Top 6 Projects of Cyber Security for CV & University

These cybersecurity projects on GitHub are open-source and are developed and maintained by dedicated contributors. They offer useful frameworks, tools, and resources to improve security practices. You can use these six projects in your resume to get quickly job or in your university final year projects.
The projects in the following collection, which ranges from encryption and incident response to vulnerability scanning and network monitoring, can help aid individuals and organizations in safeguarding their digital assets.


Dismap is a tool used, primarily for web, TCP, and UDP protocols, for asset discovery and identification. It can identify different kinds of assets and works with both external and internal networks. It helps members of the blue team find suspected fragile assets and helps red team members identify potential risk assets.
Dismap’s fingerprint rule base includes over 4500 web fingerprint rules and fingerprints for the TCP, UDP, and TLS protocols. These These rules facilitate the identification elements like the header, body, and favicon, among other relevant components.


Using Rizin as its main engine, Cutter is a free and open-source reverse engineering platform. This gives customers access numerous features either through the integrated terminal or the graphical user interface (GUI).
To improve the ease of use of the reverse engineering process, Cutter provides a wide range of widgets and features. Java eliminating the need of its versions are fully integrated with the native Ghidra decompiler.


An automated tool for open-source intelligence (OSINT) is called SpiderFoot. It utilizes a range of data analysis techniques and connects with various data sources to make navigating the gathered data easier.
It has an mbedded web server that provides a user-friendly web interface. As an alternative, all of its operations entirely through the command line. The tool is released under the MIT license and is coded in Python 3.


Threat prevention, detection, and reaction features are provided by the free and open-source Wazuh platform. It can be used to protect Workloads in a variety of settings, such as cloud-based, virtualized, on-premises, and containerized systems.
An endpoint security agent and a management server are its two primary parts. Installed on the systems under observation, the endpoint security agent is in charge of gathering security-related data. After the agents gather data, the management server gets it and analyzes it.
With the Elastic Stack, it offers a search engine and a data visualization tool that is fully integrated. Through this interface, users may navigate through their security alerts and learn insights from the collected data.


Vuls is a vulnerability scanner made for network devices, Linux, FreeBSD, WordPress, containers, and programming language libraries.

It is an agent-less tool with the following features:
⦁ Identification of system vulnerabilities
⦁ Provides information on the servers that are affected
⦁ Automated identification of vulnerabilities
⦁ Regular vulnerability reporting using methods like CRON


Google’s security engineers and cryptographers created the open-source cryptography library known as Tink. It provides safe, and user-friendly that reduce common errors by using a user-centered design methodology, careful implementation, and code reviews,and thorough testing.
Tink is especially made to assist users without cryptography background in implementing cryptographic tasks safely. It has been included into many Google processes and products.

That’s all for this article. Hope you liked it. If you liked it make sure to subscribe our website

error: Content is protected !!