Loading...
Cybersecurity educational resources including training materials, certifications, industry reports, and security documentation. Task: Python
Browse 10 security tools
Python programming training course for cybersecurity professionals
Python programming training course for cybersecurity professionals
Cybersecurity certification training covering offensive & defensive techniques
Cybersecurity certification training covering offensive & defensive techniques
Cybersecurity-themed apparel for blue team professionals
A conference featuring talks and workshops on various Python-related topics.
A web-based tool that scrapes and organizes CTF writeups from ctftime.org with prioritization features and a local database for easy access.
A web-based tool that scrapes and organizes CTF writeups from ctftime.org with prioritization features and a local database for easy access.
An educational project that teaches data analysis techniques for cybersecurity applications using Python tools like IPython, Pandas, and Scikit Learn through practical exercises and realistic scenarios.
An educational project that teaches data analysis techniques for cybersecurity applications using Python tools like IPython, Pandas, and Scikit Learn through practical exercises and realistic scenarios.
Interactive computational environment for code execution, text, and media combination.
Interactive computational environment for code execution, text, and media combination.
A collection of CTF write-ups demonstrating the use of pwntools for solving binary exploitation challenges across various cybersecurity competitions.
A collection of CTF write-ups demonstrating the use of pwntools for solving binary exploitation challenges across various cybersecurity competitions.
A comprehensive guide to Python 3 syntax, features, and resources in a single image.
A comprehensive guide to Python 3 syntax, features, and resources in a single image.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs