Python Code Tutorials


articles/make-a-grep-clone-in-python.jpg
How to Make a Grep Clone in Python

Learn to build your own Python-based grep tool in this concise guide, perfect for bug hunting and pen-testing. Master text pattern searches within files and streams, saving time and effort in your development tasks.

articles/remove-metadata-from-pdfs-in-python.jpg
How to Remove Metadata from PDFs in Python

Learn to safeguard privacy by removing metadata from PDFs using Python's PyPDF2 in this tutorial. Discover how metadata can expose sensitive information and how to erase it to protect confidentiality, with step-by-step code guidance and practical examples.

articles/find-past-wifi-networks-using-winreg-in-python.jpg
How to Find Past Wi-Fi Connections on Windows in Python

Discover how to reveal all previously connected Wi-Fi networks on a Windows computer using Python, a crucial tool in digital forensics to unearth networks thought to be forgotten but stored in the Windows Registry.

articles/make-a-username-finder-in-python.jpg
How to Build a Username Search Tool in Python

Learn how to build a Python script that checks if a given username is available or taken across popular social media sites like Instagram, Facebook, Reddit, and more using concurrent requests in Python.

articles/create-video-from-images-in-python.jpg
How to Create Videos from Images in Python

Learn how to create videos from image arrays using Python and OpenCV, focusing on timelapses. Setting up OpenCV, using argparse for input parameters, and processing images in batches. Key steps include configuring the VideoWriter object, iterating over images to build the video, and tips for efficient memory use.

articles/clearing-metadata-from-images-in-python.jpg
How to Remove Metadata from Images in Python

Learn to protect your privacy by deleting metadata from images using Python and the Pillow library in this step-by-step tutorial, perfect for enhancing security.

articles/nms-opencv-python.jpg
Non-Maximum Suppression with OpenCV and Python

Explore the critical role of Non-Maximum Suppression (NMS) in object detection to eliminate redundant bounding boxes, ensuring precise results. This guide covers NMS's workings, the importance of Intersection-over-Union (IoU), and how to implement NMS with OpenCV in Python.

articles/implement-2fa-in-python.jpg
How to Implement 2FA in Python

Learn how to enhance security with Python by implementing Two-Factor Authentication (2FA) using TOTP and HOTP algorithms. This comprehensive guide covers everything from generating OTPs with pyotp to integrating with authenticator apps.

articles/make-a-fork-bomb-in-python_compressed.jpg
How to Create A Fork Bomb in Python

Learn how to build a fork bomb with os and multiprocessing modules in Python, a program that consumes the target computer's resources and potentially freezes it.

articles/seeing-hidden-wifi-networks-with-scapy-in-python.jpg
How to View Hidden Wi-Fi Networks in Python

Discover how to uncover hidden Wi-Fi networks using Python and Scapy. This tutorial debunks the security myth of hidden SSIDs and guides you through setting up your adapter in monitor mode to detect and log hidden networks, emphasizing practical network analysis and security assessment.

articles/ip-spoofing-using-scapy-in-python.jpg
How to Perform IP Address Spoofing in Python

Master IP spoofing with Python: Dive into crafting fake IP addresses to test network security. Utilize Scapy and Faker in a hands-on tutorial to send spoofed ICMP packets, complete with practical examples and step-by-step instructions.

articles/make-a-bluetooth-scanner-in-python.jpg
How to Make a Bluetooth Device Scanner in Python

Master Bluetooth device scanning with Python: A concise tutorial on using PyBluez for discovering and analyzing nearby Bluetooth devices, essential for cybersecurity and ethical hacking.

articles/make-a-sudoku-game-in-python.jpg
How to Build a Sudoku Game with Python

Learn how to build your own Sudoku game in Python using Pygame with this comprehensive tutorial. Covering installation, game logic, user interface, and a timer feature, this guide is perfect for enthusiasts looking to create a functional and extendable Sudoku puzzle game.

articles/generating-fake-user-data-in-python.jpg
How to Generate Fake User Data in Python

Master Python's Faker library to generate and manage fake user data. Ideal for privacy protection and software testing, this tutorial covers creating a versatile program for realistic data generation, including saving options in CSV or TXT formats.

articles/handling-files-in-python-using-os-module.jpg
How to Manage Money with Python

Explore how Python, a versatile and user-friendly programming language, enhances money management through budgeting, expense tracking, and investment analysis. This guide delves into Python's financial tools and libraries for effective financial planning and automation, ensuring secure and informed financial decisions.

articles/implement-the-vigenere-cipher-in-python.jpg
How to Implement the Vigenère Cipher in Python

Step-by-step guide to implementing the Vigenère Cipher in Python. Understand its mechanism, strengths, and vulnerabilities, with practical examples for encryption and decryption.