{"id":25945937,"url":"https://github.com/tom474/security_attacks_analysis","last_synced_at":"2025-03-04T09:19:31.760Z","repository":{"id":268246450,"uuid":"903297680","full_name":"tom474/security_attacks_analysis","owner":"tom474","description":"[RMIT 2024C] COSC2539 - Security in Computing and IT - Programming-based Security Project","archived":false,"fork":false,"pushed_at":"2025-02-15T15:58:05.000Z","size":48,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-02-15T16:32:36.767Z","etag":null,"topics":["command-injection","cross-site-scripting","denial-of-service","security","security-attacks","sql-injection"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/tom474.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-12-14T08:31:00.000Z","updated_at":"2025-02-15T15:59:16.000Z","dependencies_parsed_at":"2024-12-15T14:42:18.271Z","dependency_job_id":null,"html_url":"https://github.com/tom474/security_attacks_analysis","commit_stats":null,"previous_names":["tom474/security_attacks_analysis"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tom474%2Fsecurity_attacks_analysis","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tom474%2Fsecurity_attacks_analysis/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tom474%2Fsecurity_attacks_analysis/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tom474%2Fsecurity_attacks_analysis/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/tom474","download_url":"https://codeload.github.com/tom474/security_attacks_analysis/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":241818874,"owners_count":20025219,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["command-injection","cross-site-scripting","denial-of-service","security","security-attacks","sql-injection"],"created_at":"2025-03-04T09:19:31.168Z","updated_at":"2025-03-04T09:19:31.754Z","avatar_url":"https://github.com/tom474.png","language":"Python","readme":"# Security Attacks Analysis  \n\nA project analyzing and simulating **various cybersecurity attacks** on a web-based system, including **SQL Injection, Cross-Site Scripting (XSS), Command Injection, and Denial of Service (DoS)**. The project also implements **security countermeasures** to mitigate these threats.\n\n## Tech Stack  \n\n- Python\n- Flask\n- SQLite \n\n## Features  \n\n### Attack Simulations  \n- **SQL Injection**: Exploits database vulnerabilities to manipulate or extract sensitive data.  \n- **Cross-Site Scripting (XSS)**: Injects malicious scripts that affect user interactions.  \n- **Command Injection**: Executes unauthorized system commands through web inputs.  \n- **Denial of Service (DoS)**: Overloads the system with excessive requests to disrupt service availability.  \n\n### Security Implementations  \n- **Parameterized Queries**: Prevents SQL Injection by using prepared statements.  \n- **Input Validation \u0026 Output Encoding**: Blocks XSS attacks by sanitizing user inputs.  \n- **Secure Command Execution**: Restricts unauthorized system command execution.  \n- **Rate Limiting \u0026 IP Blocking**: Prevents DoS attacks by limiting excessive requests.  \n- **Content Security Policy (CSP)**: Protects against client-side script injections.  \n- **Logging \u0026 Monitoring**: Tracks suspicious activities for security analysis.  \n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftom474%2Fsecurity_attacks_analysis","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Ftom474%2Fsecurity_attacks_analysis","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftom474%2Fsecurity_attacks_analysis/lists"}