Hands-on cybersecurity projects built for learning, experimentation, and practical security research — featuring offensive and defensive tools, automation scripts, and real-world simulations for ethical hacking practice.
- Basic honeypot — set up to catch and log attackers.
- Simple password cracker — dictionary/brute-force for learning
- Sniff network traffic tool — capture and analyze packets.
- Basic keylogger (lab-only) — learn keystroke capture mechanics.
- Phishing campaign simulator — create a safe training simulation.
- Wi-Fi security tester — evaluate home Wi-Fi weaknesses.
- Network vulnerability scanner — scan for open ports/services.
- Password cracking with GPUs — accelerate cracking using GPU.
- Browser extension for security testing — inject/scan pages.
- Subdomain enumeration tool — brute-force and DNS discovery.
- Directory brute-force tool — automated wordlist-based discovery.
- XSS finder — detect reflected/stored cross-site scripting.
- SQLi tester — detect and exploit injection vectors safely.
- CSRF checker — detect cross-site request forgery points.
- Reverse shell framework — generate/listen to shells in lab.
- Exploit Template Library — Reusable Exploit Skeletons.
- Shell upload tool — upload payloads to target test hosts.
- Simple ransomware simulator — behavior analysis in sandbox.
- Malware obfuscation practice — test packing/obfuscation techniques.
- Rootkit practice (sandbox) — create & remove benign rootkits.
- Kernel backdoor detector/creator (lab) — study kernel persistence.
- Steganography encoder/decoder — hide data in images/audio.
- DNS spoofing simulator — practice detection/attack methods.
- ARP spoof/mitm tool (lab) — learn MITM traffic interception.
- Packet injection tool — craft & send custom packets.
- Create custom payloads — modular payload generator.
- Firmware reverse-engineering — find flaws in embedded firmware.
- IoT device fuzzing tool — fuzz protocols for IoT devices.
- Bluetooth protocol tester — scan/exploit Bluetooth services.
- Mobile app vulnerability scanner — static/dynamic tests for apps.
- Web app crawler + vuln correlator — find attack paths.
- Automated vulnerability scanner integration — orchestrate multiple scanners.
- Social engineering toolkit — email/SMS template simulator for testing.
- Dark web scraper (research) — aggregate threat intel data.
- USB implant simulator — emulate malicious USB behaviors in lab.
- Binary reverse-engineering exercises — unpack and analyze binaries.
- Password spraying automation — test credential reuse patterns.
- Credential dump analyzer — parse and make sense of leaks.
- Side-channel attack experiments — timing/power analysis study.
- TLS downgrade & MITM tester — examine TLS weaknesses.
- Smart contract audit tools (offensive POV) — detect vulnerabilities.
- Blockchain pentest harness — test contract functions and flows.
- Hardware fault injection lab — observe failure-mode vulnerabilities.
- Cloud misconfiguration exploit scripts — target insecure cloud setups.
- API abuse/fuzzing tool — test REST/GraphQL abuse cases.
- Web sockets pentest tool — test real-time channels for issues.
- CSRF exploit demo kit — craft chained CSRF attacks for training.
- Automate phishing page builder — fast lab-only templates.
- ROP chain builder helper — create return-oriented payloads.
- Binary instrumentation toolkit — hook and manipulate processes.
- Vulnerability PoC repository — catalog proof-of-concepts.
- Network pivoting lab scripts — simulate lateral movement.
- Log evasion simulator — study evasion techniques in safe env.
- Exploit chaining workflow — automate multi-step exploit sequences.
- Password manager attack simulations — test vault export/weaknesses.
- IDS/IPS bypass tests — craft payloads to evade detection.
- Wireless protocol fuzzing — test Zigbee/LoRa/802.11 frames.
- C2 (command & control) mini framework — lab C2 functionality.
- Obfuscation & packer research toolkit — study packer effects.
- Red/Blue exercise scenarios generator — create realistic engagements.
- Digital forensic analysis lab — capture & analyze forensic artifacts.
- Basic malware analysis sandbox — run and observe malware safely.
- TLS setup & hardening guide — secure communication configs.
- Two-factor authentication demo implementation — test flows & bypasses.
- Snort/Suricata IDS setup — basic intrusion detection deployment.
- Configure firewall rule automation — templates & testing scripts.
- Host-based monitoring scripts — file/integrity/process watchers.
- Forensic timeline builder — correlate artifacts into timelines.
- Malware behavior analyzer — behavioral IOC extractor.
- Full-disk encryption demo & key management — best practices.
- Rootkit detection & removal toolkit — heuristics and scanners.
- Secure web application template — hardened starter app
- Secure API authentication examples — JWT/OAuth best practices.
- SIEM dashboard for logs — ingest and visualize security events.
- Threat detection using ML — anomaly detection prototype.
- Log aggregation & parser tools — normalize and search logs.
- Vulnerability management dashboard — track findings lifecycle.
- Cloud security posture tool — detect misconfigs and risky perms.
- Container security hardening scripts — scan and enforce images.
- Microservices security checklist & tests — secure interservice comms.
- SCADA/ICS security study lab — emulate industrial protocols safely.
- Secure CI/CD pipeline examples — signing, scanning, gating.
- Data leak prevention demo — detect exfiltration patterns.
- Honeynet — distributed honeypots with centralized logging.
- Threat intel collection & enrichment pipeline — enrich IOCs.
- Ransomware detection playbook — detect/prevent encryption activity.
