For my book on Python https://beesec.gitbook.io/python-zero-to-hero/
☆32Nov 3, 2020Updated 5 years ago
Alternatives and similar repositories for Python-Zero-to-Hero
Users that are interested in Python-Zero-to-Hero are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Learn DS&A through leetcode problems☆43Nov 23, 2020Updated 5 years ago
- Creates needed resources for federating access between a GCP service account and AWS IAM role.☆30Apr 3, 2024Updated last year
- Collection of algorithms to read, learn and contribute to.☆23Mar 20, 2021Updated 5 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Jun 10, 2021Updated 4 years ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- 🌴 Solutions to few of the interview coding challenges in Python 🐍☆41Mar 27, 2024Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Security Advisories for the Jitsi projects☆13Nov 18, 2025Updated 4 months ago
- 🏖️ Generates a TL;DR of news using Natural Language Processing 🏖️☆37Feb 28, 2021Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- A JLPT frequency list compatible with the new Migaku extension sourced from stephenmk's meta dictionary for Yomitan.☆14Oct 29, 2025Updated 4 months ago
- Presentation slide for a Redux talk in BandungJS Meetup #4 https://www.meetup.com/BandungJS/events/241542959/☆15Nov 30, 2017Updated 8 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Cloudshell proof of concept for LiveOverflow☆15Aug 8, 2019Updated 6 years ago
- Github action that tests python package☆10Nov 27, 2025Updated 3 months ago
- A Compiler made with python using some useful libreries.☆11Nov 11, 2019Updated 6 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- 🍳 The most delicious pentesting tool☆45Oct 13, 2021Updated 4 years ago
- 📚 My algorithmic design paradigms book! 📚☆250Mar 30, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆20Mar 15, 2021Updated 5 years ago
- Dive into world of ascii art☆10Apr 1, 2021Updated 4 years ago
- Generate 1337speak based password dictionaries☆12Jul 27, 2018Updated 7 years ago
- Off-The-Record Messaging protocol implementation for Python☆14Mar 19, 2025Updated last year
- Example for integration an application with Arkane☆10Feb 22, 2026Updated last month
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- The online version of Ciphey☆18Oct 11, 2023Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆11Jan 29, 2026Updated last month
- Meus Estudos com Flutter (Moor+dio+Mobx)☆10Jan 13, 2020Updated 6 years ago
- This UserControl allows to store binary files to your executable.☆13Apr 26, 2020Updated 5 years ago
- Flutter plugin for displaying vertical/horizontal steps with other Flutter widgets on Android and iOS.☆20Apr 13, 2021Updated 4 years ago
- Serialize ngraph.graph to binary format☆10Oct 9, 2025Updated 5 months ago