stenivan / python-zero-to-heroLinks
Complete Python Bootcamp: Go from zero to hero in Python 3
☆33Updated 5 years ago
Alternatives and similar repositories for python-zero-to-hero
Users that are interested in python-zero-to-hero are comparing it to the libraries listed below
Sorting:
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Certificate of Cloud Security Knowledge exam preparation kit☆11Updated 6 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Application scanning component of OWASP PurpleTeam☆15Updated 2 years ago
- DNS lookup using Go☆12Updated 3 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 5 years ago
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Updated 6 years ago
- OWASP Foundation Web Respository☆10Updated 3 years ago
- A wrapper around ripgrep to check for various common patterns.☆13Updated 5 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆20Updated 4 years ago
- Using Prowler to Automate Compliance Checks for AWS CIS Benchmarks☆9Updated 2 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 7 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- A primer for learning for docker and kubernetes for DevOps and Site Reliability Engineering Enthusiasts.☆31Updated last year
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Updated 7 months ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- Using censys to find subdomains but without the APIs just scrapping☆15Updated 5 years ago
- Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses☆13Updated 2 months ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- A curated list of Cloud Security techniques and tools☆29Updated 2 years ago
- ☆17Updated last year
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- A tool to check for response status codes with ease☆14Updated 2 years ago