LeftarCode / sekurak-academy-python-hackingLinks
This repository is prepared especially for the participants of the Polish training course "Can you hack everything with Python?". It offers practical examples, demos, and exercises to explore Python’s hacking capabilities and ethical cybersecurity techniques.
☆52Updated 5 months ago
Alternatives and similar repositories for sekurak-academy-python-hacking
Users that are interested in sekurak-academy-python-hacking are comparing it to the libraries listed below
Sorting:
- Repozytorium zbiorcze z materiałami nt. Wireshark☆76Updated last year
- Zbiór promocji na black friday/black week o tematyce bezpieczeństwa/security/infosec.☆75Updated 9 months ago
- Darmowy kurs podstawy CyberChef.☆41Updated 3 years ago
- Materiały do szkolenia Praktyczny Wireshark☆24Updated last year
- Archiwum wszystkich wydań newslettera unknowNews☆191Updated last week
- ChatGPT DAN, Jailbreaks prompt☆18Updated last year
- Not The Hidden Wiki - The largest repository of links related to cybersecurity☆1,622Updated this week
- These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.☆1,703Updated 2 weeks ago
- OSSEC usefull stuff☆15Updated 2 years ago
- Pomysły na prezenty dla pentesterów☆54Updated 2 years ago
- A modular vulnerability scanner with automatic report generation capabilities.☆934Updated this week
- This repo contains notes and references for the CBROPS 200-201 Exam. Each directory contains a quick refernece PDF for key topics & terms…☆104Updated 4 years ago
- Resources for TCM Security Linux 101 course☆301Updated 2 years ago
- ChatGPT DAN, Jailbreaks prompt☆102Updated 3 months ago
- RSS Feed for Cybermonit.com☆33Updated this week
- All Useful Linux Commands (For OSCP & daily pen-testing usage)☆226Updated 2 years ago
- Cybersecurity Stream page☆176Updated 3 months ago
- Dokumentacja MIKR.US współtworzona przez użytkowników.☆25Updated 3 weeks ago
- A tool to download all Pwned Passwords hash ranges and save them offline so they can be used without a dependency on the k-anonymity API☆976Updated 5 months ago
- This repository is tailored for participants of the Polish training course "Live Cold Boot Attack: How to Decrypt a Laptop by Freezing Me…☆20Updated 5 months ago
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆832Updated 5 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆56Updated last year
- https://academy.tcm-sec.com/☆138Updated 3 months ago
- The Black Hat Bash book repository☆296Updated 2 months ago
- ☆36Updated 3 months ago
- Checklists for Testing Security environment☆825Updated 6 months ago
- Vulnerable app with examples showing how to not use secrets☆1,356Updated this week
- Collection of cheat sheets useful for pentesting☆491Updated last year
- SOC Interview Questions☆1,194Updated last year
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆703Updated 2 months ago