Binary Exploits with Python



Binary Exploits with Python

Rating 4.35 out of 5 (22 ratings in Udemy)


What you'll learn
  • Remove unwanted code such as the password or product key tests, and add Trojan code
  • Analyze simple Windows executable files and modify them using the Immunity Debugger
  • Write Python Scripts to perform exploits
  • Analyze simple Linux executable files and modify them using the gdb debugger

Description

A penetration tester who only knows how to use tools written by others is limited to old techniques. Learning to develop your own …

Duration 2 Hours 58 Minutes
Paid

Self paced

Intermediate Level

English (US)

359

Rating 4.35 out of 5 (22 ratings in Udemy)

Go to the Course
We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.