trsi-me / Python-ProjectsLinks
مستودع يحتوي على مشاريع مفتوحة المصدر بلغة بايثون، مستوى مبتدئ ومتوسط وإحترافي.
☆13Updated 2 years ago
Alternatives and similar repositories for Python-Projects
Users that are interested in Python-Projects are comparing it to the libraries listed below
Sorting:
- Make your Kali Repository Run Faster using Bash Script☆14Updated last year
- ☆11Updated 3 years ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆35Updated last year
- ☆12Updated 7 months ago
- ☆13Updated 3 years ago
- ☆11Updated 3 years ago
- ☆27Updated last month
- Apuntes de las materias Programación II - Algoritmos y Estructuras de datos II de UADE☆31Updated 3 weeks ago
- ☆13Updated 3 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,060Updated last year
- recon for bug hunters☆854Updated last month
- Pass you eJPT Study Guide, here you have all tools and content you need!☆140Updated 2 years ago
- Here you can find my eJPT notes, these notes will help you prepare for the eJPT certification.☆68Updated last year
- Roadmap for Web Application Penetration Testing | FREE Resources (Not Pirated)☆403Updated 2 years ago
- Kali for Penetration Testers, by EC-Council☆13Updated 2 years ago
- Latest Burpsuite Professional Version 2025.x.x☆1,524Updated last week
- ☆13Updated 4 years ago
- ☆19Updated last year
- Notes created for preparation of EJPTv2☆264Updated 2 years ago
- ☆22Updated last year
- A Modern Framework for Bug Bounty Hunting☆637Updated 10 months ago
- ☆701Updated 4 months ago
- ☆13Updated 4 years ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆138Updated last year
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,172Updated last year
- ☆11Updated 11 months ago
- ☆25Updated 2 years ago
- ☆18Updated 5 months ago
- ☆15Updated 2 years ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆64Updated 2 years ago