You're reading from Python Penetration Testing CookbookPractical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
Rejah Rehim, a visionary in cybersecurity, serves as Beagle Security's CEO and cofounder. With a 15-year track record, he's a driving force renowned for Python Penetration Testing Cookbook and Effective Python Penetration Testing. Leading OWASP Kerala Chapter, he unites pros for secure digital landscapes. Rejah's role as Commander at Kerala Police Cyberdome underscores his commitment.
In this chapter, we will cover the following recipes:
Windows memory layout
Buffer overflow attacks with saved return pointer overwrites
Structured Exception Handling (SEH)
Egg hunters
The rest of the chapter is locked
Subscribe to access the full title
Advance your knowledge in tech
A Packt subscription gives you instant online access to our library of over 8,000 practical eBooks and videos, constantly updated with the latest in tech
Rejah Rehim, a visionary in cybersecurity, serves as Beagle Security's CEO and cofounder. With a 15-year track record, he's a driving force renowned for Python Penetration Testing Cookbook and Effective Python Penetration Testing. Leading OWASP Kerala Chapter, he unites pros for secure digital landscapes. Rejah's role as Commander at Kerala Police Cyberdome underscores his commitment.