Nibba2018 / Cysec-Hacktoberfest

Welcome to the cybersecurity repository for the hacktoberfest.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

dsc logo

Cybersecurity Hacktoberfest repository

This repository contains two very basic programmes one of which is focused on networking while other on
a very beginner yet very important vulnerability information gathering


Key Logger

Key logger, often referred to as keystroke logger or keyboard capture, is the action of recording the keys struck on a keyboard, typically covertly ,so that person using the keyboard is unaware that their actions are being monitored. A key logger can be a software or a physical device we will be making one such software in this directory.

Know_Your_IP

IPv4 addresses are 32-bit numbers that are typically displayed in dotted decimal notation. A 32-bit address contains two primary parts: the network prefix and the host number. All hosts within a single network share the same network address. Each host also has an address that uniquely identifies it. IPv4 addresses are also classified into 5 different classes.

Reverse Shell

A Reverse Shell is a common tool used by attackers to take control of a victim machine. The attacker listens for incomimng connection requests as the victim tries to connect back to it. The attacker can now execute various tasks on the remote victim achine like Spawning a shell , taking a screenshot , uploading and downloading files, etc.

Head over to the directories to know more.

Contributing Guidelines

FOLLOW THE STEPS STRICTLY MENTIONED DURING THE SESSION

About

Welcome to the cybersecurity repository for the hacktoberfest.


Languages

Language:Python 94.1%Language:C 5.9%