Learn Python Coding
38.7K subscribers
1.06K photos
37 videos
24 files
855 links
Learn Python through simple, practical examples and real coding ideas. Clear explanations, useful snippets, and hands-on learning for anyone starting or improving their programming skills.

Admin: @HusseinSheikho || @Hussein_Sheikho
Download Telegram
πŸ“š Modern Cybersecurity Strategies for Enterprises (2023)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/94

πŸ’¬ Tags: #Cybersecurity

USEFUL CHANNELS FOR YOU
❀4❀‍πŸ”₯2πŸ‘2
πŸ“š Applied Math for Security (2023)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/302

πŸ’¬ Tags: #math #cyberSecurity

USEFUL CHANNELS FOR YOU
πŸ‘4πŸ’―2
πŸ“š Introduction to Cybersecurity (2023)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/751

πŸ’¬ Tags: #Cybersecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
πŸ‘9❀3
πŸ“š Automotive Cybersecurity Engineering Handbook (2023)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/787

πŸ’¬ Tags: #Cybersecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
πŸ‘1
πŸ“š Attacking and Exploiting Modern Web Applications (2023)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/815

πŸ’¬ Tags: #CyberSecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
πŸ‘9❀1
πŸ“š Zed Attack Proxy Cookbook (2023)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/885

πŸ’¬ Tags: #CyberSecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
πŸ‘6
πŸ“š Discovering Cybersecurity (2023)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/984

πŸ’¬ Tags: #Cybersecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
πŸ‘6
πŸ“š Cybersecurity All-in-One For Dummies (2022)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/994

πŸ’¬ Tags: #Cybersecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
❀6πŸ‘3
πŸ“š CyberSecurity in a DevOps Environment (2023)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/1004

πŸ’¬ Tags: #CyberSecurity #DevOps

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
πŸ‘7
πŸ“š Cybersecurity Architect's Handbook (2024)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/1630

πŸ’¬ Tags: #Cybersecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
πŸ‘6❀1
πŸ“š Hacking Secret Ciphers with Python (2013)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/1694

πŸ’¬ Tags: #CyberSecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
πŸ‘3❀1
πŸ“Ή πŸš€ Cybersecurity for Beginners – a curriculum

In this rapidly changing age of AI technology adoption, it is even more critical to understand how to secure IT systems. This course is designed to teach you fundamental cyber security concepts to kick-start your security learning. It is vendor agnostic and is divided into small lessons that should take around 30-60 mins to complete. Each lesson has a small quiz and links to further reading if you want to dive into the topic a bit more

πŸ”— Link of course: https://github.com/microsoft/Security-101/?tab=readme-ov-file#-cybersecurity-for-beginners--a-curriculum

πŸ”– Tags: #CyberSecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘4
πŸ“š 270+ Cyber Security Interview Questions and Answers (2024)

1⃣ Join Channel Download:
https://t.me/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.me/c/1854405158/1916

πŸ’¬ Tags: #CyberSecurity

USEFUL CHANNELS FOR YOU
Automatically Generate Image CAPTCHAs with Python for Enhanced Security

Unlock the power of Python to automatically generate image CAPTCHAs, adding an extra layer of security to online platforms. This advanced solution leverages Python's robust libraries to create dynamic, hard-to-crack CAPTCHA images that protect against bots and unauthorized access. With customizable features, such as text distortion, background noise, and color variations, these CAPTCHAs ensure a unique challenge for every user session. Elevate your system’s defense mechanisms while maintaining a seamless user experience.

#PythonProgramming #CAPTCHA #CyberSecurity #Automation #WebDevelopment #SecureAuthentication #TechInnovation

https://t.me/DataScience4
πŸ”₯5πŸ‘3
πŸš€ FREE IT Study Kits for 2025 β€” Grab Yours Now!

Just found these zero-cost resources from SPOTOπŸ‘‡
Perfect if you're prepping for #Cisco, #AWS, #PMP, #AI, #Python, #Excel, or #Cybersecurity!
βœ… 100% Free
βœ… No signup traps
βœ… Instantly downloadable

πŸ“˜ IT Certs E-book: https://bit.ly/4fJSoLP
☁️ Cloud & AI Kits: https://bit.ly/3F3lc5B
πŸ“Š Cybersecurity, Python & Excel: https://bit.ly/4mFrA4g
🧠 Skill Test (Free!): https://bit.ly/3PoKH39
Tag a friend & level up together πŸ’ͺ

🌐 Join the IT Study Group: https://chat.whatsapp.com/E3Vkxa19HPO9ZVkWslBO8s
πŸ“² 1-on-1 Exam Help: https://wa.link/k0vy3x
πŸ‘‘Last 24 HOURS to grab Mid-Year Mega Sale prices!Don’t miss Lucky DrawπŸ‘‡
https://bit.ly/43VgcbT
πŸ‘1
Forwarded from Github Top Repositories
πŸ”₯ Trending Repository: 90DaysOfCyberSecurity

πŸ“ Description: This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md

πŸ”— Repository URL: https://github.com/farhanashrafdev/90DaysOfCyberSecurity

πŸ“– Readme: https://github.com/farhanashrafdev/90DaysOfCyberSecurity#readme

πŸ“Š Statistics:
🌟 Stars: 10.7K stars
πŸ‘€ Watchers: 192
🍴 Forks: 1.2K forks

πŸ’» Programming Languages: Not available

🏷️ Related Topics:
#cybersecurity #learn #hacktoberfest #ethical_hacking #communityexchange


==================================
🧠 By: https://t.me/DataScienceN
❀3
Top 30 Cyber Security Commands & Tools

#CyberSecurity #Reconnaissance #InfoGathering

#1. ping
Tests reachability of a host on an IP network and measures round-trip time.

ping -c 4 google.com

PING google.com (142.250.72.14) 56(84) bytes of data.
64 bytes from lhr48s23-in-f14.1e100.net (142.250.72.14): icmp_seq=1 ttl=118 time=8.53 ms
...
--- google.com ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3005ms


#2. whois
Retrieves registration information for a domain name or IP address.

whois google.com

Domain Name: GOOGLE.COM
Registry Domain ID: 2138514_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
...
Registrant Organization: Google LLC
Registrant State/Province: CA
Registrant Country: US


#3. dig
(Domain Information Groper) A tool for querying DNS servers.

dig google.com

; <<>> DiG 9.18.1-1-Debian <<>> google.com
;; ANSWER SECTION:
google.com. 156 IN A 142.250.187.238
...
;; Query time: 12 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)


#4. nmap
Network Mapper. A powerful tool for network discovery, port scanning, and security auditing.

nmap -sV -p 80,443 scanme.nmap.org

Starting Nmap 7.92 ( https://nmap.org ) at ...
Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (0.16s latency).

PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
443/tcp open ssl/http Apache httpd 2.4.7 ((Ubuntu))


#5. netcat (nc)
The "Swiss army knife" of networking. Can be used for port scanning, file transfer, and creating backdoors.

nc -zv scanme.nmap.org 80

Connection to scanme.nmap.org (45.33.32.156) 80 port [tcp/http] succeeded!

---
#CyberSecurity #Networking #Analysis

#6. netstat
Displays active network connections, routing tables, and interface statistics.

netstat -tulpn

Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:5432 0.0.0.0:* LISTEN 675/postgres
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 789/sshd
udp 0 0 0.0.0.0:68 0.0.0.0:* 654/dhclient


#7. traceroute
Traces the network path (hops) to a remote host.

traceroute 8.8.8.8

traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets
1 gateway (192.168.1.1) 1.234 ms 1.567 ms 1.890 ms
2 isp-router.net (10.0.0.1) 5.432 ms 5.678 ms 5.901 ms
...
10 142.251.52.221 (142.251.52.221) 10.112 ms 10.345 ms 10.578 ms
11 dns.google (8.8.8.8) 10.801 ms 10.923 ms 11.045 ms


#8. tcpdump
A powerful command-line packet analyzer that allows you to capture and display network traffic.

sudo tcpdump -i eth0 -c 5 port 80

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
14:30:01.123456 IP my-pc.54321 > example.com.80: Flags [S], seq 123456789, win 64240, options [mss 1460,sackOK,TS val 10,ecr 0], length 0
... (4 more packets) ...
5 packets captured


#9. arp
Displays and modifies the Address Resolution Protocol (ARP) cache, which maps IP addresses to MAC addresses.

arp -a

? (192.168.1.1) at 00:1a:2b:3c:4d:5e [ether] on eth0
? (192.168.1.105) at 98:76:54:32:10:fe [ether] on eth0


#10. ip
A modern tool to show and manipulate routing, devices, policy routing, and tunnels. (Replaces ifconfig).

ip addr show
❀1
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 ...
inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 ...
inet 192.168.1.100/24 brd 192.168.1.255 scope global dynamic eth0

---
#CyberSecurity #WebSecurity #Vulnerability

#11. curl
A tool to transfer data from or to a server, using various protocols. Essential for interacting with web APIs and inspecting HTTP headers.

curl -I http://example.com

HTTP/1.1 200 OK
Content-Encoding: gzip
Accept-Ranges: bytes
Cache-Control: max-age=604800
Content-Type: text/html; charset=UTF-8
Date: Fri, 27 Oct 2023 10:00:00 GMT
Server: ECS (dcb/7F83)
Content-Length: 648


#12. gobuster
A fast tool used to brute-force URIs (directories and files), DNS subdomains, and virtual host names.

gobuster dir -u http://example.com -w /usr/share/wordlists/dirb/common.txt

===============================================================
Gobuster v3.5
===============================================================
[+] Url: http://example.com
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirb/common.txt
===============================================================
/index.html (Status: 200) [Size: 1256]
/images (Status: 301) [Size: 178] -> http://example.com/images/
/javascript (Status: 301) [Size: 178] -> http://example.com/javascript/


#13. nikto
A web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/CGIs.

nikto -h http://scanme.nmap.org

- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP: 45.33.32.156
+ Target Hostname: scanme.nmap.org
+ Target Port: 80
+ Start Time: ...
---------------------------------------------------------------------------
+ Server: Apache/2.4.7 (Ubuntu)
+ The anti-clickjacking X-Frame-Options header is not present.
+ OSVDB-3233: /icons/README: Apache default file found.


#14. sqlmap
An open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws.

sqlmap -u "http://testphp.vulnweb.com/listproducts.php?cat=1" --dbs

...
available databases [2]:
[*] information_schema
[*] acuart


#15. whatweb
Identifies different web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.

whatweb scanme.nmap.org

http://scanme.nmap.org [200 OK] Apache[2.4.7], Country[UNITED STATES], HTTPServer[Ubuntu Linux][Apache/2.4.7 ((Ubuntu))], IP[45.33.32.156], Script, Title[Go ahead and ScanMe!], Ubuntu

---
#CyberSecurity #PasswordCracking #Exploitation

#16. John the Ripper (john)
A fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS.

# Assume 'hashes.txt' contains 'user:$apr1$A.B.C...$...'
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt

Using default input encoding: UTF-8
Loaded 1 password hash (md5crypt, 32/64 OpenSSL)
Press 'q' or Ctrl-C to abort, almost any other key for status
password123 (user)
1g 0:00:00:01 DONE (2023-10-27 10:15) 0.9803g/s 1234p/s 1234c/s
Session completed


#17. hashcat
An advanced password recovery utility that can crack a wide variety of hash types using multiple attack modes (dictionary, brute-force, mask).

# -m 0 = MD5 hash type
hashcat -m 0 -a 0 hashes.md5 /usr/share/wordlists/rockyou.txt
❀1