PacktPublishing / Offensive-Security-Using-PythonLinks
Offensive Security Using Python, published by Packt
☆25Updated last year
Alternatives and similar repositories for Offensive-Security-Using-Python
Users that are interested in Offensive-Security-Using-Python are comparing it to the libraries listed below
Sorting:
- Python for Security and Networking, Published by Packt☆92Updated 5 months ago
- Bash Shell Scripting for Pentesters, published by Packt☆38Updated 2 months ago
- Python for Offensive PenTest, published by Packt☆146Updated 2 years ago
- CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam, published by Packt☆113Updated 2 years ago
- Collection of notes and resources for the CompTIA PenTest+ exam.☆38Updated 6 years ago
- Code Repository for Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-001), published by Packt☆56Updated 2 years ago
- The Black Hat Bash book repository☆299Updated 2 months ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- ☆21Updated last year
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- OSCP tools and notes☆40Updated 6 years ago
- ☆75Updated 4 years ago
- Resources for Students in the Practical Webapp Security and Testing course☆21Updated last year
- ☆38Updated 8 months ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- ☆211Updated 3 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆128Updated 3 years ago
- ☆44Updated 3 years ago
- some eJPT exam preparation notes☆73Updated 4 years ago
- ☆99Updated 4 years ago
- ☆24Updated 3 years ago
- Resources for Students in the Practical Webapp Security and Testing course☆171Updated 2 years ago
- ☆87Updated 3 years ago
- ☆37Updated 5 years ago
- ☆67Updated 3 years ago
- Collected resources for OSWA preparation.☆20Updated 2 years ago
- Pentesting APIs, Published by Packt☆13Updated last year
- #cheat sheet for OSWP☆91Updated 4 years ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- CEH Practical Resources, Learning, Tutorials | Certified Ethical Hacker☆33Updated 4 years ago