free counter statistics


When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You’ll learn how to:

  • Create a trojan command-and-control using…

Black Hat Python

ISBN 10 : 9781593275907
ISBN 13 : 1593275900

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffe..


Black Hat Python

ISBN 10 : OCLC:905747103
ISBN 13 :

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. Seitz explores the darker side of Python's capabilities..


Black Hat Python

ISBN 10 : 1593276559
ISBN 13 : 9781593276553

Black Hat Python explores the darker side of Python's capabilities, helping you test your systems and improve your security posture...


Violent Python

ISBN 10 : 9781597499644
ISBN 13 : 1597499641

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tool..


Gray Hat Python

ISBN 10 : 1593272243
ISBN 13 : 9781593272241

"Gray Hat Python," the first Python book written for advanced security analysts, explains the intricacies of using Python to assist in a range of security analysis tasks...


Python For Secret Agents

ISBN 10 : 9781783980437
ISBN 13 : 1783980435

If you are a Python beginner who is looking to learn the language through interesting projects, this book is for you. A basic knowledge of programming and statistics is beneficial ..


Penetration Testing

ISBN 10 : 9781593275648
ISBN 13 : 1593275641

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration tech..