PacktPublishing / Offensive-Security-Using-PythonLinks
Offensive Security Using Python, published by Packt
☆27Updated last year
Alternatives and similar repositories for Offensive-Security-Using-Python
Users that are interested in Offensive-Security-Using-Python are comparing it to the libraries listed below
Sorting:
- Python for Security and Networking, Published by Packt☆98Updated this week
- Bash Shell Scripting for Pentesters, published by Packt☆44Updated 2 months ago
- Python for Offensive PenTest, published by Packt☆149Updated 3 years ago
- Pentesting APIs, Published by Packt☆17Updated last year
- CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam, published by Packt☆115Updated 3 years ago
- The Black Hat Bash book repository☆345Updated 6 months ago
- Code Repository for Ethical Hacking and CompTIA PenTest+ Exam Prep (PT0-001), published by Packt☆59Updated 3 years ago
- ☆21Updated 3 years ago
- ☆23Updated 3 months ago
- Basic Website template Django 2.2 Example + Python3☆54Updated 3 years ago
- Building and Automating Penetration Testing Labs in the Cloud, published by Packt☆20Updated 2 years ago
- Mastering Python for Networking and Security, Second Edition, published by Packt☆172Updated 3 years ago
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Updated 7 years ago
- Resources for Students in the Practical Webapp Security and Testing course☆22Updated 3 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆141Updated 3 years ago
- ChatGPT for Cybersecurity Cookbook, published by Packt☆160Updated last month
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Updated 3 years ago
- ☆140Updated 3 years ago
- ☆103Updated 4 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆13Updated 2 years ago
- ☆15Updated 2 years ago
- Scripts featured in the book How to Hack Like a Legend☆150Updated 3 years ago
- ☆84Updated 2 years ago
- #cheat sheet for OSWP☆101Updated 4 years ago
- ☆43Updated 4 years ago
- ☆76Updated 4 years ago
- Enumeration Guide☆45Updated 6 years ago
- Script repository for the book Cybersecurity Ops with bash☆176Updated 6 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆24Updated 2 months ago
- ☆62Updated 5 years ago