Code With Python
39.2K subscribers
886 photos
27 videos
22 files
769 links
This channel delivers clear, practical content for developers, covering Python, Django, Data Structures, Algorithms, and DSA – perfect for learning, coding, and mastering key programming skills.
Admin: @HusseinSheikho || @Hussein_Sheikho
Download Telegram
πŸ“š Hacking Secret Ciphers with Python (2013)

1⃣ Join Channel Download:
https://t.iss.one/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.iss.one/c/1854405158/1694

πŸ’¬ Tags: #CyberSecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
πŸ‘3❀1
πŸ“Ή πŸš€ Cybersecurity for Beginners – a curriculum

In this rapidly changing age of AI technology adoption, it is even more critical to understand how to secure IT systems. This course is designed to teach you fundamental cyber security concepts to kick-start your security learning. It is vendor agnostic and is divided into small lessons that should take around 30-60 mins to complete. Each lesson has a small quiz and links to further reading if you want to dive into the topic a bit more

πŸ”— Link of course: https://github.com/microsoft/Security-101/?tab=readme-ov-file#-cybersecurity-for-beginners--a-curriculum

πŸ”– Tags: #CyberSecurity

πŸ‘‰ BEST DATA SCIENCE CHANNELS ON TELEGRAM πŸ‘ˆ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘4
πŸ“š 270+ Cyber Security Interview Questions and Answers (2024)

1⃣ Join Channel Download:
https://t.iss.one/+MhmkscCzIYQ2MmM8

2⃣ Download Book: https://t.iss.one/c/1854405158/1916

πŸ’¬ Tags: #CyberSecurity

USEFUL CHANNELS FOR YOU
Automatically Generate Image CAPTCHAs with Python for Enhanced Security

Unlock the power of Python to automatically generate image CAPTCHAs, adding an extra layer of security to online platforms. This advanced solution leverages Python's robust libraries to create dynamic, hard-to-crack CAPTCHA images that protect against bots and unauthorized access. With customizable features, such as text distortion, background noise, and color variations, these CAPTCHAs ensure a unique challenge for every user session. Elevate your system’s defense mechanisms while maintaining a seamless user experience.

#PythonProgramming #CAPTCHA #CyberSecurity #Automation #WebDevelopment #SecureAuthentication #TechInnovation

https://t.iss.one/DataScience4
πŸ”₯5πŸ‘3
πŸš€ FREE IT Study Kits for 2025 β€” Grab Yours Now!

Just found these zero-cost resources from SPOTOπŸ‘‡
Perfect if you're prepping for #Cisco, #AWS, #PMP, #AI, #Python, #Excel, or #Cybersecurity!
βœ… 100% Free
βœ… No signup traps
βœ… Instantly downloadable

πŸ“˜ IT Certs E-book: https://bit.ly/4fJSoLP
☁️ Cloud & AI Kits: https://bit.ly/3F3lc5B
πŸ“Š Cybersecurity, Python & Excel: https://bit.ly/4mFrA4g
🧠 Skill Test (Free!): https://bit.ly/3PoKH39
Tag a friend & level up together πŸ’ͺ

🌐 Join the IT Study Group: https://chat.whatsapp.com/E3Vkxa19HPO9ZVkWslBO8s
πŸ“² 1-on-1 Exam Help: https://wa.link/k0vy3x
πŸ‘‘Last 24 HOURS to grab Mid-Year Mega Sale prices!Don’t miss Lucky DrawπŸ‘‡
https://bit.ly/43VgcbT
πŸ‘1
πŸ”₯ Trending Repository: 90DaysOfCyberSecurity

πŸ“ Description: This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md

πŸ”— Repository URL: https://github.com/farhanashrafdev/90DaysOfCyberSecurity

πŸ“– Readme: https://github.com/farhanashrafdev/90DaysOfCyberSecurity#readme

πŸ“Š Statistics:
🌟 Stars: 10.7K stars
πŸ‘€ Watchers: 192
🍴 Forks: 1.2K forks

πŸ’» Programming Languages: Not available

🏷️ Related Topics:
#cybersecurity #learn #hacktoberfest #ethical_hacking #communityexchange


==================================
🧠 By: https://t.iss.one/DataScienceN
❀3
Top 30 Cyber Security Commands & Tools

#CyberSecurity #Reconnaissance #InfoGathering

#1. ping
Tests reachability of a host on an IP network and measures round-trip time.

ping -c 4 google.com

PING google.com (142.250.72.14) 56(84) bytes of data.
64 bytes from lhr48s23-in-f14.1e100.net (142.250.72.14): icmp_seq=1 ttl=118 time=8.53 ms
...
--- google.com ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3005ms


#2. whois
Retrieves registration information for a domain name or IP address.

whois google.com

Domain Name: GOOGLE.COM
Registry Domain ID: 2138514_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
...
Registrant Organization: Google LLC
Registrant State/Province: CA
Registrant Country: US


#3. dig
(Domain Information Groper) A tool for querying DNS servers.

dig google.com

; <<>> DiG 9.18.1-1-Debian <<>> google.com
;; ANSWER SECTION:
google.com. 156 IN A 142.250.187.238
...
;; Query time: 12 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)


#4. nmap
Network Mapper. A powerful tool for network discovery, port scanning, and security auditing.

nmap -sV -p 80,443 scanme.nmap.org

Starting Nmap 7.92 ( https://nmap.org ) at ...
Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (0.16s latency).

PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
443/tcp open ssl/http Apache httpd 2.4.7 ((Ubuntu))


#5. netcat (nc)
The "Swiss army knife" of networking. Can be used for port scanning, file transfer, and creating backdoors.

nc -zv scanme.nmap.org 80

Connection to scanme.nmap.org (45.33.32.156) 80 port [tcp/http] succeeded!

---
#CyberSecurity #Networking #Analysis

#6. netstat
Displays active network connections, routing tables, and interface statistics.

netstat -tulpn

Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:5432 0.0.0.0:* LISTEN 675/postgres
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 789/sshd
udp 0 0 0.0.0.0:68 0.0.0.0:* 654/dhclient


#7. traceroute
Traces the network path (hops) to a remote host.

traceroute 8.8.8.8

traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets
1 gateway (192.168.1.1) 1.234 ms 1.567 ms 1.890 ms
2 isp-router.net (10.0.0.1) 5.432 ms 5.678 ms 5.901 ms
...
10 142.251.52.221 (142.251.52.221) 10.112 ms 10.345 ms 10.578 ms
11 dns.google (8.8.8.8) 10.801 ms 10.923 ms 11.045 ms


#8. tcpdump
A powerful command-line packet analyzer that allows you to capture and display network traffic.

sudo tcpdump -i eth0 -c 5 port 80

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
14:30:01.123456 IP my-pc.54321 > example.com.80: Flags [S], seq 123456789, win 64240, options [mss 1460,sackOK,TS val 10,ecr 0], length 0
... (4 more packets) ...
5 packets captured


#9. arp
Displays and modifies the Address Resolution Protocol (ARP) cache, which maps IP addresses to MAC addresses.

arp -a

? (192.168.1.1) at 00:1a:2b:3c:4d:5e [ether] on eth0
? (192.168.1.105) at 98:76:54:32:10:fe [ether] on eth0


#10. ip
A modern tool to show and manipulate routing, devices, policy routing, and tunnels. (Replaces ifconfig).

ip addr show
❀1
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 ...
inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 ...
inet 192.168.1.100/24 brd 192.168.1.255 scope global dynamic eth0

---
#CyberSecurity #WebSecurity #Vulnerability

#11. curl
A tool to transfer data from or to a server, using various protocols. Essential for interacting with web APIs and inspecting HTTP headers.

curl -I https://example.com

HTTP/1.1 200 OK
Content-Encoding: gzip
Accept-Ranges: bytes
Cache-Control: max-age=604800
Content-Type: text/html; charset=UTF-8
Date: Fri, 27 Oct 2023 10:00:00 GMT
Server: ECS (dcb/7F83)
Content-Length: 648


#12. gobuster
A fast tool used to brute-force URIs (directories and files), DNS subdomains, and virtual host names.

gobuster dir -u https://example.com -w /usr/share/wordlists/dirb/common.txt

===============================================================
Gobuster v3.5
===============================================================
[+] Url: https://example.com
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirb/common.txt
===============================================================
/index.html (Status: 200) [Size: 1256]
/images (Status: 301) [Size: 178] -> https://example.com/images/
/javascript (Status: 301) [Size: 178] -> https://example.com/javascript/


#13. nikto
A web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/CGIs.

nikto -h https://scanme.nmap.org

- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP: 45.33.32.156
+ Target Hostname: scanme.nmap.org
+ Target Port: 80
+ Start Time: ...
---------------------------------------------------------------------------
+ Server: Apache/2.4.7 (Ubuntu)
+ The anti-clickjacking X-Frame-Options header is not present.
+ OSVDB-3233: /icons/README: Apache default file found.


#14. sqlmap
An open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws.

sqlmap -u "https://testphp.vulnweb.com/listproducts.php?cat=1" --dbs

...
available databases [2]:
[*] information_schema
[*] acuart


#15. whatweb
Identifies different web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.

whatweb scanme.nmap.org

https://scanme.nmap.org [200 OK] Apache[2.4.7], Country[UNITED STATES], HTTPServer[Ubuntu Linux][Apache/2.4.7 ((Ubuntu))], IP[45.33.32.156], Script, Title[Go ahead and ScanMe!], Ubuntu

---
#CyberSecurity #PasswordCracking #Exploitation

#16. John the Ripper (john)
A fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS.

# Assume 'hashes.txt' contains 'user:$apr1$A.B.C...$...'
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt

Using default input encoding: UTF-8
Loaded 1 password hash (md5crypt, 32/64 OpenSSL)
Press 'q' or Ctrl-C to abort, almost any other key for status
password123 (user)
1g 0:00:00:01 DONE (2023-10-27 10:15) 0.9803g/s 1234p/s 1234c/s
Session completed


#17. hashcat
An advanced password recovery utility that can crack a wide variety of hash types using multiple attack modes (dictionary, brute-force, mask).

# -m 0 = MD5 hash type
hashcat -m 0 -a 0 hashes.md5 /usr/share/wordlists/rockyou.txt
...
Session..........: hashcat
Status...........: Cracked
Hash.Name........: MD5
Hash.Target......: 5f4dcc3b5aa765d61d8327deb882cf99
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
...
Recovered........: 1/1 (100.00%) Digests


#18. hydra
A parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible.

hydra -l user -P /path/to/passwords.txt ftp://192.168.1.101

Hydra v9.1 (c) 2020 by van Hauser/THC - Please do not use in military projects
...
[21][ftp] host: 192.168.1.101 login: user password: password
1 of 1 target successfully completed, 1 valid password found


#19. Metasploit Framework (msfconsole)
An exploitation framework for developing, testing, and executing exploit code against a remote target machine.

msfconsole

=[ metasploit v6.3.3-dev                          ]
+ -- --=[ 2289 exploits - 1184 auxiliary - 406 post ]
+ -- --=[ 953 payloads - 45 encoders - 11 nops ]
+ -- --=[ 9 evasion ]

msf6 >


#20. searchsploit
A command-line search tool for Exploit-DB that also allows you to take a copy of exploits to your working directory.

searchsploit apache 2.4.7

-------------------------------------------------- ---------------------------------
Exploit Title | Path
-------------------------------------------------- ---------------------------------
Apache 2.4.7 (Ubuntu) - 'mod_cgi' Bash Env | linux/remote/34900.py
Apache mod_authz_svn < 1.8.10 / < 1.7.18 - | multiple/remote/34101.txt
-------------------------------------------------- ---------------------------------

---
#CyberSecurity #Forensics #Utilities

#21. strings
Prints the sequences of printable characters in files. Useful for finding plaintext credentials or other information in binary files.

strings /bin/bash

/lib64/ld-linux-x86-64.so.2
_ITM_deregisterTMCloneTable
__gmon_start__
...
echo
read
printf


#22. grep
Searches for patterns in each file. An indispensable tool for parsing log files and command output.

grep "Failed password" /var/log/auth.log

Oct 27 10:20:05 server sshd[1234]: Failed password for invalid user admin from 203.0.113.5 port 54321 ssh2
Oct 27 10:20:10 server sshd[1236]: Failed password for root from 203.0.113.5 port 12345 ssh2


#23. chmod
Changes the permissions of files and directories. Critical for hardening a system.

# Before
ls -l script.sh
-rwxrwxr-x 1 user user 50 Oct 27 10:25 script.sh

# Command
chmod 700 script.sh

# After
ls -l script.sh

-rwx------ 1 user user 50 Oct 27 10:25 script.sh


#24. xxd
Creates a hex dump of a given file or standard input. It can also convert a hex dump back to its original binary form.

echo -n "Hi" | xxd

00000000: 4869                                     Hi


#25. base64
Encodes and decodes data in Base64 format. Commonly used in web applications and email attachments.

echo -n "security" | base64

c2VjdXJpdHk=

---
#CyberSecurity #Crypto #Hashing

#26. openssl
A robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. Also a general-purpose cryptography library.

# Generate a self-signed certificate
openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 365 -nodes