- Overview
- 🛠️ Tools Overview
- 📚 Learning Objectives
- 🚀 Getting Started
- 📁 Project Structure
- 🔧 Installation
- 📖 Usage Examples
- 🎯 Learning Path
- 📚 Additional Resources
- 🤝 Contributing
- 📄 License
This repository contains a collection of cybersecurity tools and scripts developed for educational purposes. Each tool demonstrates different aspects of network security, penetration testing, and vulnerability assessment techniques commonly used in the cybersecurity field.
The author is not responsible for any misuse of these tools. Users are solely responsible for their actions.
| Tool | Purpose | Skill Level |
|---|---|---|
| 🔍 Network Scanner | Discover active hosts on network | Beginner |
| 🚪 Port Scanner | Identify open ports and services | Beginner |
| 🌐 MITM Tools | Understand network interception techniques | Advanced |
| Tool | Purpose | Skill Level |
|---|---|---|
| 🕷️ Web Scraper | Extract information from websites | Beginner |
| 💥 Directory Brute Forcer | Find hidden web directories | Intermediate |
| 💉 SQL Injection Scanner | Detect SQL injection vulnerabilities | Intermediate |
| Tool | Purpose | Skill Level |
|---|---|---|
| 🔍 Info Gathering Tool | Comprehensive target reconnaissance | Intermediate |
| 🔐 Password Generator | Create secure passwords | Beginner |
| Tool | Purpose | Skill Level |
|---|---|---|
| 🖥️ Remote Access Tools | Understand RAT techniques | Advanced |
| 🔌 Socket Programming | Network communication fundamentals | Beginner |
By exploring this repository, you will learn:
- Network Security Fundamentals: Understanding how network protocols work and can be exploited
- Web Application Security: Common vulnerabilities and testing methodologies
- Information Gathering: Reconnaissance techniques used in penetration testing
- Ethical Hacking Principles: Responsible security testing practices
- Python for Security: Using Python for cybersecurity automation
- Tool Development: Creating custom security tools
- 🐍 Python 3.7+
- 🐧 Linux environment (recommended) or Windows with WSL
- 📚 Basic understanding of networking concepts
- ⚖️ Permission to test on target systems
# Clone the repository
git clone https://github.com/rohandeb2/cybersecurity-learning-tools.git
cd cybersecurity-learning-tools
# Install required packages
pip install -r requirements.txt
# Set up virtual environment (recommended)
python -m venv cybersec-env
source cybersec-env/bin/activate # On Windows: cybersec-env\Scripts\activatecybersecurity-learning-tools/
│
├── 📂 MITM/ # Man-in-the-Middle techniques
│ ├── arp_spoofer.py # ARP spoofing demonstration
│ └── dns_spoof.py # DNS spoofing concepts
│
├── 📂 network_scanner/ # Network discovery tools
│ └── network_scanner.py # Host discovery script
│
├── 📂 port_scanner/ # Port scanning utilities
│ ├── port_scanner.py # Basic port scanner
│ └── fast_port_scanner.py # Threaded port scanner
│
├── 📂 brute_forcing/ # Brute force demonstrations
│ └── brute_forcing_tools.py # Directory brute forcing
│
├── 📂 info_gather_tool/ # Information gathering
│ └── info_gathering.py # Comprehensive recon tool
│
├── 📂 password_generator/ # Password utilities
│ ├── password_generator.py # Secure password creator
│ └── random_password_creator.py
│
├── 📂 malware/ # RAT educational tools
│ └── server.py # C&C server demonstration
│
├── 📂 sockets/ # Network programming basics
│ ├── socket_server.py # Server implementation
│ └── socket_client.py # Client implementation
│
├── 📂 web_pentest_tool/ # Web security tools
│
├── 📄 mega_project.py # All-in-one security toolkit
├── 📄 scrape_data_from_website.py # Web scraping tool
├── 📄 sqli_scanner.py # SQL injection detector
└── 📄 README.md # This file
# Ubuntu/Debian
sudo apt-get update
sudo apt-get install python3 python3-pip python3-venv
# For advanced tools
sudo apt-get install build-essential python3-dev libnetfilter-queue-dev
# Install Python dependencies
pip install scapy requests beautifulsoup4 whois dnspython shodan argparseCreate a requirements.txt file:
scapy==2.4.5
requests==2.28.1
beautifulsoup4==4.11.1
python-whois==0.7.3
dnspython==2.2.1
shodan==1.28.0
argparse==1.4.0# Discover hosts on local network
python network_scanner/network_scanner.py 192.168.1.0/24
# Port scan a target (authorized testing only!)
python port_scanner/port_scanner.py 192.168.1.100 1 1000# Information gathering (authorized targets only)
python info_gather_tool/info_gathering.py -d example.com
# Web scraping
python scrape_data_from_website.py
# SQL injection testing (authorized testing only)
python sqli_scanner.py# Generate secure passwords
python password_generator/password_generator.py -c lud -l 16- Start with Socket Programming to understand network communication
- Use Password Generator to learn about secure password creation
- Explore Web Scraping for basic information gathering
- Network Scanner - Learn host discovery techniques
- Port Scanner - Understand service enumeration
- Information Gathering Tool - Comprehensive reconnaissance
- SQL Injection Scanner - Web application vulnerabilities
- MITM Tools - Network interception techniques (Lab environment only!)
- RAT Tools - Understanding malware behavior (Educational purposes)
- Mega Project - Integrated security toolkit
- "The Web Application Hacker's Handbook" by Dafydd Stuttard
- "Black Hat Python" by Justin Seitz
- "Penetration Testing: A Hands-On Introduction to Hacking" by Georgia Weidman
- OWASP Web Security Testing Guide
- Cybrary - Free Cybersecurity Training
- PortSwigger Web Security Academy
- HackTheBox - Penetration testing labs
- TryHackMe - Guided cybersecurity challenges
- VulnHub - Vulnerable VMs for practice
We welcome contributions to improve these educational tools! Please:
- 🍴 Fork the repository
- 🌿 Create a feature branch (
git checkout -b feature/educational-improvement) - 💾 Commit your changes (
git commit -am 'Add educational content') - 📤 Push to the branch (
git push origin feature/educational-improvement) - 🔄 Create a Pull Request
- ✅ Ensure all tools include proper educational disclaimers
- 📚 Add comprehensive documentation
- 🧪 Include usage examples
- ⚖️ Follow ethical hacking principles
This project is licensed under the MIT License - see the LICENSE file for details.
Note: This license does not grant permission to use these tools for illegal activities. Always ensure you have proper authorization before testing any system.