Binary Exploits with Python

1 - Modifying Windows Programs

Adding Trojans to EXE Files.

Challenge 1 - Patching an EXE.

Challenge 2 - Patching 19 and 256 EXEs.

Challenge 3 - Assembly Language Programming.

Creating Malware with Metasploit.

EXE Hacking with OllyDbg.

Introductory Assembly Language.

2 - Command Injection

ImageMagick (with Challenge).

Ping Form (with Challenge).

SQL Injection Challenges.

SQL Injection.

String Overflow (with Challenge).

3 - Exploiting Linux Vulnerabilities

Challenges.

Format String Vulnerability.

Heap Overflow.

Redirecting Execution.

Using Msfvenom.

Using Shellcode.

4 - Exploiting Windows Vulnerabilities

Challenges - KSTET and GMON.

Defeating Address Space Layout Randomization.

Defeating Data Execution Prevention.

Exploiting the SEH.

Fuzzing with SPIKE.

Heap Spray.

Stack Buffer Overflow.

  • Content
  • Advantages
  • Details
Course Content (100% digital)

Learn more about this content creator

Piter Sabra
3 Hotmarter Years

Why buy at Hotmart Marketplace?

Up to 7 days to request a refund

Safe payments

Hotmart Support

Access in all devices

Various payment options

How can I access it?

After your purchase, the product will be available in your account

You'll access your product through a link that we'll send to your email. You can also access it on this page.

Frequently Asked Questions

The content of this product does not represent the official opinion or policy of Hotmart. If you see improper information, report it here