+
Skip to content

alexola/cyber

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

66 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

alt text

A powerful, modular suite of Python-based cybersecurity tools. Built for learning, testing, and enhancing both offensive and defensive security skills that I have been learning and turning into a real-life project.

⚙️ This project was created as a hands-on journey to sharpen coding skills and to gain the confidence and capability to build custom cybersecurity tools from scratch.


✅ Completed Tools

  • Password Strength Checker
  • Checks password complexity
  • Optional entropy scoring
  • Port Scanner /Normal & Stealth mode
  • Subdomain Enumerator Working on Stealth mode

🚧 Tools in Progress

  • Whois + DNS Recon Tool
  • Simple Packet Sniffer
  • IP Rotator / IP Hider
  • Brute-Force Login Tool
  • Malware Analysis Sandbox
  • Log Analyzer for Intrusion Detection
  • Simple Honeypot
  • Payload Generator

🛠️ Installation

Clone the repo:

git clone https://github.com/alexola/cyber.git
cd cyber

Install dependencies:

pip install -r requirements.txt

🔐 Password Strength Checker

✨ Features ls

  • Modular design: easily add new tools
  • Menu-driven interface for easy tool selection
  • Password strength checker with entropy scoring
  • Clean codebase and repository hygieneevaluates the strength of user-provided passwords based on length, character variety, and more.

Usage

python3 recon-suite/main.py

Output Example

Enter your password: P@ssw0rd123!
Password Strength: Strong
Feedback: Good job! Try not to reuse this password across sites.

🌐 Subdomain Enumerator

Supports both normal and stealth modes.
You can use your own wordlist with -w or --wordlist.

Usage

python3 [subdomain_enumerator.py](http://_vscodecontentref_/1) example.com

Output Example

[*] Loaded 1000 subdomain prefixes
[*] Enumerating subdomains for: example.com

[*] Found: www.example.com -> 93.184.216.34
[*] Found: mail.example.com -> 93.184.216.34
...

🧼 Repository Hygiene

To maintain a clean, efficient project, we’ve included a .gitignore file to exclude:

  • Python bytecode & cache
  • Environment folders (env/, venv/)
  • OS clutter files (.DS_Store, Thumbs.db)
  • IDE configs (.vscode/, .idea/)
  • Logs, temp files, and backups

➡️ See .gitignore for the full list

🤝 Contributing

As this is a learning-focused open project. Pull requests, issues, and suggestions are welcome the idea is to keep on growing this toolset .

So please feel free to fork the project, work on a feature/tool, and open a pull request. Even simple feedback is appreciated!


📜 License

MIT License — see the LICENSE file for full details.


👩‍💻 Author

GitHub: alexola

⚠️ Note:
To use the port scanner in stealth mode, you must run the program with administrator privileges:

  • On macOS/Linux: use sudo python3 recon-suite/main.py
  • On Windows: run your terminal as Administrator

This is required for sending raw packets (SYN scans) with Scapy.

About

Tools for educational purposes

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载