sjsilvabr / DataVisualizationPython_CourseAssignmentLinks
Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera
☆11Updated 5 years ago
Alternatives and similar repositories for DataVisualizationPython_CourseAssignment
Users that are interested in DataVisualizationPython_CourseAssignment are comparing it to the libraries listed below
Sorting:
- ☆18Updated 5 years ago
- Only for educational purposes☆12Updated 2 years ago
- ☆31Updated last month
- ManageEngine ADManager Command Injection☆11Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Updated last year
- This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / pe…☆11Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- ☆17Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆14Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- ☆22Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- this nuclei template finds back up files☆22Updated 3 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Updated 5 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- CVE-2020-25223☆11Updated 4 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- various python scripts☆16Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆11Updated last year