Menu

Python

All articles and tutorials tagged #Python
How to Create a Keylogger for Linux using Python
How to Create a Keylogger for Linux using Python

Some recent studies estimate that between 100 to 150 million computers worldwide would be directly infected by at least one malware such as Trojan or Keylogger.

KeyloggerPythonKeystrokesEventsCrontabTrojan
How to use WebXray to Identify Domains collecting User Data
How to use WebXray to Identify Domains collecting User Data

Do you know that while you are browsing a website, you are mostly tracked by third parties who compile detailed records of your browsing behaviors.

DataleakGDPRPrivacyPythonSelenium
How to Create a Reverse Shell to Remotely Execute Commands
How to Create a Reverse Shell to Remotely Execute Commands

If you're lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you'll probably want to establish an interactive [...]

BashNetcatPerlPHPPythonReverseRubyShellTelnet
Evading AntiVirus with Encrypted Payloads using Venom
Evading AntiVirus with Encrypted Payloads using Venom

Be able to bypass Antivirus can be very useful while penetration testing phases. Venom allow you to generate shellcode that work with encrypted payloads.

AntivirusDLLMetasploitMSIPayloadsPythonRubyVenom
How to Generate a Payload for Metasploit
How to Generate a Payload for Metasploit

Often one of the most useful and to the beginner underrated abilities of Metasploit is the msfpayload module. Multiple payloads can be created with this module.

ASPBashBinaryJSPMacPayloadsPerlPHPPython