exe to run your code to avoid Microsoft Defender SmartScreen warning. Don't need to sign exe, sign dll.
Educational security research notes documenting USB HID (BadUSB/Rubber Ducky) concepts from a defensive perspective. The repository preserves historical filenames while emphasizing detection, prevention, user awareness, and ethical lab use. No payloads, automation scripts, or actionable exploits are provided.
"Dead1ock-h4ck" is an open-source project dedicated to exploring cybersecurity and ethical hacking techniques. The project aims to provide resources and tools for learning about network security, cryptography, and penetration testing.
C++ trojan spyware that logs keystrokes, spreads via USB drives & exfiltrates data via email. Built for learning malware internals. For educational use only.
FFNNs, GNNs & Transformers (BERT, UniXcoder) for malware detection, zero-day NIDS and MITRE ATT&CK tactic classification.
Collection of Notes on How-to get started in Cybersecurity Vulnerability Research
A Python Flask web dashboard that aggregates and displays the latest cybersecurity news from multiple RSS feeds, organized by category. Quickly see titles, summaries, and publication dates of top threat intelligence sources.
A high-concurrency distributed botnet simulation framework built with Golang (C2) and Rust (Agents), orchestrated via Docker.
DDoS detection using anomaly detection in high-speed ITP networks. Comparing Autoencoder, Isolation Forest, Local Outlier Factor, and One-Class SVM across real ITP datasets, different aggregation windows, and feature selections using Pearson’s correlation coefficient.
A professional AiTM Phishing Research Platform simulating legacy vs. modern authentication defenses (FIDO2/WebAuthn). Fully containerized & production-ready.
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.
Portable Executable (PE) of Malimg Dataset
Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, with GUI & CLI. Open source by AUX-441 Team.
A collection of tiny but powerful programs that demonstrate how computers can be overwhelmed by CPU overload, RAM exhaustion, process storms, and system resource abuse. Cute… but deadly.
IP2Domain is an advanced network reconnaissance tool designed for cybersecurity professionals, threat researchers, and system administrators. Its purpose is to enable deep and efficient analysis of large-scale networks, focusing on discovering web servers and analyzing IP addresses while always maintaining user privacy and security.
🕵️♂️ A curated list of cybersecurity news and articles sources
Educational cross-platform LSB steganography tool for cybersecurity awareness, digital forensics, and hidden data research.
Adaptive AI Frameworks for Scalable and Privacy-Preserving Web Application Firewalls
ShadowRAT is a Remote Access Trojan that uses Telegram as its command and control (C2) channel. It provides complete remote control over a Windows machine through a Telegram bot
Add a description, image, and links to the cybersecurity-research topic page so that developers can more easily learn about it.
To associate your repository with the cybersecurity-research topic, visit your repo's landing page and select "manage topics."