Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Common Vulnerabilities and Exploits with Python

Just like any other programming language, Python can also be used by attackers to conduct malicious actions. This course will teach you how to prevent common vulnerabilities with Python.

Intermediate
48m
(15)

Created by Laurentiu Raducu

Last Updated Dec 09, 2022

Course Thumbnail
  • Course

Common Vulnerabilities and Exploits with Python

Just like any other programming language, Python can also be used by attackers to conduct malicious actions. This course will teach you how to prevent common vulnerabilities with Python.

Intermediate
48m
(15)

Created by Laurentiu Raducu

Last Updated Dec 09, 2022

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Python is becoming increasingly popular not only in data science, but also in the software engineering community. According to the stack overflow annual survey, Python holds the fourth place as the most popular technology. It allows fast development and it’s relatively easy compared to other high-level programming languages. As its popularity grows, and many people are drawn into using it, the reports of being used for vulnerability exploitation emerge. In this course, Common Vulnerabilities and Exploits with Python, you will learn how to exploit those vulnerabilities from the perspective of an attacker, with the main objective to avoid the mistakes of introducing them in your production software First, you will learn how to perform and protect against a buffer overflow attack. You will focus also on the EternalBlue exploit, which affected many Windows operating system versions. Second, you will see how you can create a keylogger application, capable of recording the keystrokes of the victim, as well as taking screenshots from the target’s computer. Finally, you will discover how you can execute shellcode using Python, and how to enhance a malware to detect anti-malware sandboxing techniques and evade them. By the end of this course, you will improve your skill set in using Python for detecting and avoiding common vulnerabilities.

Common Vulnerabilities and Exploits with Python
Intermediate
48m
(15)
Table of contents

About the author
Laurentiu Raducu - Pluralsight course - Common Vulnerabilities and Exploits with Python
Laurentiu Raducu
14 courses 4.1 author rating 102 ratings

Laurentiu is working in fintech as a software developer engineer in test, with a strong emphasis on pentesting.

Get started with Pluralsight