sjsilvabr / DataVisualizationPython_CourseAssignmentLinks
Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera
☆11Updated 5 years ago
Alternatives and similar repositories for DataVisualizationPython_CourseAssignment
Users that are interested in DataVisualizationPython_CourseAssignment are comparing it to the libraries listed below
Sorting:
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- ☆18Updated 5 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- this nuclei template finds back up files☆21Updated 2 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Updated 11 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆20Updated 4 months ago
- Only for educational purposes☆12Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Updated last year
- Burp extension used to snip any header from all the requests.☆23Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Manage attack surface data on Elasticsearch☆23Updated last year
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- ☆15Updated 2 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- ☆17Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- An another JWT cracker but really fast!☆11Updated 2 years ago