Complete Python Bootcamp: Go from zero to hero in Python 3
☆35Aug 29, 2019Updated 6 years ago
Alternatives and similar repositories for python-zero-to-hero
Users that are interested in python-zero-to-hero are comparing it to the libraries listed below
Sorting:
- AutoDecoder tool for CTFs☆17Nov 4, 2018Updated 7 years ago
- ☆10Aug 12, 2022Updated 3 years ago
- I contain a plethora of random GitHub Actions demos☆15Apr 6, 2022Updated 3 years ago
- Presentation on using git/GitHub with R☆12Jun 3, 2020Updated 5 years ago
- A template tool with no dependencies that works like Helm templates or Consul templates.☆17Feb 23, 2026Updated last week
- Faye Ellis, Hands-on AWS Troubleshooting (1127)☆10Jul 12, 2023Updated 2 years ago
- ArgoCD video repository☆10Feb 14, 2024Updated 2 years ago
- ☆10Jul 19, 2023Updated 2 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Shared resources for spatio-temporal models☆10Mar 11, 2025Updated 11 months ago
- Docker Stack yaml scripts☆14Jul 11, 2019Updated 6 years ago
- Example Repository for Docker's Example Voting App with Helm☆10Mar 25, 2021Updated 4 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Saludetes tipicos☆10Oct 11, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Simple R script for accesslog analysis☆11Jan 17, 2020Updated 6 years ago
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- Super cool two factor authentication command line app☆11Mar 22, 2023Updated 2 years ago
- ☆10Jun 2, 2025Updated 9 months ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- here is AI Service samples☆10Jun 7, 2023Updated 2 years ago
- This is the repo where I save #Terraform recipes, mostly posted in cduser.com☆10May 17, 2021Updated 4 years ago
- ☆14Jan 20, 2022Updated 4 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- R-Ladies Philly 2019 Community Data Project: PAWS☆14Jun 6, 2019Updated 6 years ago
- ☆12May 20, 2023Updated 2 years ago
- A list of curated OpenSearch links☆11May 17, 2024Updated last year
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- A docker-cli experience but for your kubernetes cluster☆10Feb 4, 2020Updated 6 years ago