The goal of this project is to illustrate Extract Transform Load (ETL) using Python and SQL. ETL is a process commonly done in computing, which takes raw data, cleans it and stores it for later use. The extraction phase targets and retrieves the data. Transform manipulates and cleans the data. Then load stores the data, typically in a data wareh…
☆33Sep 7, 2021Updated 4 years ago
Alternatives and similar repositories for ETL-Project
Users that are interested in ETL-Project are comparing it to the libraries listed below
Sorting:
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ☆14May 14, 2022Updated 3 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆12Aug 25, 2023Updated 2 years ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆19Jun 24, 2025Updated 8 months ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 5 months ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- ☆13Dec 24, 2023Updated 2 years ago
- Hallucinate is a trojan malware (for educational purposes) similar to Maya Gold.scr and Mist. The source code will be released after Ende…☆14Jun 8, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- Reg**** with improved UI☆12Jul 22, 2024Updated last year
- These are a select few projects related to Big Data Analytics and Management. The projects listed are a combination of both small and big…☆11Oct 11, 2019Updated 6 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- ☆11May 15, 2020Updated 5 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 6 months ago
- This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / pe…☆15Nov 11, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- repo for the ctf challenges☆14Apr 20, 2024Updated last year