Published: 2024-08-29. Last Updated: 2024-08-29 07:24:07 UTC by Xavier Mertens (Version: 1) In my previous diary[1], I explained why Python became popular for attackers. One of the given reason was that, from Python scripts, it’s possible to call any Windows API and, therefore, perform low-level activities on the system. In another script, besides a classic code injection in a remote process, I fo