Description
• Create a trojan command-and-control using GitHub
• Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
• Escalate Windows privileges with creative process control
• Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
• Extend the popular Burp Suite web-hacking tool
• Abuse Windows COM automation to perform a man-in-the-browser attack
• Exfiltrate data from a network most sneakily
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how with the second edition of Black Hat Python. New to this edition: All Python code has been updated to cover Python 3 and includes updated libraries used in current Python applications. Additionally, there are more in-depth explanations of the code and the programming techniques have been updated to current, common tactics. Examples of new material that you’ll learn include how to sniff network traffic, evade anti-virus software, brute-force web applications, and set up a command-and-control (C2) system using GitHub.
Details
Are you ready to unleash the full power of Python for your hacking projects? Look no further than Black Hat Python, 2nd Edition! With updated code for Python 3 and the latest industry techniques, this bestselling book is your ultimate guide to creating advanced hacking tools. Don't miss out on the opportunity to take your skills to the next level and stay ahead of the game in the world of cybersecurity.
Take your coding abilities to the dark side with Black Hat Python, 2nd Edition. Explore the stealthier capabilities of Python, from crafting mutation fuzzers to creating stealthy trojans and more. Whether you're a seasoned security analyst or a beginner in the field, this book will equip you with the knowledge and tools you need to succeed in today's ever-evolving threat landscape. Stay ahead of cybercriminals and enhance your offensive security arsenal now!
Upgrade your hacking toolkit with Black Hat Python, 2nd Edition. Discover how to escalate Windows privileges, detect sandboxing, automate malware tasks, and perform advanced memory forensics tricks—all with Python. With in-depth explanations of Python libraries and new strategies, you'll be equipped to tackle any hacking challenge that comes your way. Don't miss out on this must-have resource for aspiring hackers and pentesters!
Discover More Best Sellers in Networking & Cloud Computing
Shop Networking & Cloud Computing
$13.99
Networking & Cloud Computing - Google Workspace 2023 Handbook: A Quick Guide to Help Seniors & Beginners Get Started & Master All of Google’s Collaborative Apps: Gmail, Drive, Sheets, Docs, Slides, Forms, & Other Useful Tools
$17.99
Networking & Cloud Computing - CISCO CCNA 200-301 Practice Tests: Realistic CCNA Questions and Detailed Explanations to Get You CCNA certified
$14.97
Networking & Cloud Computing - ChromeBook Seniors Guide: The Most Simple Crash Course for the Non-Tech-Savvy to Learn How to Use your Brand New Chromebook (Tech guides for Seniors)
CompTIA Security+ Certification Kit: Exam SY0-601
$47.99
Networking & Cloud Computing - CompTIA Security+ Certification Kit: Exam SY0-601
$5.99
Networking & Cloud Computing - Password Book: Internet Address And Password Organizer, Password Notebook Journal - 5x8 Inch, Password Keeper Logbook With Elegant Cover
$29.00
Networking & Cloud Computing - CompTIA A+ Exam - Mastery Guide: The Most Updated Resource to Pass Core 1 and Core 2 Exams at Your First Attempt
Black Hat Go: Go Programming For Hackers and Pentesters
$12.95
Networking & Cloud Computing - Black Hat Go: Go Programming For Hackers and Pentesters
$40.99
Networking & Cloud Computing - Certified Ethical Hacker (CEH) v12 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities


