Skip to content

Salvatore-Rendo/CAL-Cyber-Attacks-List

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Project logo

CAL Cyber Attacks List

Status GitHub Issues GitHub Pull Requests License


A list of cyber Attacks made with Python or C

📝 Table of Contents

🧐 About

A list of cyber Attacks mad with Python or C, feel free to check it out

⚠️ Warning

DISCLAIMER: THIS IS AN EXAMPLE FOR PRACTICING CYBERSECURITY-RELATED TOPICS

This repository is solely intended for educational and practice purposes related to cybersecurity. It is NOT meant to be used for any malicious or illegal activities.

Please note:

  • Do not use this software or any information provided here with malicious intent.
  • This repository is meant for educational purposes to enhance cybersecurity knowledge and skills.
  • I do not endorse, encourage, or support any form of illegal or unethical activities.

Remember to use the knowledge gained from this repository responsibly and in compliance with applicable laws and regulations.

Contributors: If you contribute to this repository, you are expected to follow the guidelines, which align with these principles.

This disclaimer is intended to make my stance on the responsible and ethical use of cybersecurity knowledge clear. If you have any questions or concerns, please feel free to reach out.

Thank you for understanding and adhering to these principles.

🏁 Getting Started

Installing

git clone https://github.com/Salvatore-Rendo/CAL-Cyber-Attacks-List
cd CAL-Cyber-Attacks-List
pip3 install -r requirements.txt

🎈 Usage

Change directory inside the projects to chose the attack you want to use:

cd Attack-you-chose

Then run the helper to get a better understanding of the attack

python3 attack-you-chose.py -h

If the attack requires a target ip, you can easily create a dummy server with python:

python3 -m http.server [port to listen eg.4343]

Or with netcat:

nc -lk [port to listen eg.4343]

And use it to be the target of your attacks.

I recommend using a network analyzer (e.g., Wireshark) to observe the results of the attacks and to analyze the types of traffic they generate.

⛏️ Built Using

✍️ Authors

About

A list of some cyber attacks

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages