- Overview
- π οΈ Tools Overview
- π Learning Objectives
- π Getting Started
- π Project Structure
- π§ Installation
- π Usage Examples
- π― Learning Path
- π Additional Resources
- π€ Contributing
- π License
This repository contains a collection of cybersecurity tools and scripts developed for educational purposes. Each tool demonstrates different aspects of network security, penetration testing, and vulnerability assessment techniques commonly used in the cybersecurity field.
The author is not responsible for any misuse of these tools. Users are solely responsible for their actions.
| Tool | Purpose | Skill Level |
|---|---|---|
| π Network Scanner | Discover active hosts on network | Beginner |
| πͺ Port Scanner | Identify open ports and services | Beginner |
| π MITM Tools | Understand network interception techniques | Advanced |
| Tool | Purpose | Skill Level |
|---|---|---|
| π·οΈ Web Scraper | Extract information from websites | Beginner |
| π₯ Directory Brute Forcer | Find hidden web directories | Intermediate |
| π SQL Injection Scanner | Detect SQL injection vulnerabilities | Intermediate |
| Tool | Purpose | Skill Level |
|---|---|---|
| π Info Gathering Tool | Comprehensive target reconnaissance | Intermediate |
| π Password Generator | Create secure passwords | Beginner |
| Tool | Purpose | Skill Level |
|---|---|---|
| π₯οΈ Remote Access Tools | Understand RAT techniques | Advanced |
| π Socket Programming | Network communication fundamentals | Beginner |
By exploring this repository, you will learn:
- Network Security Fundamentals: Understanding how network protocols work and can be exploited
- Web Application Security: Common vulnerabilities and testing methodologies
- Information Gathering: Reconnaissance techniques used in penetration testing
- Ethical Hacking Principles: Responsible security testing practices
- Python for Security: Using Python for cybersecurity automation
- Tool Development: Creating custom security tools
- π Python 3.7+
- π§ Linux environment (recommended) or Windows with WSL
- π Basic understanding of networking concepts
- βοΈ Permission to test on target systems
# Clone the repository
git clone https://github.com/rohandeb2/cybersecurity-learning-tools.git
cd cybersecurity-learning-tools
# Install required packages
pip install -r requirements.txt
# Set up virtual environment (recommended)
python -m venv cybersec-env
source cybersec-env/bin/activate # On Windows: cybersec-env\Scripts\activatecybersecurity-learning-tools/
β
βββ π MITM/ # Man-in-the-Middle techniques
β βββ arp_spoofer.py # ARP spoofing demonstration
β βββ dns_spoof.py # DNS spoofing concepts
β
βββ π network_scanner/ # Network discovery tools
β βββ network_scanner.py # Host discovery script
β
βββ π port_scanner/ # Port scanning utilities
β βββ port_scanner.py # Basic port scanner
β βββ fast_port_scanner.py # Threaded port scanner
β
βββ π brute_forcing/ # Brute force demonstrations
β βββ brute_forcing_tools.py # Directory brute forcing
β
βββ π info_gather_tool/ # Information gathering
β βββ info_gathering.py # Comprehensive recon tool
β
βββ π password_generator/ # Password utilities
β βββ password_generator.py # Secure password creator
β βββ random_password_creator.py
β
βββ π malware/ # RAT educational tools
β βββ server.py # C&C server demonstration
β
βββ π sockets/ # Network programming basics
β βββ socket_server.py # Server implementation
β βββ socket_client.py # Client implementation
β
βββ π web_pentest_tool/ # Web security tools
β
βββ π mega_project.py # All-in-one security toolkit
βββ π scrape_data_from_website.py # Web scraping tool
βββ π sqli_scanner.py # SQL injection detector
βββ π README.md # This file
# Ubuntu/Debian
sudo apt-get update
sudo apt-get install python3 python3-pip python3-venv
# For advanced tools
sudo apt-get install build-essential python3-dev libnetfilter-queue-dev
# Install Python dependencies
pip install scapy requests beautifulsoup4 whois dnspython shodan argparseCreate a requirements.txt file:
scapy==2.4.5
requests==2.28.1
beautifulsoup4==4.11.1
python-whois==0.7.3
dnspython==2.2.1
shodan==1.28.0
argparse==1.4.0# Discover hosts on local network
python network_scanner/network_scanner.py 192.168.1.0/24
# Port scan a target (authorized testing only!)
python port_scanner/port_scanner.py 192.168.1.100 1 1000# Information gathering (authorized targets only)
python info_gather_tool/info_gathering.py -d example.com
# Web scraping
python scrape_data_from_website.py
# SQL injection testing (authorized testing only)
python sqli_scanner.py# Generate secure passwords
python password_generator/password_generator.py -c lud -l 16- Start with Socket Programming to understand network communication
- Use Password Generator to learn about secure password creation
- Explore Web Scraping for basic information gathering
- Network Scanner - Learn host discovery techniques
- Port Scanner - Understand service enumeration
- Information Gathering Tool - Comprehensive reconnaissance
- SQL Injection Scanner - Web application vulnerabilities
- MITM Tools - Network interception techniques (Lab environment only!)
- RAT Tools - Understanding malware behavior (Educational purposes)
- Mega Project - Integrated security toolkit
- "The Web Application Hacker's Handbook" by Dafydd Stuttard
- "Black Hat Python" by Justin Seitz
- "Penetration Testing: A Hands-On Introduction to Hacking" by Georgia Weidman
- OWASP Web Security Testing Guide
- Cybrary - Free Cybersecurity Training
- PortSwigger Web Security Academy
- HackTheBox - Penetration testing labs
- TryHackMe - Guided cybersecurity challenges
- VulnHub - Vulnerable VMs for practice
We welcome contributions to improve these educational tools! Please:
- π΄ Fork the repository
- πΏ Create a feature branch (
git checkout -b feature/educational-improvement) - πΎ Commit your changes (
git commit -am 'Add educational content') - π€ Push to the branch (
git push origin feature/educational-improvement) - π Create a Pull Request
- β Ensure all tools include proper educational disclaimers
- π Add comprehensive documentation
- π§ͺ Include usage examples
- βοΈ Follow ethical hacking principles
This project is licensed under the MIT License - see the LICENSE file for details.
Note: This license does not grant permission to use these tools for illegal activities. Always ensure you have proper authorization before testing any system.