Binary Exploits with Python

Rating 4.35 out of 5 (22 ratings in Udemy)
What you'll learn
- Remove unwanted code such as the password or product key tests, and add Trojan code
- Analyze simple Windows executable files and modify them using the Immunity Debugger
- Write Python Scripts to perform exploits
- Analyze simple Linux executable files and modify them using the gdb debugger
Description
A penetration tester who only knows how to use tools written by others is limited to old techniques. Learning to develop your own …
Duration 2 Hours 58 Minutes
Paid
Self paced
Intermediate Level
English (US)
359
Rating 4.35 out of 5 (22 ratings in Udemy)
Go to the Course
We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
Paid
Self paced
Intermediate Level
English (US)
359
Rating 4.35 out of 5 (22 ratings in Udemy)
Go to the Course