
Python programming
- Python programming 1
- Python programming 2
- Python programming 3
- Python programming 4
- Python programming 5
- Python programming 6
- Python programming 7

Python Security
Home Lab Setup
- Intro.
- Preparing Attacker Machine - Kali linux.
- Preparing Target Machine - Windows 7.
Warming up - Your First Anti-Virus Free Persistence Shell
- TCP Reverse Shell Outline.
- Coding a TCP Reverse Shell.
- Data Exfiltration.
- Exporting to EXE.
- HTTP Reverse Shell Outline
- Coding HTTP Reverse Shell in 5 Lines of Python!
- Data Exfiltration.
- Exporting to EXE.
- Persistence Outline.
- Making Putty.exe Persistent.
- Wrap up - Making a Persistent HTTP Reverse Shell.
- Tuning the connection attempts
- Final Notes.
- Countermeasures
Advanced Scriptable Shell
- Dynamic DNS (DDNS) Outline
- DDNS Aware Shell
- Interacting with Twitter
- Parsing Tweet in 3 Lines!
- Countermeasures
- Replicating Metasploit "Screen Capturing"
- Replicating Metasploit "Searching for Content"
- Target Directory Navigation
- Integrating Low Level Port Scanner
Passwords Hacking
- Anti-Virus Free Keylogger
- Hijacking KeePass Password Manager
- Man in the Browser Outline
- FireFox API Hooking with ImmunityDebugger
- Python in Firefox PoC
- Exercise: Python in Firefox EXE
- Bonus: Dumping Saved Passwords Out of Google Chrome
- Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome
- Passwords Phishing - DNS Poisoning
- In Action: Facebook Password Phishing
- Don't Skip Me! - Countermeasures
Catch Me If You Can!
- Bypassing Host Based Firewall Outline
- Hijacking Internet Explorer - Shell Over Internet Explorer
- Bypassing Reputation Filtering in Next Generation Firewalls - Outline
- Interacting with Source Forge
- Interacting with Google Forms
- Exercise: Putting All Together - Bypassing Botnet Filtering
- Bypassing IPS with Hand-Made XOR Encryption
Miscellaneous Fun in Windows
- Privilege Escalation Part 1 - Weak Service File Permission Outline
- Privilege Escalation Part 2 - Preparing Vulnerable Software
- Privilege Escalation Part 3 - Backdoor-ing Legitimate Windows Service
- Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks
How Malware Abuse Cryptography? Python Answers
- Quick Introduction to Encryption Algorithms
- Protecting Your Tunnel with AES
- Protecting Your Tunnel with RSA
- Developing One Time, Hybrid - Encryption Key Preview.