0% found this document useful (0 votes)
8 views

Programming Projects - Cybercademy

this is what i research until now

Uploaded by

dipsonbhujel1025
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Programming Projects - Cybercademy

this is what i research until now

Uploaded by

dipsonbhujel1025
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

9/14/24, 6:33 PM Programming Projects | Cybercademy

Programming Projects
Find your next cybersecurity programming project or script idea to
sharpen your programming skills.

WANT TO CONTRIBUTE TO THIS PROJECT LIST?

Submit your project idea today. All types of projects are welcomed.

Submit Your Project Idea $

Why learn programming?

Programming has several uses for


cybersecurity. Learning how to read, write,
and develop applications in addition to
automation capabilities is powered through
programming languages.

https://cybercademy.org/programming-projects/ 1/5
9/14/24, 6:33 PM Programming Projects | Cybercademy

Programming Projects Lists


Search for your next programming project idea related
to cybersecurity. All kinds skill levels are included in this
following list below.

Click the project title for more details about the


project.

NOTE: Cybercademy and its affiliates do not

promote the use of the following ideas for unethical


and illegal uses, we do not take responsibility for
the use of, promotion, or spread of the following
ideas with the intent of illegitimate and illegal uses.
We assume these project ideas and descriptions
are used only for the purpose of at-home learning.

Create a Keylogger in Python


with Spyware Features
Create a keylogger in python with advanced features
including tracking clipboard data, taking screenshots,
recording the microphone, gathering key strokes, and
recording computer information.

Write a Program to Break a


Caesar Cipher
Use your favorite programming language to encrypt a
string message with a Caesar Cipher. Write a program
to break the encrypted string message.

https://cybercademy.org/programming-projects/ 2/5
9/14/24, 6:33 PM Programming Projects | Cybercademy

SQL Vulnerability Assessment


Structured Query Language (SQL) is used all over the
web and is vulnerable to an injection attack known as a
SQL injection attack. Using the SQL language, learn how
to conduct a SQL injection and ways to mitigate this
attack.

MAC Flooding Program


Use your favorite programming language to write a
MAC flooding program. MAC flooding is a technique
used to compromise the security network switches by
forcing legitimate entries out of the switches MAC table
– allowing for sensitive information to leak to portions
of the network.

A Cryptographic Message Project


Write a program to encrypt and decrypt a string
message with different types of cryptographic
algorithms. Compile the program into an executable
with the feature of allowing the user to choose the
algorithm to encrypt the message.

Write an HTTP Proxy


Write an HTTP proxy to examine web traffic and identify
suspicious content.

https://cybercademy.org/programming-projects/ 3/5
9/14/24, 6:33 PM Programming Projects | Cybercademy

The Socket Programming Project


Socket programming is a way for two nodes on a
network to communicate with each other. Socket
programming is most commonly implemented as a
client-server environment. Learn about socket
programming and apply your knowledge to create a
monitoring system.

Write a Hash Cracker


Using your favorite programming language, write a
program to crack weak hashing algorithms. Compile
your code into an executable and supply a hash.

Create a Port Scanner


A port scanner is a service used to find open ports of
computers and devices on a network. Use your favorite
programming language to write a port scanner.

https://cybercademy.org/programming-projects/ 4/5
9/14/24, 6:33 PM Programming Projects | Cybercademy

Write a Password Generator


Program
Use a popular programming or scripting language, such
as python, bash, C, etc to generate a strong, secure
password. Compile this generator into an executable so
you can generate passwords for the services you set
up.

Build a Password Manager


Use a popular programming to create, generate,
manage, and securely store your passwords. Use a
master password to unlock access to all other
passwords. Implement with secure cryptographic
design.

Create A Reverse Shell With


Python
A reverse shell initiates a shell session from the target
to the victim machine. Build a python based reverse-
shell generator tool which will dynamically generate the
reverse-shell script or the payload by taking the user ip
address as well as the listening port.

https://cybercademy.org/programming-projects/ 5/5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy