Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Introduction
00:00 • 2min
How I Got in a Program in Python
02:09 • 2min
How I Got Started in Python
04:24 • 4min
Grey Hat Python: A Low Level Reverse Engineering and Exploit Development Guide
08:51 • 2min
The Two Biggest Problems You Can Introduce Into Your Code
10:23 • 4min
How to Avoid SQL Injection Vulnerabilities
13:58 • 5min
How to Enumerate Data in a Web Application
18:30 • 3min
Black Hat Python: A Traditional Penetration Test Approach
21:09 • 2min
How to Detect a Trojan in a Virtual Machine
22:57 • 3min
How to Use Raw Sockets in Python
25:41 • 2min
Python Framework to Understand Malware
27:21 • 3min
How to Analyze Malware in Python
30:26 • 4min
The Importance of Open Source Intelligence
34:30 • 3min
How to Identify ISIS Supporters on Twitter
37:31 • 4min
How to Use Python to Solve a Semi-Automatic Problem
41:38 • 2min
How to Automate Open-Source Intelligence
44:05 • 4min
The Most Unusual or Entertaining Thing I've Run Sights Across the Space
47:46 • 2min
The Importance of Michael Pazell in Cyber Security
50:03 • 3min
The Importance of Fear in the Security Industry
52:48 • 3min
How to Write Python Code
55:32 • 2min
Talk Python to Me: Secrets From the Future
57:28 • 4min
Secrets From the Future With a Knife
01:01:24 • 2min


