Use signed exe to run your code to avoid Microsoft Defender SmartScreen warning. Don't need to sign exe, sign dll.
-
Updated
Mar 17, 2026 - C++
Use signed exe to run your code to avoid Microsoft Defender SmartScreen warning. Don't need to sign exe, sign dll.
Educational security research notes documenting USB HID (BadUSB/Rubber Ducky) concepts from a defensive perspective. The repository preserves historical filenames while emphasizing detection, prevention, user awareness, and ethical lab use. No payloads, automation scripts, or actionable exploits are provided.
"Dead1ock-h4ck" is an open-source project dedicated to exploring cybersecurity and ethical hacking techniques. The project aims to provide resources and tools for learning about network security, cryptography, and penetration testing.
C++ trojan spyware that logs keystrokes, spreads via USB drives & exfiltrates data via email. Built for learning malware internals. For educational use only.
Collection of Notes on How-to get started in Cybersecurity Vulnerability Research
A Python Flask web dashboard that aggregates and displays the latest cybersecurity news from multiple RSS feeds, organized by category. Quickly see titles, summaries, and publication dates of top threat intelligence sources.
DDoS detection using anomaly detection in high-speed ITP networks. Comparing Autoencoder, Isolation Forest, Local Outlier Factor, and One-Class SVM across real ITP datasets, different aggregation windows, and feature selections using Pearson’s correlation coefficient.
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.
A high-concurrency distributed botnet simulation framework built with Golang (C2) and Rust (Agents), orchestrated via Docker.
A professional AiTM Phishing Research Platform simulating legacy vs. modern authentication defenses (FIDO2/WebAuthn). Fully containerized & production-ready.
Portable Executable (PE) of Malimg Dataset
Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, with GUI & CLI. Open source by AUX-441 Team.
Personal cybersecurity repository of an ethical hacking expert, with guides on strengthening, customizing, and improving development environments.
FFNNs, GNNs & Transformers (BERT, UniXcoder) for malware detection, zero-day NIDS and MITRE ATT&CK tactic classification.
A collection of tiny but powerful programs that demonstrate how computers can be overwhelmed by CPU overload, RAM exhaustion, process storms, and system resource abuse. Cute… but deadly.
IP2Domain is an advanced network reconnaissance tool designed for cybersecurity professionals, threat researchers, and system administrators. Its purpose is to enable deep and efficient analysis of large-scale networks, focusing on discovering web servers and analyzing IP addresses while always maintaining user privacy and security.
Personal cybersecurity website showcasing research, tools, and technical writeups.
🕵️♂️ A curated list of cybersecurity news and articles sources
Adaptive AI Frameworks for Scalable and Privacy-Preserving Web Application Firewalls
Technical leader with extensive experience implementing, securing, and optimising enterprise-scale infrastructure.
Add a description, image, and links to the cybersecurity-research topic page so that developers can more easily learn about it.
To associate your repository with the cybersecurity-research topic, visit your repo's landing page and select "manage topics."