Description
• Create a trojan command-and-control using GitHub
• Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
• Escalate Windows privileges with creative process control
• Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
• Extend the popular Burp Suite web-hacking tool
• Abuse Windows COM automation to perform a man-in-the-browser attack
• Exfiltrate data from a network most sneakily
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how with the second edition of Black Hat Python. New to this edition: All Python code has been updated to cover Python 3 and includes updated libraries used in current Python applications. Additionally, there are more in-depth explanations of the code and the programming techniques have been updated to current, common tactics. Examples of new material that you’ll learn include how to sniff network traffic, evade anti-virus software, brute-force web applications, and set up a command-and-control (C2) system using GitHub.
Details
Are you ready to unleash the full power of Python for your hacking projects? Look no further than Black Hat Python, 2nd Edition! With updated code for Python 3 and the latest industry techniques, this bestselling book is your ultimate guide to creating advanced hacking tools. Don't miss out on the opportunity to take your skills to the next level and stay ahead of the game in the world of cybersecurity.
Take your coding abilities to the dark side with Black Hat Python, 2nd Edition. Explore the stealthier capabilities of Python, from crafting mutation fuzzers to creating stealthy trojans and more. Whether you're a seasoned security analyst or a beginner in the field, this book will equip you with the knowledge and tools you need to succeed in today's ever-evolving threat landscape. Stay ahead of cybercriminals and enhance your offensive security arsenal now!
Upgrade your hacking toolkit with Black Hat Python, 2nd Edition. Discover how to escalate Windows privileges, detect sandboxing, automate malware tasks, and perform advanced memory forensics tricks—all with Python. With in-depth explanations of Python libraries and new strategies, you'll be equipped to tackle any hacking challenge that comes your way. Don't miss out on this must-have resource for aspiring hackers and pentesters!
Discover More Best Sellers in Security & Encryption
Shop Security & Encryption
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
Security & Encryption - Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
CASP+ CompTIA Advanced Security Practitioner Certification Kit: Exam CAS-004
Security & Encryption - CASP+ CompTIA Advanced Security Practitioner Certification Kit: Exam CAS-004
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Security & Encryption - Cybersecurity First Principles: A Reboot of Strategy and Tactics
Real-World Bug Hunting: A Field Guide to Web Hacking
Security & Encryption - Real-World Bug Hunting: A Field Guide to Web Hacking
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Security & Encryption - This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Practical SQL, 2nd Edition: A Beginner's Guide to Storytelling with Data
Security & Encryption - Practical SQL, 2nd Edition: A Beginner's Guide to Storytelling with Data
Security & Encryption - iPhone 17 Seniors Guide: A Step-by-Step Manual for Non-Tech Savvy Beginners—Including Setup, Calling, Messaging, Internet, Photos, Security, and New iOS Features with 50+ Clear Visual Tutorials
Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
Security & Encryption - Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
CISM Certified Information Security Manager Study Guide
Security & Encryption - CISM Certified Information Security Manager Study Guide

