hack-night
Background
1.
Introduction
2.
Source Code Auditing
2.1.
Part 1
2.1.1.
Intro to Python
2.1.2.
Beyond Math
2.1.3.
Risky Python
2.1.4.
input1.py Walkthrough
2.1.5.
input2.py Walkthrough
2.2.
Part 2
2.2.1.
News Paper
2.2.2.
Siberia Crimeware
3.
Web Security
3.1.
Part 1
3.2.
Part 2
4.
Reverse Engineering
4.1.
Part 1
4.2.
Part 2
4.3.
Part 3
4.4.
Part 4
5.
Exploitation
5.1.
Part 1
5.2.
Part 2
6.
Post Exploitation
7.
Application Security
8.
Conclusion
9.
Further Resources
Powered by
GitBook
A
A
Serif
Sans
White
Sepia
Night
Share on Twitter
Share on Google
Share on Facebook
Share on Weibo
Share on Instapaper
hack-night
Further Resources
Tools
Metasploit
- Automated recon and exploitation
Blogs
Skull Security