beskridge / Intro-To-Python
A repository of study materials related to Think Python 2nd Edition by Allen B. Downey. More information about the book can be found here: https://greenteapress.com/wp/think-python-2e/
☆68Updated 9 months ago
Alternatives and similar repositories for Intro-To-Python:
Users that are interested in Intro-To-Python are comparing it to the libraries listed below
- Resources for TCM Security Linux 101 course☆288Updated last year
- ☆76Updated 3 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Certification Cheatsheets☆180Updated last year
- A curated list of awesome infosec courses and training resources.☆202Updated last year
- A simple Bash script to automate some organization and repetitive tasks while doing TryHackMe or HackTheBox machines☆38Updated last year
- ☆57Updated 3 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆121Updated 3 years ago
- A checklist to help students track their OSCP exercise progress.☆146Updated 2 years ago
- Bootstraps, cheat-sheets, and guides for the OSCP exam.☆90Updated 10 months ago
- This repo is meant to be a list of companies that hire security people full remote.☆94Updated 6 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆138Updated last year
- Resources for Students in the Practical Webapp Security and Testing course☆167Updated last year
- ☆46Updated last month
- Same Pentest Resume☆135Updated 5 years ago
- Some important DFIR Resources☆83Updated 2 years ago
- Indexes for SANS Courses and GIAC Certifications☆242Updated 10 months ago
- ☆27Updated last week
- CSbyGB PenTips Gitbook☆107Updated 2 weeks ago
- PNPT Exam Preparation - TCM Security☆164Updated 3 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆209Updated 2 years ago
- List of resources for buiding a home lab☆266Updated last year
- This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.☆2Updated 3 weeks ago
- ☆47Updated last year
- ☆49Updated last year
- ☆209Updated 3 years ago
- ☆172Updated last year
- SIEM Cheat Sheet☆73Updated last year
- ☆423Updated 3 years ago
- Repository resource for threat hunter☆158Updated 6 years ago