Python for Cybersecurity Cookbook, by BPB Publications
☆24Jan 28, 2024Updated 2 years ago
Alternatives and similar repositories for Python-for-Cybersecurity-Cookbook
Users that are interested in Python-for-Cybersecurity-Cookbook are comparing it to the libraries listed below
Sorting:
- ☆537Feb 19, 2026Updated last week
- Time Series Forecasting using Deep Learning, published by BPB Publications☆43Oct 19, 2021Updated 4 years ago
- A Python IDA Plugin that finds a route from one function to another.☆12Dec 6, 2018Updated 7 years ago
- Subscriber and Bang submission handling☆10Mar 23, 2023Updated 2 years ago
- DNS Blacklist Check // Tiny demo project using Vue.js and Server-Sent Events (SSE)☆11Mar 15, 2023Updated 2 years ago
- Network Programming in Python, published by BPB Publications☆10Jul 8, 2022Updated 3 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Pentester's toolbox☆12Jan 21, 2026Updated last month
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- emotet configs pulled from https://cape.contextis.com/☆14Apr 27, 2022Updated 3 years ago
- My assignments for CN course [CSE232] [IIIT-Delhi].☆13May 24, 2018Updated 7 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- dnsoverhttps - D'oh!☆14Sep 20, 2018Updated 7 years ago
- Get a stable, canonical version of any URL, with DNS and HTTPS checks, redirects, tracker stripping, and canonical link extraction!☆13Feb 19, 2026Updated last week
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- Software Defined Perimeter using readily available Open Source components☆12Jan 18, 2019Updated 7 years ago
- Free Online Certifications in CyberSecurity☆14Apr 17, 2021Updated 4 years ago
- A library to parse macOS LoginItems☆18Aug 28, 2022Updated 3 years ago
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆12Aug 27, 2014Updated 11 years ago
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 6 years ago
- Modbus TCP vulnerability demonstration☆15Jan 22, 2020Updated 6 years ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 2 years ago
- Moved — Personal configuration files I often use in my - may contain useful snippets for you as well, YMMV.☆13Jul 2, 2025Updated 7 months ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 8 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- Access to the DuckDuckGo APIs☆14Jan 9, 2019Updated 7 years ago
- the leaked prompts from the best performing gpts☆16Feb 23, 2024Updated 2 years ago
- Building Android Projects with Kotlin, by BPB Publications☆13Oct 6, 2022Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- A persisting WebSocket client for Django☆13May 25, 2022Updated 3 years ago
- Continuous Machine Learning with Kubeflow, published by BPB Publications☆14Jul 5, 2022Updated 3 years ago
- Pytorch implementation of LSTM for irregular time series☆13Mar 13, 2020Updated 5 years ago
- ☆18Dec 26, 2024Updated last year
- All in One Recon Tool for Bug Bounty☆16Dec 30, 2022Updated 3 years ago
- An ongoing collection of Python language tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practica…☆15Jan 15, 2022Updated 4 years ago
- Django app to handle authentication and registration by email.☆13Feb 3, 2026Updated 3 weeks ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago