{"id":29161853,"url":"https://github.com/gz30eee/cybersecurity-tools","last_synced_at":"2025-07-01T04:09:45.792Z","repository":{"id":285719444,"uuid":"959086239","full_name":"GZ30eee/cybersecurity-tools","owner":"GZ30eee","description":"A collection of open-source, terminal-based security tools for network analysis, penetration testing, and vulnerability assessment. Use these tools responsibly to enhance cybersecurity research and ethical hacking.","archived":false,"fork":false,"pushed_at":"2025-04-02T10:01:39.000Z","size":30,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"master","last_synced_at":"2025-04-02T10:30:59.603Z","etag":null,"topics":["blueteam","cyberdefense","cybersecurity","ethical-hacking","hackingtools","infosec","malware","network-security","open-source","penetration-testing","pythonsecurity","redteam","security-tools","securityre","vulnerability-assessment"],"latest_commit_sha":null,"homepage":"https://v0-cybersecurity-landing-page-tau.vercel.app/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/GZ30eee.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-04-02T08:44:54.000Z","updated_at":"2025-04-02T10:01:42.000Z","dependencies_parsed_at":"2025-04-02T10:31:41.503Z","dependency_job_id":"9340042e-a5d6-414c-9cf0-e41f0bfb2dea","html_url":"https://github.com/GZ30eee/cybersecurity-tools","commit_stats":null,"previous_names":["gz30eee/cybersecurity-tools"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/GZ30eee/cybersecurity-tools","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/GZ30eee%2Fcybersecurity-tools","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/GZ30eee%2Fcybersecurity-tools/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/GZ30eee%2Fcybersecurity-tools/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/GZ30eee%2Fcybersecurity-tools/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/GZ30eee","download_url":"https://codeload.github.com/GZ30eee/cybersecurity-tools/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/GZ30eee%2Fcybersecurity-tools/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":262893662,"owners_count":23380712,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["blueteam","cyberdefense","cybersecurity","ethical-hacking","hackingtools","infosec","malware","network-security","open-source","penetration-testing","pythonsecurity","redteam","security-tools","securityre","vulnerability-assessment"],"created_at":"2025-07-01T04:09:45.191Z","updated_at":"2025-07-01T04:09:45.778Z","avatar_url":"https://github.com/GZ30eee.png","language":"Python","readme":"![image](https://github.com/user-attachments/assets/ba543ba9-d673-45cd-9ce1-f52d32dbb7ac)\r\n\r\n## Cybersecurity Tools  \r\n*A collection of powerful terminal-based security tools for network analysis, penetration testing, and vulnerability assessment.*  \r\n\r\n---\r\n\r\n### About the Project  \r\nThis repository provides a suite of open-source cybersecurity tools designed for security professionals, ethical hackers, and researchers. These tools cover various aspects of network security, password security, system monitoring, and web vulnerability scanning. The primary goal is to enhance security awareness and aid in the detection of potential vulnerabilities in networks and applications.  \r\n\r\n**Important Notice:** These tools should only be used for ethical purposes. Ensure you have permission before conducting security tests on any network or system. Unauthorized testing is illegal and punishable by law.  \r\n\r\n---\r\n\r\n### Features \u0026 Tools  \r\n\r\n#### Network Security  \r\n- **Intrusion Detection System** (`ids.py`): Monitors network traffic and detects potential denial-of-service (DoS) attacks.  \r\n- **Port Scanner** (`port_scanner.py`): Scans target systems for open ports and identifies potential vulnerabilities.  \r\n- **Packet Sniffer** (`packet_sniffer.py`): Captures and analyzes network packets in real-time to detect anomalies.  \r\n\r\n#### Password Security  \r\n- **Hash Cracker** (`hash_cracker.py`): Uses wordlists to crack hashed passwords and assess security risks.  \r\n- **Password Strength Checker** (`password_checker.py`): Evaluates password strength and suggests improvements to enhance security.  \r\n\r\n#### Web Security  \r\n- **Web Vulnerability Scanner** (`web_scanner.py`): Detects security vulnerabilities such as SQL injection, cross-site scripting (XSS), and misconfigurations.  \r\n\r\n---\r\n\r\n### Installation \u0026 Setup  \r\n\r\n1. **Clone the Repository:**  \r\n   ```bash\r\n   git clone https://github.com/GZ30eee/cybersecurity-tools.git\r\n   cd cybersecurity-tools\r\n   ```  \r\n\r\n2. **Install Dependencies:**  \r\n   ```bash\r\n   pip install -r requirements.txt\r\n   ```  \r\n\r\n3. **Run Any Tool:**  \r\n   ```bash\r\n   python tools/network/ids.py --help\r\n   ```  \r\n\r\n4. **Execute All Security Tools:**  \r\n   ```bash\r\n   python scripts/run_all_tools.py\r\n   ```  \r\n\r\n---\r\n\r\n### Usage Examples  \r\n\r\n#### Running the Port Scanner  \r\n```bash\r\npython tools/network/port_scanner.py -t 192.168.1.1 -p 1-1000\r\n```\r\n\r\n#### Checking Password Strength  \r\n```bash\r\npython tools/password/password_checker.py --password \"MySecurePass123!\"\r\n```\r\n\r\n#### Scanning a Website for Vulnerabilities  \r\n```bash\r\npython tools/web/web_scanner.py --url https://example.com\r\n```\r\n\r\n---\r\n\r\n### Contributing  \r\nContributions are welcome. If you have improvements, bug fixes, or new security tools to add, feel free to submit a pull request. Please ensure that all contributions adhere to ethical hacking principles.  \r\n\r\nTo contribute:\r\n1. Fork the repository.\r\n2. Create a new branch (`git checkout -b feature-branch`).\r\n3. Commit changes (`git commit -m \"Added new security feature\"`).\r\n4. Push to the branch (`git push origin feature-branch`).\r\n5. Open a pull request.  \r\n\r\n---\r\n\r\n### License  \r\nThis project is licensed under the **MIT License**. See the [LICENSE](LICENSE) file for details.  \r\n\r\n---\r\n\r\n### Contact \u0026 Support  \r\n- **GitHub Repository:** [Cybersecurity Tools](https://github.com/GZ30eee/cybersecurity-tools)  \r\n- **Issues \u0026 Bug Reports:** Please open an issue on the GitHub repository for any technical problems or feature requests.  \r\n\r\nThis project is intended to be a helpful resource for security research and awareness. Use it responsibly and contribute to building a safer cyberspace.\r\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgz30eee%2Fcybersecurity-tools","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fgz30eee%2Fcybersecurity-tools","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgz30eee%2Fcybersecurity-tools/lists"}