The reconnaissance stage of a cyber attack. we're going to look at developing Python applications to perform network scanning, and this includes both looking for open ports and applications on a target computer and also scanning for potentially vulnerable applications on those computers.
NawwarMohammad/Reconnaissance
Folders and files
| Name | Name | Last commit date | ||
|---|---|---|---|---|