Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View m-mcnair's full-sized avatar
:shipit:
Remote
:shipit:
Remote

Block or report m-mcnair

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. grovers-algothrim grovers-algothrim Public

    Running Grovers algorithm on a Qiskit Quantum Simulator

    Python

  2. pyB2 pyB2 Public

    Penetration testing, or ethical hacking, is a crucial aspect of cybersecurity. It involves assessing systems, networks, and applications to identify vulnerabilities before malicious actors can expl…

    Python

  3. pyX2 pyX2 Public

    Exploring how python plays a crucial role in threat hunting, with technical insights and practical examples. Use this tool to become a better analyst.

    Python

  4. pyY2 pyY2 Public

    Automating with python for security workflows could be difficult but with python it is easy!

    Python

  5. pyD2 pyD2 Public

    One crucial aspect of network security is detecting and responding to intrusion attempts. In this blog post, we'll explore how Python can be used to build a Network Intrusion Detection System (NID…

    Python

  6. pyR2 pyR2 Public

    Vulnerability Scanners are so crucial for Organizations that need network security.