🐍
Python for AppSec Engineers
Explore common and subtle security issues in Python web applications through hands-on labs, code review exercises, and real CVEs from popular frameworks.
37 exercises
4 chapters
← All Tracks
Chapter 1
Code Execution & Deserialization
Exploit unsafe deserialization in Pickle and PyYAML, then review Python code for command injection, insecure deserialization patterns, and remote code execution flaws.
Chapter 2
Injection & XML Attacks
Find and review SQL injection, XPath injection, log injection, and XML external entity vulnerabilities in Python applications and real CVEs.
Recommended: Complete Chapter 1 first
Chapter 3
Paths, Redirects & Server-Side Requests
Review directory traversal, open redirect, SSRF, and host header injection vulnerabilities across Python code review exercises and real-world CVEs.
Recommended: Complete Chapters 1 & 2 first
Chapter 4
XSS, Filters, Crypto & Application Security
Review cross-site scripting, filter bypass techniques, timing attacks, padding oracle, and transport security issues in Python applications and real CVEs.
Recommended: Complete all previous chapters