Black Hat Python Python Programming for Hackers and Pentesters

ISBN: 1593275900

Category: Uncategorized

Tag: Database/SQL

Posted on 2018-09-04, by nokia241186.


Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz
English | 14 Dec. 2014 | ISBN: 1593275900 | 192 Pages | PDF | MB

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities-writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:

Create a trojan command-and-control using GitHub
Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
Escalate Windows privileges with creative process control
Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
Extend the popular Burp Suite web-hacking tool
Abuse Windows COM automation to perform a man-in-the-browser attack
Exfiltrate data from a network most sneakily
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.
(Buy premium account for maximum speed and resuming ability)

Sponsored High Speed Downloads
5479 dl's @ 3898 KB/s
Download Now [Full Version]
6773 dl's @ 3409 KB/s
Download Link 1 - Fast Download
8151 dl's @ 3591 KB/s
Download Mirror - Direct Download

Search More...
Black Hat Python Python Programming for Hackers and Pentesters

Search free ebooks in!

Download this book

No active download links here?
Please check the description for download links if any or do a search to find alternative books.

Related Books


No comments for "Black Hat Python Python Programming for Hackers and Pentesters".

    Add Your Comments
    1. Download links and password may be in the description section, read description carefully!
    2. Do a search to find mirrors if no download links or dead links.
    Back to Top