free counter statistics


When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You’ll learn how to:

  • Create a trojan command-and-control using…

Black Hat Python

ISBN 10 : 9781593275907
ISBN 13 : 1593275900

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffe..


Black Hat Python

ISBN 10 : OCLC:905747103
ISBN 13 :

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. Seitz explores the darker side of Python's capabilities..


Black Hat Python

ISBN 10 : 1593276559
ISBN 13 : 9781593276553

Black Hat Python explores the darker side of Python's capabilities, helping you test your systems and improve your security posture...


Gray Hat Python

ISBN 10 : 9781593271923
ISBN 13 : 1593271921

"Gray Hat Python," the first Python book written for advanced security analysts, explains the intricacies of using Python to assist in a range of security analysis tasks...


Violent Python

ISBN 10 : 9781597499644
ISBN 13 : 1597499641

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tool..


Penetration Testing

ISBN 10 : 9781593275648
ISBN 13 : 1593275641

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration tech..


Ethical Hacking And Penetration Testing Guide

ISBN 10 : 9781482231625
ISBN 13 : 148223162X

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethic..