|
Product Description
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
Features
- Used Book in Good Condition
Customers Who Bought This Item Also Bought
- Gray Hat Python: Python Programming for Hackers and Reverse Engineers
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- The Hacker Playbook 3: Practical Guide To Penetration Testing
- Rtfm: Red Team Field Manual
- Hacking: The Art of Exploitation, 2nd Edition
- Penetration Testing: A Hands-On Introduction to Hacking
- Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
- Blue Team Field Manual (BTFM) (RTFM)
- Black Hat Python: Python Programming for Hackers and Pentesters
*If this is not the "Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineer" product you were looking for, you can check the other results by clicking this link. Details were last updated on Nov 8, 2024 07:30 +08.