Binary Exploits with Python

Information TechnologyOnline Courses and Subscription Services

1 - Modifying Windows Programs

Adding Trojans to EXE Files.

Challenge 1 - Patching an EXE.

Challenge 2 - Patching 19 and 256 EXEs.

Challenge 3 - Assembly Language Programming.

Creating Malware with Metasploit.

EXE Hacking with OllyDbg.

Introductory Assembly Language.

2 - Command Injection

ImageMagick (with Challenge).

Ping Form (with Challenge).

SQL Injection Challenges.

SQL Injection.

String Overflow (with Challenge).

3 - Exploiting Linux Vulnerabilities

Challenges.

Format String Vulnerability.

Heap Overflow.

Redirecting Execution.

Using Msfvenom.

Using Shellcode.

4 - Exploiting Windows Vulnerabilities

Challenges - KSTET and GMON.

Defeating Address Space Layout Randomization.

Defeating Data Execution Prevention.

Exploiting the SEH.

Fuzzing with SPIKE.

Heap Spray.

Stack Buffer Overflow.

Read More
  1. Advantages
  2. Details
  3. Content

1 - Modifying Windows Programs

Adding Trojans to EXE Files.

Challenge 1 - Patching an EXE.

Challenge 2 - Patching 19 and 256 EXEs.

Challenge 3 - Assembly Language Programming.

Creating Malware with Metasploit.

EXE Hacking with OllyDbg.

Introductory Assembly Language.

2 - Command Injection

ImageMagick (with Challenge).

Ping Form (with Challenge).

SQL Injection Challenges.

SQL Injection.

String Overflow (with Challenge).

3 - Exploiting Linux Vulnerabilities

Challenges.

Format String Vulnerability.

Heap Overflow.

Redirecting Execution.

Using Msfvenom.

Using Shellcode.

4 - Exploiting Windows Vulnerabilities

Challenges - KSTET and GMON.

Defeating Address Space Layout Randomization.

Defeating Data Execution Prevention.

Exploiting the SEH.

Fuzzing with SPIKE.

Heap Spray.

Stack Buffer Overflow.

Advantages

7-day warranty
Safe payments
Hotmart Support
Access in all devices
Pay with two cards
Access via Hotmart Sparkle
How can I access it?

After your purchase, the product will be available in your account

You'll access your product through a link that we'll send to your email. You can also access it on this page.

Frequently Asked Questions