Cybersecurity cert prep: Lab 14 (Path Traversal) — null byte attacks, console→Python (sys), and traversal protection

https://peertube.eqver.se/w/kHmZkggCrQ8oLSTeKKgf6F

lt3ua_013_en

PeerTube

Cybersecurity cert prep: Lab 22 (JWT) — elevate privileges to admin using CSRF, Python, and Burp Suite

https://peertube.eqver.se/w/wBG3eMFearpz9ffD1NJ69o

lt3ua_021_en

PeerTube

Getting ready for the cybersecurity certification exam — Lab 4 (SSRF) — Delete a user. Python, Burp Suite

https://peertube.eqver.se/w/2ZtruSwcdQHW2zYj52AMbN

lt3ua_004_en

PeerTube

Thanks to @eelcoa I learned today, that the Python Software Foundation ( @ThePSF ) rejected a $1.5 Million USD fund, because they demonstrated integrity by not bowing down to #Trump and instead stand by their mission statement "(...) to support and facilitate the growth of a diverse and international community (...)", something that the US Government is blackmailing companies and organisations around the world(!) to stop doing!

This is worth supporting, and with approximately over 8 Million estimated Python programmers around the globe[1], that $1.5 Million USD could be reached by all of us with ease by giving back.

Support them here: https://psfmember.org/civicrm/contribute/transact/?reset=1&id=2

Read the full statement here: https://pyfound.blogspot.com/2025/10/NSF-funding-statement.html?m=1

Donate, spread the message, follow them on mastodon, and be part of showing big tech companies of how it is done right!

Original toot by eelcoa (in Dutch): https://mastodon.nl/@eelcoa/115456773063510298

--

[1] Number of Python programmers taken from here, which is also worth a read: https://leftronic.com/blog/python-statistics

#python #psf #thepsf #supportpsf #funding #pythonsecurity #pipy #pipysecurity #dei #NoTrump

Donation for the PSF – Python Software Foundation

So it goes. Part I

🧩 Been poking at eval() and exec() in Python — they're deceptively powerful. One stray input and you're one __import__ away from a shell.
Remote Code Execution (RCE) isn’t just old news — it’s still real, still nasty in the wrong hands.

🌲 Python’s ASTs let you trace what a script really does without running it — but just one layer of obfuscation, and they fall apart.

Small tools, deep cuts. Keep digging.

#PythonSecurity #ReverseEngineering #Cybersecurity

📦 Don't trust user input in your Python app?
Use shlex.quote() before calling shell commands — or better:
✅ Use subprocess.run([...], shell=False)
Avoid shell=True unless you're really sure.
One unsanitized input = full shell access.
#InfoSec #PythonSecurity
Prevent SQL Injection in Python with Parameterized Queries
Prevent SQL Injection in Python using parameterized queries! Learn how to protect your database & applications from this common vulnerability. Secure your Python code today! #PythonSecurity #SQLInjection #DatabaseSecurity #ParameterizedQueries #Cybersecurity #AppSecurity
https://tech-champion.com/database/db2luw/prevent-sql-injection-in-python-with-parameterized-queries/

Hello everyone.

In today's article, we are examining one of the popular cyber attacks, the arp poisoning attack, with coding.

I wish everyone a good reading

https://denizhalil.com/2024/11/22/arp-spoofing-attack-and-with-python-project/

#cybersecurity #networksecurity #arpspoofing #pythonhacking #pythonsecurity

ARP Spoofing Attack With Python: Understanding Network Security Risks - Deniz Halil

Discover the dangers of ARP spoofing attacks and how to defend against them. Learn about ARP spoofing attacks with Python and how to secure your network.

Deniz Halil

🔒 Learn how to write secure Python code with our comprehensive step-by-step guide! 🐍

🔑 Key tips:
- Use virtual environments for dependency isolation 🌐
- Limit variable and function scope 🔍
- Modularize code for better security 🧩
- Protect against code injection 🛡️
- Follow the principle of least privilege 🔒
- Implement strong authentication and authorization 🔑
- Practice proper session management ⏰
- Be cautious with eval() and exec() functions ⚠️

Read the full guide here: https://cybersecurefox.com/en/secure-python-code-step-by-step-guide/

Remember, security is an ongoing process. Regularly review and update your code, and stay informed about the latest security recommendations. 📈
Share your favorite Python security tip in the comments below! 💬

#PythonSecurity #SecureCoding #Cybersecurity #ProgrammingTips
https://cybersecurefox.com/en/secure-python-code-step-by-step-guide/

Secure Python Code: Best Practices And Techniques | Step-by-Step Guide » CyberSecureFox CyberSecureFox CyberSecureFox

Learn best practices and techniques to write secure Python code, protecting your applications from common vulnerabilities and attacks. Follow our step-by-step guide.

CyberSecureFox

Python's urllib3 has fixed a low severity vulnerability in version 2.2.2, which was released yesterday.
This vulnerability has been assigned CVE-2024-37891.
For those not familiar with urllib3, it describes it's self as

a powerful, user-friendly HTTP client for Python

It is used by many projects and libraries, including the popular requests library.

https://github.com/urllib3/urllib3/security/advisories/GHSA-34jh-p97f-mpxf

#CVE_2024_37891 #urllib3 #pythonSecurity

Proxy-Authorization request header isn't stripped during cross-origin redirects

When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using ur...

GitHub