Skip to content

60 Cybersecurity Projects | Certification Roadmaps |Everything you need to build your cybersecurity portfolio

License

Notifications You must be signed in to change notification settings

CarterPerez-dev/Cybersecurity-Projects

Repository files navigation

Kali-dragon-icon svg

Cybersecurity Projects 🐉

60 Cybersecurity Projects, Certification Roadmaps & Resources

stars forks issues license
projects resources

View Complete Projects:


Quick Navigation

60 hands-on cybersecurity projects with full source code, from beginner to advanced level.

10 structured career paths with certification guides for SOC Analyst, Pentester, Security Engineer, and more.

Tools, courses, certifications, communities, and frameworks for cybersecurity professionals.


Projects

Beginner Projects

Project Info What You'll Learn
Simple Port Scanner
Async TCP port scanner in C++
2-4h C++ Beginner TCP socket programming • Async I/O patterns • Service detection
Source Code | Docs
Keylogger
Capture keyboard events with timestamps
1-2h Python Beginner Event handling • File I/O • Ethical considerations
Source Code | Docs
Caesar Cipher
CLI encryption/decryption tool
1-2h Python Beginner Classical cryptography • Brute force attacks • CLI design
Source Code | Docs
DNS Lookup CLI Tool
Query DNS records with WHOIS
2-3h Python Beginner DNS protocols • WHOIS queries • Reverse DNS lookup
Source Code | Docs
Simple Vulnerability Scanner
Check software against CVE databases
3-4h Go Beginner CVE databases • Dependency scanning • Vulnerability assessment
Source Code | Docs
Metadata Scrubber Tool
Remove EXIF and privacy metadata
2-3h Python Beginner EXIF data • Privacy protection • Batch processing
Source Code | Docs
Network Traffic Analyzer
Capture and analyze packets
3-5h Python Beginner Packet capture • Protocol analysis • Traffic visualization
Source Code | Docs
Hash Cracker
Dictionary and brute-force cracking
3-4h C++ Beginner Hash algorithms • Dictionary attacks • Password security
Learn More
Steganography Tool
Hide messages in images
2-3h Python Beginner LSB steganography • Image manipulation • Data hiding
Learn More
MAC Address Spoofer
Change network interface MAC
1-2h Python Beginner Network interfaces • MAC addresses • Vendor lookup
Learn More
File Integrity Monitor
Monitor directories with checksums
2-3h Go Beginner Cryptographic hashing • File monitoring • Alert systems
Learn More
Security News Scraper
Aggregate cybersecurity news
3-4h Python Beginner Web scraping • CVE parsing • Database storage
Learn More
Phishing URL Detector
Analyze URLs for phishing
2-3h Python Beginner URL analysis • Typosquatting detection • Safe browsing APIs
Learn More
SSH Brute Force Detector
Monitor and block SSH attacks
2-4h Python Beginner Log parsing • Attack detection • Firewall automation
Learn More
WiFi Network Scanner
Scan wireless networks
2-3h Python Beginner Wireless protocols • Encryption types • Rogue AP detection
Learn More
Base64 Encoder/Decoder
Multi-format encoding tool
1h Python Beginner Base64/32 encoding • URL encoding • Auto-detection
Learn More
Firewall Log Parser
Parse and visualize logs
3-4h Bash Beginner Log parsing • Pattern recognition • Data visualization
Learn More
ARP Spoofing Detector
Detect ARP attacks
2-3h Python Beginner ARP protocol • MAC tracking • MITM detection
Learn More
Windows Registry Monitor
Track registry changes
2-3h Python Beginner Windows registry • Persistence detection • System monitoring
Learn More
Ransomware Simulator
Educational encryption demo
2-3h Python Beginner File encryption • Ransomware behavior • Ethical testing
Learn More

Intermediate Projects

Project Info What You'll Learn
Reverse Shell Handler
Multi-client shell server
2-4d Go Intermediate Socket programming • Command execution • File transfer
Learn More
SIEM Dashboard
Log aggregation with correlation
3-5d Flask React Intermediate SIEM concepts • Log correlation • Full-stack development
Learn More
Threat Intelligence Aggregator
Collect and enrich IOCs
2-4d Python Intermediate Threat feeds • IOC enrichment • API integration
Learn More
OAuth Token Analyzer
Decode and validate JWT
2-4d Python Intermediate JWT tokens • OAuth vulnerabilities • Signature validation
Learn More
Web Vulnerability Scanner
Automated XSS, SQLi, CSRF testing
3-5d Python Intermediate Web vulnerabilities • Async scanning • Plugin architecture
Learn More
DDoS Mitigation Tool
Detect traffic spikes
2-4d Go Intermediate DDoS detection • Rate limiting • Anomaly detection
Learn More
Container Security Scanner
Scan Docker misconfigurations
1-2d Go Docker Intermediate Container security • Dockerfile analysis • Docker API
Learn More
API Security Scanner
Enterprise API vulnerability scanner
3-5d FastAPI React Docker Intermediate OWASP API Top 10 • ML fuzzing • GraphQL/SOAP testing
Source Code | Docs
Wireless Deauth Detector
Monitor WiFi deauth attacks
2-4d Rust Intermediate Wireless security • Packet sniffing • Attack detection
Learn More
Active Directory Enumeration
Enumerate AD infrastructure
2-4d Python Intermediate LDAP queries • AD structure • Privilege analysis
Learn More
Binary Analysis Tool
Disassemble and analyze executables
3-5d Rust Intermediate Binary analysis • String extraction • Malware detection
Learn More
Network Intrusion Prevention
Real-time packet inspection
3-5d Python Intermediate IPS concepts • Snort rules • Firewall integration
Learn More
Password Policy Auditor
Audit password policies
2-4d Python Intermediate Password security • Policy compliance • Weak password detection
Learn More
Cloud Asset Inventory
Discover cloud resources
1-2d Python AWS Intermediate Cloud APIs • Asset discovery • Cost tracking
Learn More
OSINT Reconnaissance Framework
Aggregate public intelligence
3-5d Python Intermediate OSINT techniques • Data aggregation • Target profiling
Learn More
SSL/TLS Certificate Scanner
Scan for SSL misconfigurations
2-4d Go Intermediate TLS/SSL protocols • Certificate validation • Cipher analysis
Learn More
Mobile App Security Analyzer
Decompile and analyze mobile apps
3-5d Python Intermediate APK/IPA analysis • Reverse engineering • OWASP Mobile
Learn More
Backup Integrity Checker
Verify backup integrity
3-5d Python Intermediate Backup validation • Restoration testing • Checksum verification
Learn More
Web Application Firewall
Reverse proxy with filtering
3-5d Rust Intermediate WAF concepts • Request filtering • Attack blocking
Learn More
Privilege Escalation Finder
Identify privilege escalation
2-4d Python Intermediate Privilege escalation • SUID binaries • Weak permissions
Learn More
Network Baseline Monitor
Monitor network behavior
2-4d Python Intermediate Baseline analysis • Anomaly detection • Traffic patterns
Learn More
Docker Security Audit
CIS Docker Benchmark scanner
1-2d Go Docker Intermediate CIS benchmarks • Container security • Multiple output formats
Source Code | Docs

Advanced Projects

Project Info What You'll Learn
API Rate Limiter
Distributed rate limiting middleware
1w Python Redis Advanced Token bucket algorithm • Distributed systems • Redis backend
Source Code | Docs
Encrypted Chat Application
Real-time E2EE messaging
1-2w FastAPI SolidJS PostgreSQL Advanced Signal Protocol • Double Ratchet • WebAuthn • WebSockets
Source Code | Docs
Exploit Development Framework
Modular exploitation framework
3-4w C++ Advanced Exploit development • Payload generation • Plugin architecture
Learn More
AI Threat Detection
ML-based traffic classification
3-4w Python TensorFlow Advanced Machine learning • Network traffic analysis • Model deployment
Learn More
Bug Bounty Platform
Full vulnerability disclosure platform
2-3w FastAPI React PostgreSQL Advanced Full-stack development • CVSS scoring • Workflow automation
Source Code | Docs
Cloud Security Posture Management
Multi-cloud misconfiguration scanner
2-3w Go AWS Azure Advanced Cloud security • CIS benchmarks • Multi-cloud APIs
Learn More
Malware Analysis Platform
Automated sandbox analysis
2-3w Rust Docker Advanced Malware analysis • Sandboxing • YARA rules • IOC extraction
Learn More
Quantum Resistant Encryption
Post-quantum cryptography
3-4w Python Advanced Post-quantum algorithms • Hybrid encryption • Kyber/Dilithium
Learn More
Zero Day Vulnerability Scanner
Coverage-guided fuzzing
2-3w Rust C Advanced Fuzzing • Vulnerability research • Crash triage
Learn More
Distributed Password Cracker
GPU-accelerated cracking
3-4w C++ CUDA Advanced Distributed systems • GPU computing • Hash cracking
Learn More
Kernel Rootkit Detection
Detect kernel-level rootkits
2-3w Rust Advanced Kernel internals • Memory forensics • Rootkit detection
Learn More
Blockchain Smart Contract Auditor
Solidity vulnerability analysis
3-4w Python Solidity Advanced Smart contracts • Static analysis • Solidity security
Learn More
Adversarial ML Attacker
Generate adversarial examples
3-4w Python TensorFlow Advanced Adversarial ML • FGSM/DeepFool • Model robustness
Learn More
Advanced Persistent Threat Simulator
Multi-stage APT simulation
3-4w Go Advanced APT techniques • C2 infrastructure • Lateral movement
Learn More
Hardware Security Module Emulator
Software HSM with PKCS#11
2-3w C Advanced HSM concepts • PKCS#11 interface • Cryptographic operations
Learn More
Network Covert Channel
Data exfiltration techniques
3-4w Rust Advanced Covert channels • Data exfiltration • Steganography
Learn More
Automated Penetration Testing
Full pentest automation
3-4w Python Advanced Pentest automation • Recon to exploitation • Report generation
Learn More
Supply Chain Security Analyzer
Dependency vulnerability analysis
2-3w Go Advanced Supply chain security • Dependency analysis • Malicious packages
Learn More

Learn More

Certification Roadmaps - Career paths for SOC Analyst, Pentester, Security Engineer, GRC Analyst, and 6 more tracks

Learning Resources - Tools, courses, certifications, YouTube channels, Reddit communities, and security frameworks