<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>python Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/python/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/python</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Thu, 12 Jan 2023 19:27:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>python Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/python</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Webinar takeaway &#8211; Shellcode Execution with Python</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 12 Jan 2023 19:27:44 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[shellcode]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1038</guid>

					<description><![CDATA[<p>teaser for this Webcast, which made me attend Imagine you are pen testing a company and gain access to a Windows application server. You discover the server has application allow listing deployed, and strong EDR/XDR defensive solutions. To your excitement, you find there is a Python interpreter installed. It would be really great if you [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python">Webinar takeaway &#8211; Shellcode Execution with Python</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211;  Making MITRE ATT&#038;CK Actionable</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-making-mitre-attck-actionable</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-making-mitre-attck-actionable#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 12 Jan 2022 19:11:06 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[att&ck]]></category>
		<category><![CDATA[mitre]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=594</guid>

					<description><![CDATA[<p>My key takeaways ATT&#38;CK is a framework, not a how to or step by step instruction How do we protect ourselves from techniques like Powershell used for attacks? deep technical knowledge &#60;- hard to get for all 836 techniques mentioned in ATT&#38;CK Identify technique coverage Build (SIEM) detections &#60;- also hard to build PYATTCK and [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-making-mitre-attck-actionable">Webinar takeaway &#8211;  Making MITRE ATT&#038;CK Actionable</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-making-mitre-attck-actionable/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Play a quiz while learning for a multiple choice test</title>
		<link>https://jeanchristophvonoertzen.com/play-a-quiz-while-learning-for-a-multiple-choice-test</link>
					<comments>https://jeanchristophvonoertzen.com/play-a-quiz-while-learning-for-a-multiple-choice-test#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 06 Dec 2020 00:11:39 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[game]]></category>
		<category><![CDATA[learning]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[quiz]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=234</guid>

					<description><![CDATA[<p>TL;DR Multichoice-quiz is a mulitple choice quiz game programmed in Python You can add your own quizzes as simple JSON files No GUI, just terminal OSISG should become a crowd-sourced quiz with the best information security questions out there short story long As I wrote in my post about the CompTIA Network+ certificate, using virtual [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/play-a-quiz-while-learning-for-a-multiple-choice-test">Play a quiz while learning for a multiple choice test</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/play-a-quiz-while-learning-for-a-multiple-choice-test/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Pretty Little Python Secrets (Episode 2)</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-pretty-little-python-secrets-episode-2</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-pretty-little-python-secrets-episode-2#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 29 Oct 2020 19:27:39 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=236</guid>

					<description><![CDATA[<p>My key takeaways &#34;dunder&#34; means every py-function starting with double underlines like __init__(): Poetry will make my life easier installing dependencies Only a single file to manage It will take care if I want to share my script on PyPi Endusers only need pip. No extra install of poetry required Cookiecutter let me have configurable [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-pretty-little-python-secrets-episode-2">Webinar takeaway: Pretty Little Python Secrets (Episode 2)</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-pretty-little-python-secrets-episode-2/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
