Description
• Create a trojan command-and-control using GitHub
• Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
• Escalate Windows privileges with creative process control
• Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
• Extend the popular Burp Suite web-hacking tool
• Abuse Windows COM automation to perform a man-in-the-browser attack
• Exfiltrate data from a network most sneakily
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how with the second edition of Black Hat Python. New to this edition: All Python code has been updated to cover Python 3 and includes updated libraries used in current Python applications. Additionally, there are more in-depth explanations of the code and the programming techniques have been updated to current, common tactics. Examples of new material that you’ll learn include how to sniff network traffic, evade anti-virus software, brute-force web applications, and set up a command-and-control (C2) system using GitHub.
Details
Are you ready to unleash the full power of Python for your hacking projects? Look no further than Black Hat Python, 2nd Edition! With updated code for Python 3 and the latest industry techniques, this bestselling book is your ultimate guide to creating advanced hacking tools. Don't miss out on the opportunity to take your skills to the next level and stay ahead of the game in the world of cybersecurity.
Take your coding abilities to the dark side with Black Hat Python, 2nd Edition. Explore the stealthier capabilities of Python, from crafting mutation fuzzers to creating stealthy trojans and more. Whether you're a seasoned security analyst or a beginner in the field, this book will equip you with the knowledge and tools you need to succeed in today's ever-evolving threat landscape. Stay ahead of cybercriminals and enhance your offensive security arsenal now!
Upgrade your hacking toolkit with Black Hat Python, 2nd Edition. Discover how to escalate Windows privileges, detect sandboxing, automate malware tasks, and perform advanced memory forensics tricks—all with Python. With in-depth explanations of Python libraries and new strategies, you'll be equipped to tackle any hacking challenge that comes your way. Don't miss out on this must-have resource for aspiring hackers and pentesters!
Discover More Best Sellers in Security & Encryption
Shop Security & Encryption
Hands-On Ethical Hacking and Network Defense (MindTap Course List)
Security & Encryption - Hands-On Ethical Hacking and Network Defense (MindTap Course List)
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
Security & Encryption - Cybersecurity and Third-Party Risk: Third Party Threat Hunting
CompTIA A+ Complete Certification Kit: Exam 220-1101 and Exam 220-1102
Security & Encryption - CompTIA A+ Complete Certification Kit: Exam 220-1101 and Exam 220-1102
Machine Learning for Hackers: Case Studies and Algorithms to Get You Started
Security & Encryption - Machine Learning for Hackers: Case Studies and Algorithms to Get You Started
How to Speak Tech: The Non-Techie’s Guide to Key Technology Concepts
Security & Encryption - How to Speak Tech: The Non-Techie’s Guide to Key Technology Concepts
Security & Encryption - Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
Real-World Bug Hunting: A Field Guide to Web Hacking
Security & Encryption - Real-World Bug Hunting: A Field Guide to Web Hacking
Security & Encryption - ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide: A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
Keanu Reeves Is Not In Love With You: The Murky World of Online Romance Fraud
Security & Encryption - Keanu Reeves Is Not In Love With You: The Murky World of Online Romance Fraud

