A list of cyber Attacks made with Python or C
A list of cyber Attacks mad with Python or C, feel free to check it out
DISCLAIMER: THIS IS AN EXAMPLE FOR PRACTICING CYBERSECURITY-RELATED TOPICS
This repository is solely intended for educational and practice purposes related to cybersecurity. It is NOT meant to be used for any malicious or illegal activities.
Please note:
- Do not use this software or any information provided here with malicious intent.
- This repository is meant for educational purposes to enhance cybersecurity knowledge and skills.
- I do not endorse, encourage, or support any form of illegal or unethical activities.
Remember to use the knowledge gained from this repository responsibly and in compliance with applicable laws and regulations.
Contributors: If you contribute to this repository, you are expected to follow the guidelines, which align with these principles.
This disclaimer is intended to make my stance on the responsible and ethical use of cybersecurity knowledge clear. If you have any questions or concerns, please feel free to reach out.
Thank you for understanding and adhering to these principles.
git clone https://github.com/Salvatore-Rendo/CAL-Cyber-Attacks-List
cd CAL-Cyber-Attacks-List
pip3 install -r requirements.txt
Change directory inside the projects to chose the attack you want to use:
cd Attack-you-chose
Then run the helper to get a better understanding of the attack
python3 attack-you-chose.py -h
If the attack requires a target ip, you can easily create a dummy server with python:
python3 -m http.server [port to listen eg.4343]
Or with netcat:
nc -lk [port to listen eg.4343]
And use it to be the target of your attacks.
I recommend using a network analyzer (e.g., Wireshark) to observe the results of the attacks and to analyze the types of traffic they generate.
- @Salvatore-Rendo - Idea & Initial work