PacktPublishing / Offensive-Security-Using-PythonLinks
Offensive Security Using Python, published by Packt
☆25Updated 11 months ago
Alternatives and similar repositories for Offensive-Security-Using-Python
Users that are interested in Offensive-Security-Using-Python are comparing it to the libraries listed below
Sorting:
- Bash Shell Scripting for Pentesters, published by Packt☆34Updated last week
- Python for Security and Networking, Published by Packt☆82Updated 3 months ago
- Python for Offensive PenTest, published by Packt☆145Updated 2 years ago
- Code Repository for CompTIA CySA+ (CS0-001): Complete Course and Practice Exam, Published by Packt☆29Updated 2 years ago
- CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam, published by Packt☆112Updated 2 years ago
- The Black Hat Bash book repository☆283Updated 2 weeks ago
- ☆19Updated last year
- ☆75Updated 3 years ago
- ☆82Updated 2 years ago
- ☆24Updated 3 years ago
- Collection of notes and resources for the CompTIA PenTest+ exam.☆37Updated 5 years ago
- ☆77Updated 6 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆122Updated 3 years ago
- ☆44Updated 3 years ago
- Code Repository for Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-001), published by Packt☆54Updated 2 years ago
- Mastering Python for Networking and Security, Second Edition, published by Packt☆155Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 6 months ago
- Resources for Students in the Practical Webapp Security and Testing course☆21Updated 10 months ago
- GitHub repository for the API Security for White Hat Hackers book☆13Updated last year
- Pentesting APIs, Published by Packt☆13Updated 11 months ago
- Hacking Notes☆34Updated 9 months ago
- The Black Hat GraphQL Book Repository☆254Updated 2 weeks ago
- ☆27Updated 5 years ago
- ☆99Updated 3 years ago
- eLearnSecurity Certified Exploit Development☆104Updated 4 years ago
- A PlayBook for OSWP & Wireless Pentest☆37Updated last year
- ☆32Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated last week
- #cheat sheet for OSWP☆89Updated 4 years ago