Menu

Python

All articles and tutorials tagged #Python
How to Create a Linux Botnet Step by Step with BYOB
How to Create a Linux Botnet Step by Step with BYOB

BYOB is a project made with Python offering security researchers and developers a structure to build and operate a simple botnet to deepen their understanding [...]

BYOBBotnetPythonLinuxMalwareTrojab
Getting Started with Sqlmap for Pentest and Ethical Hacking
Getting Started with Sqlmap for Pentest and Ethical Hacking

Using SQLmap can be tricky when you are not familiar with it. This SQLmap tutorial aims to present the most important functionalities of this popular SQL [...]

DumpHashInjectionSQLISqlmapPython
How to Create a Keylogger for Linux using Python
How to Create a Keylogger for Linux using Python

Some recent studies estimate that between 100 to 150 million computers worldwide would be directly infected by at least one malware such as Trojan or Keylogger.

KeyloggerPythonKeystrokesEventsCrontabTrojan
NSA Exploits used by Worm-Cryptominer to Attack Systems
NSA Exploits used by Worm-Cryptominer to Attack Systems

Cyber-security researchers have discovered and analyzed a worm-cryptominer combo that uses a series of exploits to move sideways and compromise the devices of [...]

CryptominerEternalBlueExploitNSAPowershellPythonWorm
How to use WebXray to Identify Domains collecting User Data
How to use WebXray to Identify Domains collecting User Data

Do you know that while you are browsing a website, you are mostly tracked by third parties who compile detailed records of your browsing behaviors.

DataleakGDPRPrivacyPythonSelenium
How to Create a Reverse Shell to Remotely Execute Commands
How to Create a Reverse Shell to Remotely Execute Commands

If you're lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you'll probably want to establish an [...]

BashNetcatPerlPHPPythonReverseRubyShellTelnet
Evading AntiVirus with Encrypted Payloads using Venom
Evading AntiVirus with Encrypted Payloads using Venom

Be able to bypass Antivirus can be very useful while penetration testing phases. Venom allow you to generate shellcode that work with encrypted payloads.

AntivirusDLLMetasploitMSIPayloadsPythonRubyVenom
How to Generate a Payload for Metasploit
How to Generate a Payload for Metasploit

Often one of the most useful and to the beginner underrated abilities of Metasploit is the msfpayload module. Multiple payloads can be created with this module.

ASPBashBinaryJSPMacPayloadsPerlPHPPython