[PDF] Black Hat Python: Python Programming for Hackers and Pentesters

ISBN: 1593275900

Category: Tutorial


Posted on 2017-12-14, by luongquocchinh.

Description



Author: Justin Seitz | Category: Programming | Language: English | Page: 192 | ISBN: 1593275900 | ISBN13: 9781593275907 |

Description: Python is the language of choice for hackers and security analysts for creating powerful and effective tools. Ever wonder how they do it? A follow-up to the perennial best-seller Gray Hat Python, Justin Seitz's Black Hat Python explores the darker side of Python's capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, extending the popular web hacking tool Burp Suite, and more. You'll learn how to: Create a trojan command-and-control using Github Detect sandboxing and automate common malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges show you how to extend the hacks, and are sure to make Black Hat Python irresistible to anyone interested in offensive security.

DOWNLOADDownload this book
Black Hat Python: Python Programming for Hackers and Pentesters.pdf
http://uploaded.net/file/m7nzeufw

Sponsored High Speed Downloads
6196 dl's @ 2201 KB/s
Download Now [Full Version]
8215 dl's @ 3840 KB/s
Download Link 1 - Fast Download
5903 dl's @ 3428 KB/s
Download Mirror - Direct Download



Search More...
[PDF] Black Hat Python: Python Programming for Hackers and Pentesters

Search free ebooks in ebookee.com!


Links
Download this book

No active download links here?
Please check the description for download links if any or do a search to find alternative books.


Related Books


Comments

No comments for "[PDF] Black Hat Python: Python Programming for Hackers and Pentesters".


    Add Your Comments
    1. Download links and password may be in the description section, read description carefully!
    2. Do a search to find mirrors if no download links or dead links.
    Back to Top