Python Books for Security
☆233Mar 20, 2019Updated 7 years ago
Alternatives and similar repositories for Python-Books-for-Security
Users that are interested in Python-Books-for-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16May 21, 2019Updated 6 years ago
- This is some of my Python technical books collection☆13Sep 26, 2013Updated 12 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆13Oct 8, 2025Updated 6 months ago
- Hacking files and scripts☆12Mar 21, 2018Updated 8 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Elastic 2022☆11Feb 14, 2022Updated 4 years ago
- ☆12Oct 25, 2020Updated 5 years ago
- R Data Visualization Recipes, published by Packt☆17Jan 30, 2023Updated 3 years ago
- ☆11Jun 19, 2024Updated last year
- Chakra Type Confusions - PoCs of Edge's legacy JS engine vulnerabilities that inject code into the JIT process☆16Mar 26, 2024Updated 2 years ago
- ☆14Nov 11, 2023Updated 2 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Top 100 Hacking & Security E-Books (Free Download)☆6,301Jul 26, 2024Updated last year
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- Python Penetration Testing Cookbook, published by Packt☆78Jan 24, 2023Updated 3 years ago
- Free Cyber Security and Hacking eBook Collection☆21Apr 7, 2024Updated 2 years ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- ☆24Oct 12, 2021Updated 4 years ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Nov 11, 2022Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- ☆2,241Sep 20, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- Hands-On Penetration Testing with Python, published by Packt☆85Jan 24, 2024Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Oct 28, 2023Updated 2 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- Collection about PoC for sql injection on Joomla☆33Dec 22, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- Pentest stuff☆50Nov 30, 2023Updated 2 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- A purposely vulnerable application in order to demonstrate PHP payload smuggling techniques for PNG files.☆44Oct 17, 2022Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Exploitation and Mitigation Slides☆136Jun 4, 2024Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆37Feb 28, 2025Updated last year