stenivan / python-zero-to-heroLinks
Complete Python Bootcamp: Go from zero to hero in Python 3
☆35Updated 6 years ago
Alternatives and similar repositories for python-zero-to-hero
Users that are interested in python-zero-to-hero are comparing it to the libraries listed below
Sorting:
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Updated 11 months ago
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- Intentionally Vulnerable Flask app for use in Demos☆33Updated 3 weeks ago
- This repo contains workshop material delivered at #nullcon2020☆16Updated 5 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Updated 5 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 8 months ago
- a collection of bash script and python to automate ZAP Security Tests☆11Updated 5 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 6 years ago
- $ kubectl hacking - my journey with kate☆37Updated 4 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 3 years ago
- Materials and Synopsis of the course Certified Network Security Specialist (CNSS) provided by The International CyberSecurity Institute (…☆29Updated 5 years ago
- Training scenarios for cyber ranges☆13Updated 5 years ago
- A tool for sorting blocks of lines☆37Updated 3 years ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Updated 6 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 4 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Updated 6 years ago
- Fast and passive subdomain enumeration.☆18Updated 3 years ago
- LLM Vulnerable Application☆13Updated 2 years ago
- Collection of mine and others presentations on various topics like application security, python, cloud security, DevSecOps and so on... T…☆42Updated 10 months ago
- Go module that returns supported regions for a service or supported services for a region☆18Updated last month
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Updated 4 years ago
- Schedule of my public security training courses!☆15Updated 4 years ago