Python for Cybersecurity
Memory Layout Understanding
Buffer Overflow Concepts
Stack-Based Overflows
Heap-Based Overflows
Return-Oriented Programming (ROP)
Fuzzer Development
Input Generation Strategies
Crash Analysis
Vulnerability Triage
Exploit Development Workflow
Shellcode Concepts
Assembly Language Basics
Shellcode Generation
Shellcode Encoding
Payload Delivery Mechanisms
Process Interaction
subprocess Module Usage
os Module for System Commands
Remote Shell Handling
Privilege Escalation Techniques
pwntools Installation and Setup
Remote Connection Handling
Exploit Script Development
Payload Generation
Return Address Calculation
Metasploit RPC Interface
msfrpc-client Usage
Exploit Module Automation
Payload Generation and Delivery
Post-Exploitation Automation
Previous
5. Web Application Security Testing
Go to top
Next
7. Malware Analysis and Reverse Engineering