SQL Injection for MySQL databases.
Exploiting XML parsers.
Identifying web content to launch further attacks.
Injecting malicious code into web applications.
Encoding Shellcode for use within malware.
A review of the CBBH course and exam.
Hiding IAT entries to evade detection.
Ways of gaining access to WPA-PSK networks.
Getting started with Cobalt Strike.
Exploiting LFI vulnerabilities in web applications.
Decoding Flask signed session cookies.
SSTI attacks against Python Flask applications.