A powerful, modular suite of Python-based cybersecurity tools. Built for learning, testing, and enhancing both offensive and defensive security skills that I have been learning and turning into a real-life project.
⚙️ This project was created as a hands-on journey to sharpen coding skills and to gain the confidence and capability to build custom cybersecurity tools from scratch.
- Password Strength Checker
- Checks password complexity
- Optional entropy scoring
- Port Scanner /Normal & Stealth mode
- Subdomain Enumerator Working on Stealth mode
- Whois + DNS Recon Tool
- Simple Packet Sniffer
- IP Rotator / IP Hider
- Brute-Force Login Tool
- Malware Analysis Sandbox
- Log Analyzer for Intrusion Detection
- Simple Honeypot
- Payload Generator
Clone the repo:
git clone https://github.com/alexola/cyber.git
cd cyber
Install dependencies:
pip install -r requirements.txt
✨ Features ls
- Modular design: easily add new tools
- Menu-driven interface for easy tool selection
- Password strength checker with entropy scoring
- Clean codebase and repository hygieneevaluates the strength of user-provided passwords based on length, character variety, and more.
python3 recon-suite/main.py
Enter your password: P@ssw0rd123!
Password Strength: Strong
Feedback: Good job! Try not to reuse this password across sites.
Supports both normal and stealth modes.
You can use your own wordlist with -w
or --wordlist
.
python3 [subdomain_enumerator.py](http://_vscodecontentref_/1) example.com
[*] Loaded 1000 subdomain prefixes
[*] Enumerating subdomains for: example.com
[*] Found: www.example.com -> 93.184.216.34
[*] Found: mail.example.com -> 93.184.216.34
...
To maintain a clean, efficient project, we’ve included a .gitignore
file to exclude:
- Python bytecode & cache
- Environment folders (
env/
,venv/
) - OS clutter files (
.DS_Store
,Thumbs.db
) - IDE configs (
.vscode/
,.idea/
) - Logs, temp files, and backups
➡️ See
.gitignore
for the full list
As this is a learning-focused open project. Pull requests, issues, and suggestions are welcome the idea is to keep on growing this toolset .
So please feel free to fork the project, work on a feature/tool, and open a pull request. Even simple feedback is appreciated!
MIT License — see the LICENSE
file for full details.
GitHub: alexola
⚠️ Note:
To use the port scanner in stealth mode, you must run the program with administrator privileges:
- On macOS/Linux: use
sudo python3 recon-suite/main.py
- On Windows: run your terminal as Administrator
This is required for sending raw packets (SYN scans) with Scapy.