> cat /dev/github | grep security-tools
discovered 30 Mar 2026

Cybersecurity-Projects

Python ★ 1342 via github-topic
→ View on GitHub

AI Summary: The Cybersecurity Projects repository offers a collection of 67 hands-on projects spanning from beginner to advanced levels, designed to enhance practical skills in cybersecurity. It includes structured certification roadmaps for various roles within the field, as well as a comprehensive array of learning resources such as tools, courses, and frameworks for cybersecurity professionals. Notable features include the full source code availability for projects, covering diverse topics like port scanning, keylogging, and encryption techniques.


README

Kali-dragon-icon svg

Cybersecurity Projects 🐉

67 Cybersecurity Projects, Certification Roadmaps & Resources

stars forks issues license
projects resources
contribute

Made possible by CertGames

View Complete Projects:

Projects

Currently building: Binary Analysis Tool


Quick Navigation

Projects

67 hands-on cybersecurity projects with full source code, from beginner to advanced level.

Certification Roadmaps

10 structured career paths with certification guides for SOC Analyst, Pentester, Security Engineer, and more.

Learning Resources

Tools, courses, certifications, communities, and frameworks for cybersecurity professionals.


Projects

Beginner Projects

ProjectInfoWhat You’ll Learn
Simple Port Scanner
Async TCP port scanner in C++ @deniskhud
2-4h C++ BeginnerTCP socket programming • Async I/O patterns • Service detection
Source Code | Docs
Keylogger
Capture keyboard events with timestamps
1-2h Python BeginnerEvent handling • File I/O • Ethical considerations
Source Code | Docs
Caesar Cipher
CLI encryption/decryption tool
1-2h Python BeginnerClassical cryptography • Brute force attacks • CLI design
Source Code | Docs
DNS Lookup CLI Tool
Query DNS records with WHOIS
2-3h Python BeginnerDNS protocols • WHOIS queries • Reverse DNS lookup
Source Code | Docs
Simple Vulnerability Scanner
Check software against CVE databases
3-4h Go BeginnerCVE databases • Dependency scanning • Vulnerability assessment
Source Code | Docs
Metadata Scrubber Tool
Remove EXIF and privacy metadata @Heritage-XioN
2-3h Python BeginnerEXIF data • Privacy protection • Batch processing
Source Code | Docs
Network Traffic Analyzer
Capture and analyze packets
3-5h Python C++ BeginnerPacket capture • Protocol analysis • Traffic visualization
Source (C++) | Docs (C++) | Source (Python) | Docs (Python)
Hash Cracker
Dictionary and brute-force cracking
3-4h C++ BeginnerHash algorithms • Dictionary attacks • Password security
Source Code | Docs
Steganography Multi-Tool
Hide data in images, audio, QR, PDFs, text
2-3h Python BeginnerMulti-format steganography • Zero-width Unicode • Audio LSB • QR exploitation
Learn More
Ghost on the Wire
L2 attack & defense: MAC spoofing + ARP detection
2-3h Python BeginnerARP protocol • MAC spoofing • MITM detection • L2 trust mapping
Learn More
Canary Token Generator
Self-hosted honeytokens that alert on access
2-3h Go BeginnerDeception defense • Honeytokens • Webhook alerting • Intrusion detection
Learn More
Security News Scraper
Aggregate cybersecurity news
3-4h Python BeginnerWeb scraping • CVE parsing • Database storage
Learn More
Phishing Domain Generator & Quishing Scanner
Typosquat generation + QR phishing detection
2-3h Python BeginnerHomoglyph attacks • Typosquatting • QR code analysis • Domain intelligence
Learn More
SSH Brute Force Detector
Monitor and block SSH attacks
2-4h Python BeginnerLog parsing • Attack detection • Firewall automation
Learn More
Simple C2 Beacon
Command and Control beacon/server
3-5h Python React Docker BeginnerC2 architecture • MITRE ATT&CK • WebSocket protocol • XOR encoding
Source Code | Docs
Base64 Encoder/Decoder
Multi-format encoding tool
1h Python BeginnerBase64/32 encoding • URL encoding • Auto-detection
Source Code | Docs
Linux CIS Hardening Auditor
CIS benchmark compliance checker
3-4h Bash BeginnerCIS benchmarks • System hardening • Compliance scoring • Shell scripting
Learn More
Systemd Persistence Scanner
Hunt Linux persistence mechanisms
2-3h Go BeginnerPersistence techniques • Systemd internals • Cron analysis • Threat hunting
Learn More
Linux eBPF Security Tracer
Real-time syscall tracing with eBPF
2-3h Python C BeginnereBPF programs • Syscall tracing • BCC framework • Security observability
Learn More
Trojan Application Builder
Educational malware lifecycle demo
2-3h Python BeginnerTrojan anatomy • Data exfiltration • File encryption • Attack lifecycle
Learn More
DNS Sinkhole
Pi-hole-style malware domain blocker
3-4h Go BeginnerDNS protocol • Blocklist management • Query logging • Network defense
Learn More
Firewall Rule Engine
Parse and validate iptables/nftables rules
2-3h V BeginnerFirewall internals • Rule parsing • iptables/nftables • V language
Source Code | Docs
LLM Prompt Injection Firewall
Detect and block prompt injection attacks
2-3h Python BeginnerAI security • Prompt injection • Input sanitization • LLM defense
Learn More

Intermediate Projects

ProjectInfoWhat You’ll Learn
Payload Obfuscation Engine
Multi-layer payload obfuscation toolkit
2-4d Go IntermediateObfuscation techniques • Polymorphism • AV evasion • Signature detection
Learn More
SIEM Dashboard
Log aggregation with correlation
3-5d Flask React IntermediateSIEM concepts • Log correlation • Full-stack development
Source Code | Docs
Token Abuse Playground
15+ token vulnerabilities to exploit and fix
3-5d FastAPI React IntermediateJWT exploitation • OAuth attacks • Session security • Token forensics
Learn More
Supply Chain Attack Simulator
Fake PyPI package dependency confusion demo
2-4d Python IntermediateSupply chain attacks • Dependency confusion • Package security • PyPI internals
Learn More
DDoS Mitigation Tool
Detect traffic spikes
2-4d Go IntermediateDDoS detection • Rate limiting • Anomaly detection
Learn More
Secrets Scanner
Scan codebases and git history for leaked secrets
1-2d Go IntermediateSecret detection • Shannon entropy • HIBP k-anonymity • SARIF output
Source Code | Docs
API Security Scanner
Enterprise API vulnerability scanner
3-5d FastAPI React Docker IntermediateOWASP API Top 10 • ML fuzzing • GraphQL/SOAP testing
Source Code | Docs
Wireless Deauth Detector
Monitor WiFi deauth attacks
2-4d Rust IntermediateWireless security • Packet sniffing • Attack detection
Learn More
Credential Harvester
Post-exploitation credential collection
2-4d Nim IntermediateCredential extraction • Browser forensics • Red team tooling • Nim language
Learn More
Binary Analysis Tool
Disassemble and analyze executables
3-5d Rust IntermediateBinary analysis • String extraction • Malware detection
Learn More
Chaos Engineering Security Tool
Inject security failures to test resilience
3-5d Go IntermediateChaos engineering • Security resilience • Credential spraying • Auth testing
Learn More
Credential Rotation Enforcer
Track and enforce credential rotation policies
2-4d Python IntermediateCredential hygiene • Secret rotation • Compliance dashboards • API integration
Learn More
Race Condition Exploiter
TOCTOU race condition attack & defense lab
3-5d FastAPI React IntermediateTOCTOU attacks • Double-spend bugs • Concurrent exploitation • Race visualization
Learn More
Self-Hosted Shodan Clone
Internet-connected device search engine
3-5d Go React IntermediateService fingerprinting • Network scanning • OSINT • Search engine design
Learn More
JA3/JA4 TLS Fingerprinting Tool
Fingerprint TLS clients by handshake
2-4d Rust IntermediateTLS handshake analysis • JA3/JA4 hashing • Bot detection • Malware C2 identification
Learn More
Mobile App Security Analyzer
Decompile and analyze mobile apps
3-5d Python IntermediateAPK/IPA analysis • Reverse engineering • OWASP Mobile
Learn More
DLP Scanner
Data Loss Prevention for files, DBs, and traffic
2-4d Python IntermediatePII detection • GDPR/HIPAA compliance • Pattern matching • Data classification
Learn More
Lua/Nginx Edge Backend
Full CRUD backend via Lua in Nginx
3-5d Lua Nginx IntermediateEdge computing • OpenResty • Lua scripting • WAF • JWT at the edge
Learn More
Privesc Playground
20+ privilege escalation paths to exploit
3-5d Python IntermediateSUID exploitation • Sudo abuse • Cron hijacking • GTFOBins • Capability abuse
Learn More
SBOM Generator & Vulnerability Matcher
Software Bill of Materials with CVE matching
2-4d Go IntermediateSPDX/CycloneDX formats • Dependency analysis • CVE databases • EO 14028 compliance
Learn More
Subdomain Takeover Scanner
Detect dangling DNS records
2-4d Go IntermediateDNS enumeration • CNAME analysis • Cloud resource claiming • Bug bounty
Learn More
GraphQL Security Tester
Automated GraphQL vulnerability testing
2-4d Python IntermediateIntrospection attacks • Query depth DoS • Authorization bypass • Batching abuse
Learn More
Docker Security Audit
CIS Docker Benchmark scanner
1-2d Go Docker IntermediateCIS benchmarks • Container security • Multiple output formats
Source Code | Docs

Advanced Projects

ProjectInfoWhat You’ll Learn
API Rate Limiter
Distributed rate limiting middleware
1w Python Redis AdvancedToken bucket algorithm • Distributed systems • Redis backend
Source Code | Docs
Encrypted Chat Application
Real-time E2EE messaging
1-2w FastAPI SolidJS PostgreSQL AdvancedSignal Protocol • Double Ratchet • WebAuthn • WebSockets
Source Code | Docs
Exploit Development Framework
Modular exploitation framework
3-4w C++ AdvancedExploit development • Payload generation • Plugin architecture
Learn More
AI Threat Detection
ML-powered nginx threat detection
3-4w FastAPI React PyTorch AdvancedML ensemble (AE + RF + IF) • ONNX inference • Real-time detection
Source Code
Bug Bounty Platform
Full vulnerability disclosure platform
2-3w FastAPI React PostgreSQL AdvancedFull-stack development • CVSS scoring • Workflow automation
Source Code | Docs
Cloud Security Compliance Dashboard
Multi-cloud compliance with CIS, SOC2, HIPAA
2-3w Go React AWS AdvancedCIS benchmarks • SOC2/HIPAA compliance • Cost-security optimization • Drift detection
Learn More
Malware Analysis Platform
Automated sandbox analysis
2-3w Rust Docker AdvancedMalware analysis • Sandboxing • YARA rules • IOC extraction
Learn More
Quantum Resistant Encryption
Post-quantum cryptography
3-4w Python AdvancedPost-quantum algorithms • Hybrid encryption • Kyber/Dilithium
Learn More
Zero Day Vulnerability Scanner
Coverage-guided fuzzing
2-3w Rust C AdvancedFuzzing • Vulnerability research • Crash triage
Learn More
Distributed Password Cracker
GPU-accelerated cracking
3-4w C++ CUDA AdvancedDistributed systems • GPU computing • Hash cracking
Learn More
Kernel Rootkit Detection
Detect kernel-level rootkits
2-3w Rust AdvancedKernel internals • Memory forensics • Rootkit detection
Learn More
Blockchain Smart Contract Auditor
Solidity vulnerability analysis
3-4w Python Solidity AdvancedSmart contracts • Static analysis • Solidity security
Learn More
Adversarial ML Attacker
Generate adversarial examples
3-4w Python TensorFlow AdvancedAdversarial ML • FGSM/DeepFool • Model robustness
Learn More
Advanced Persistent Threat Simulator
Multi-stage APT simulation
3-4w Go AdvancedAPT techniques • C2 infrastructure • Lateral movement
Learn More
Hardware Security Module Emulator
Software HSM with PKCS#11
2-3w C AdvancedHSM concepts • PKCS#11 interface • Cryptographic operations
Learn More
Network Covert Channel
Data exfiltration techniques
3-4w Rust AdvancedCovert channels • Data exfiltration • Steganography
Learn More
Automated Penetration Testing
Full pentest automation
3-4w Python AdvancedPentest automation • Recon to exploitation • Report generation
Learn More
Haskell Reverse Proxy
Functional reverse proxy with security middleware
2-3w Haskell AdvancedFunctional programming • Reverse proxy design • Security middleware • Haskell
Source Code
“Monitor the Situation” Dashboard
Real-time cyber threat situational awareness
3-4w Python React AdvancedThreat intelligence • CVE tracking • MITRE ATT&CK • OSINT • Real-time dashboards
Learn More
Honeypot Network
Multi-service honeypot deployment & analysis
2-3w Go AdvancedHoneypot deployment • Attacker behavior analysis • IOC extraction • MITRE mapping
Learn More
Supply Chain Security Analyzer
Dependency vulnerability analysis
2-3w Go AdvancedSupply chain security • Dependency analysis • Malicious packages
Learn More

Learn More

Certification Roadmaps - Career paths for SOC Analyst, Pentester, Security Engineer, GRC Analyst, and 6 more tracks

Learning Resources - Tools, courses, certifications, YouTube channels, Reddit communities, and security frameworks

License

AGPL 3.0