• Home
  • Video
  • Games
  • Applications
  • Audio
  • Porn
  • Other
  • TOP-100
  • Sitemap
  • RSS Feed
  • Feedback
>

Videos

  • Video
  • Movies
  • UHD/4k - Movies
  • Movies DVDR
  • Music videos
  • Movie clips
  • TV shows
  • UHD/4k - TV shows
  • Handheld
  • HD - Movies
  • HD - TV shows
  • 3D
  • CAM/TS
  • Other

Games

  • Games
  • PC
  • Mac
  • PSx
  • XBOX360
  • Wii
  • Handheld
  • IOS (iPad/iPhone)
  • Android
  • Other

Applications

  • Applications
  • Windows
  • Mac
  • UNIX
  • Handheld
  • IOS (iPad/iPhone)
  • Android
  • Other

Audio

  • Audio
  • Music
  • Audio books
  • Sound clips
  • FLAC
  • Other

Porn

  • Porn
  • Movies
  • UHD/4k - Movies XXX
  • Movies DVDR
  • Pictures
  • Games
  • HD - Movies
  • Movie clips
  • Other

Other

  • Other
  • E-books
  • Comics
  • Pictures
  • Covers
  • Physibles
  • Other

    Common Vulnerabilities and Exploits with Python

    Common Vulnerabilities and Exploits with Python
    Dear users!
    Don't forget to stay on the giveaway after downloading the torrent! Help others to download too - support free sharing!

    If you are NOT able to download the torrent file, then use VPN!

    Size: 104.88 MiB (109976225 Bytes)
    Uploaded by: tuts756

    Download Torrent Common Vulnerabilities and Exploits with Python

    Number of files: 42
    Info Hash: 9898F17800A940C719ED6C39858A43D2CB9C04C8

    ⇒ NFO:
    Description Just like any other programming language, Python can also be used by attackers to conduct malicious actions. This course will teach you how to prevent common vulnerabilities with Python. Python is becoming increasingly popular not only in data science, but also in the software engineering community. According to the stack overflow annual survey, Python holds the fourth place as the most popular technology. It allows fast development and it’s relatively easy compared to other high-level programming languages. As its popularity grows, and many people are drawn into using it, the reports of being used for vulnerability exploitation emerge. In this course, Common Vulnerabilities and Exploits with Python, you will learn how to exploit those vulnerabilities from the perspective of an attacker, with the main objective to avoid the mistakes of introducing them in your production software First, you will learn how to perform and protect against a buffer overflow attack. You will focus also on the EternalBlue exploit, which affected many Windows operating system versions. Second, you will see how you can create a keylogger application, capable of recording the keystrokes of the victim, as well as taking screenshots from the target’s computer. Finally, you will discover how you can execute shellcode using Python, and how to enhance a malware to detect anti-malware sandboxing techniques and evade them. By the end of this course, you will improve your skill set in using Python for detecting and avoiding common vulnerabilities. Last Updated 12/2022

    Category: Other | Added: 29.01.2023 | Author: ADMIN | Views: 0


  • Home
  • Video
  • Games
  • Applications
  • Audio
  • Porn
  • Other
  • © 2024 RUTOR-BEST.RU

Администрация сайта не несёт ответственности за содержание материалов находящихся на ресурсе. Если вы являетесь правообладателем и хотите полностью или частично убрать свой материал с нашего сайта, то напишите администрации с ссылками на соответствующие документы. Ваша собственность находилась в свободном доступе и только поэтому была опубликована на нашем сайте. Сайт некоммерческий, и мы не имеем возможности проверять все публикации пользователей.

Жалобы принимаются по адресу support@rutor-best.ru | Обратная связь

Copyright © 2024 - RUTOR-BEST.RU

Яндекс.Метрика