|  

Common Vulnerabilities and Exploits with Python



Size :104.9 MB
Peers : Seeders : 0      Leechers : 0
Added : 1 year ago » by tutsnode » in Other
Language : English
Last Updated :6 months ago
Info_Hash :9898F17800A940C719ED6C39858A43D2CB9C04C8

Torrent File Contents

Common Vulnerabilities and Exploits with Python
  [TutsNode.net] - 3. Buffer Overflow Vulnerabilities with Python/2. Exploiting Buffer Overflow in a Vulnerable Software.mp4
  -  23.72 MB

  TutsNode.net.txt
  -  63 Bytes

  [TutsNode.net] - 3. Buffer Overflow Vulnerabilities with Python/2. Exploiting Buffer Overflow in a Vulnerable Software.vtt
  -  13.34 KB

  [TutsNode.net] - 4. Common Exploits in Windows/2. Creating a Keylogger in Python.vtt
  -  8.26 KB

  [TutsNode.net] - 1. Course Overview/1. Course Overview.vtt
  -  2.14 KB

  [TutsNode.net] - 3. Buffer Overflow Vulnerabilities with Python/1. Explaining the Buffer Overflow Vulnerability.vtt
  -  4.45 KB

  [TutsNode.net] - 2. Installing Python/1. Introduction.vtt
  -  2.75 KB

  [TutsNode.net] - 3. Buffer Overflow Vulnerabilities with Python/4. Exploiting the EternalBlue Vulnerability.vtt
  -  7.59 KB

  [TutsNode.net] - 2. Installing Python/4. Setting up Virtual Environments.vtt
  -  6.95 KB

  [TutsNode.net] - 4. Common Exploits in Windows/1. Executing Shellcode with Python.vtt
  -  5.79 KB

  [TutsNode.net] - 4. Common Exploits in Windows/3. Sandbox Detection with Python.vtt
  -  5.31 KB

  [TutsNode.net] - 2. Installing Python/2. Installing Python on Windows.vtt
  -  4.75 KB

  [TutsNode.net] - 2. Installing Python/3. Installing Python on Linux Systems.vtt
  -  3.45 KB

  [TutsNode.net] - 3. Buffer Overflow Vulnerabilities with Python/3. Exploiting Buffer Overflow in a Web Service.vtt
  -  3.12 KB

  [TutsNode.net] - 4. Common Exploits in Windows/4. Course Conclusions.vtt
  -  1.55 KB

  [TGx]Downloaded from torrentgalaxy.buzz .txt
  -  585 Bytes

  .pad/0
  -  86.21 KB

  [TutsNode.net] - 4. Common Exploits in Windows/2. Creating a Keylogger in Python.mp4
  -  11.83 MB

  .pad/1
  -  45.04 KB

  [TutsNode.net] - 2. Installing Python/4. Setting up Virtual Environments.mp4
  -  9.66 MB

  .pad/2
  -  94.16 KB

  [TutsNode.net] - 3. Buffer Overflow Vulnerabilities with Python/4. Exploiting the EternalBlue Vulnerability.mp4
  -  9.29 MB

  .pad/3
  -  84.49 KB

  [TutsNode.net] - 4. Common Exploits in Windows/1. Executing Shellcode with Python.mp4
  -  7.07 MB

  .pad/4
  -  57.67 KB

  [TutsNode.net] - 4. Common Exploits in Windows/3. Sandbox Detection with Python.mp4
  -  7.03 MB

  .pad/5
  -  96.68 KB

  [TutsNode.net] - 2. Installing Python/2. Installing Python on Windows.mp4
  -  6.43 MB

  .pad/6
  -  69.62 KB

  [TutsNode.net] - 3. Buffer Overflow Vulnerabilities with Python/1. Explaining the Buffer Overflow Vulnerability.mp4
  -  5.99 MB

  .pad/7
  -  6.98 KB

  [TutsNode.net] - python-common-vulnerabilities-exploits.zip
  -  5.16 MB

  .pad/8
  -  92.8 KB

  [TutsNode.net] - 2. Installing Python/3. Installing Python on Linux Systems.mp4
  -  4.64 MB

  .pad/9
  -  108.61 KB

  [TutsNode.net] - 3. Buffer Overflow Vulnerabilities with Python/3. Exploiting Buffer Overflow in a Web Service.mp4
  -  3.88 MB

  .pad/10
  -  117.98 KB

  [TutsNode.net] - 1. Course Overview/1. Course Overview.mp4
  -  3.8 MB

  .pad/11
  -  77.4 KB

  [TutsNode.net] - 2. Installing Python/1. Introduction.mp4
  -  3.79 MB

  .pad/12
  -  91.78 KB

  [TutsNode.net] - 4. Common Exploits in Windows/4. Course Conclusions.mp4
  -  1.51 MB



Torrent Description


Description

Just like any other programming language, Python can also be used by attackers to conduct malicious actions. This course will teach you how to prevent common vulnerabilities with Python.

Python is becoming increasingly popular not only in data science, but also in the software engineering community. According to the stack overflow annual survey, Python holds the fourth place as the most popular technology. It allows fast development and it’s relatively easy compared to other high-level programming languages. As its popularity grows, and many people are drawn into using it, the reports of being used for vulnerability exploitation emerge. In this course, Common Vulnerabilities and Exploits with Python, you will learn how to exploit those vulnerabilities from the perspective of an attacker, with the main objective to avoid the mistakes of introducing them in your production software First, you will learn how to perform and protect against a buffer overflow attack. You will focus also on the EternalBlue exploit, which affected many Windows operating system versions. Second, you will see how you can create a keylogger application, capable of recording the keystrokes of the victim, as well as taking screenshots from the target’s computer. Finally, you will discover how you can execute shellcode using Python, and how to enhance a malware to detect anti-malware sandboxing techniques and evade them. By the end of this course, you will improve your skill set in using Python for detecting and avoiding common vulnerabilities.

Last Updated 12/2022