Python Books for Security
☆231Mar 20, 2019Updated 6 years ago
Alternatives and similar repositories for Python-Books-for-Security
Users that are interested in Python-Books-for-Security are comparing it to the libraries listed below
Sorting:
- Wanna TesT YoUr CyberSecurity Skills Below are the amazing platforms to level-up yourself☆19Jun 4, 2022Updated 3 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 6 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- Hacking files and scripts☆12Mar 21, 2018Updated 7 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Elastic 2022☆11Feb 14, 2022Updated 4 years ago
- A list of cybersecurity projects that use machine learning techniques☆69Nov 9, 2016Updated 9 years ago
- A curated list of resources for the OSED journey.☆71Feb 3, 2022Updated 4 years ago
- ☆16May 21, 2019Updated 6 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Belajar OpenCV Object Detection☆18Nov 14, 2025Updated 3 months ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- The resources stored in this repository cover data science topics applied to cybersecurity environments.☆25Jun 26, 2020Updated 5 years ago
- Python Digital Forensics [video], published by Packt☆21Jan 30, 2023Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Updated this week
- Capture The Flag competition challenge write-ups☆21Mar 1, 2026Updated last week
- Bug Bounty - Important Books☆22May 8, 2020Updated 5 years ago
- Python exploit for the vsftpd 2.3.4☆25Jul 24, 2024Updated last year
- VTSPS2-HBDL HomeBrew Downloader☆22Dec 28, 2023Updated 2 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆6,271Jul 26, 2024Updated last year
- College Admission System website☆10May 12, 2021Updated 4 years ago
- Python client for DFIR-IRIS☆25Aug 19, 2024Updated last year
- Collection about PoC for sql injection on Joomla☆32Dec 22, 2020Updated 5 years ago
- ☆24Feb 7, 2025Updated last year
- Simple machine learning based web application firewall (WAF) created in python☆60Feb 2, 2024Updated 2 years ago
- Useful thread-safe collections with performance in mind for Java 8+.☆28Mar 2, 2026Updated last week
- ☆30Mar 2, 2026Updated last week
- ☆2,214Sep 20, 2023Updated 2 years ago
- The most up-to-date list of Turkish ads to block ads on Turkish websites☆21Feb 26, 2026Updated last week
- ☆10Feb 10, 2016Updated 10 years ago
- ☆11Feb 28, 2022Updated 4 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated 3 weeks ago
- Arduino Kitabimizda Gecen Ornek Kodlar☆10Feb 23, 2017Updated 9 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆32Aug 1, 2019Updated 6 years ago