beskridge / Intro-To-PythonLinks
A repository of study materials related to Think Python 2nd Edition by Allen B. Downey. More information about the book can be found here: https://greenteapress.com/wp/think-python-2e/
☆68Updated last year
Alternatives and similar repositories for Intro-To-Python
Users that are interested in Intro-To-Python are comparing it to the libraries listed below
Sorting:
- ☆77Updated 4 years ago
- Resources for TCM Security Linux 101 course☆299Updated 2 years ago
- A curated list of awesome infosec courses and training resources.☆204Updated last year
- ☆61Updated 4 years ago
- List of resources for buiding a home lab☆283Updated 2 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Certification Cheatsheets☆190Updated 2 years ago
- Same Pentest Resume☆142Updated 5 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- A simple Bash script to automate some organization and repetitive tasks while doing TryHackMe or HackTheBox machines☆38Updated last year
- undergroundwires CEH-in-bullet-points in pdf format☆118Updated 2 years ago
- ☆432Updated 3 years ago
- This repo is meant to be a list of companies that hire security people full remote.☆100Updated 10 months ago
- ☆52Updated last week
- Practical Windows Forensics Training☆682Updated last year
- Bootstraps, cheat-sheets, and guides for the OSCP exam.☆90Updated last year
- ☆41Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 10 months ago
- Pwnspoof repository☆264Updated last year
- A checklist to help students track their OSCP exercise progress.☆145Updated 3 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆663Updated 2 years ago
- PNPT Exam Preparation - TCM Security☆170Updated 4 years ago
- Indexes for SANS Courses and GIAC Certifications☆256Updated last year
- CSbyGB PenTips Gitbook☆112Updated this week
- ☆47Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆64Updated 3 weeks ago
- Useful resources about phishing email analysis☆85Updated 6 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- ☆184Updated last year
- ☆21Updated 6 years ago