
Our Best Sale Yet! Add 4 Books Priced Under $5 To Your Cart Learn more
Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold.
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, 2nd Edition, you'll explore the darker side of Python's capabilities--writing network sniffers, stealing email credentials, brute forcing directories, crafting mutation fuzzers, infecting virtual machines, creating stealthy trojans, and more. The second edition of this bestselling hacking book contains code updated for the latest version of Python 3, as well as new techniques that reflect current industry best practices. You'll also find expanded explanations of Python libraries such as ctypes, struct, lxml, and BeautifulSoup, and dig deeper into strategies, from splitting bytes to leveraging computer-vision libraries, that you can apply to future hacking projects. You'll learn how to: - Create a trojan command-and-control using GitHubIt takes about 4 Hours and 46 minutes on average for a reader to read Black Hat Python, 2nd Edition: Python Programming For Hackers And Pentesters. This is based on the average reading speed of 250 Words per minute.
Black Hat Python, 2nd Edition: Python Programming For Hackers And Pentesters is 200 pages long.
Book is good, but Kindle version must be fixed
Derived From Web , Mar 25, 2022
It is already end of March, however Kindle version still has a bad format which is quite difficult to follow by no matter on which OS book is opened. I would be happy to rate the book 5 stars after the fix.
|
|
Recommended to buy:
No
|
Kindle app for Ipad edition is useless - DO NOT BUY
Derived From Web , Jan 19, 2022
While this looks like a great book, whoever is responsible for the Kindle edition did not care enough to format the code examples properly, making them almost completely useless. See an example in the screenshot above. The author or Amazon should fix this especially since others had the same problem. I have returned my copy.
|
|
Recommended to buy:
No
|
Useless for Kindle
Derived From Web , Jan 9, 2022
It is a pain to carry a cart of books around, and i can easily search for things. This book is currently AWFUL for kindle, as the code appears to be all on one line, and the numerical bullet points are often overprinted on top of the code, making it unreadable. There is seriously no point in getting this book if I have to spend an extra 30mins trying to figure out the syntax and guessing characters that are blocked by the explanations. I would love to change this review to positive, but until the code is fixed, I can not read the book. And if I can not read the book, the rating remains the same. FYSA, I'm running the Kindle App on a Samsung Galaxy Note 10+, so that while it may work on a Kindle tablet, I can not get it to work on a phone.
|
|
Recommended to buy:
No
|
Some drawbacks, but overall a solid foundation
Derived From Web , Oct 29, 2021
This book needs some work. That is, you have to tinker with some of the examples because they contain typos and variable name miscommatches, static name errors left over from the first edition and required packages that only work with a certain 3.x version of Python, and don 't communicate explicitly. You are also expected to write your own goals for the scripts you create with very little explanations from the authors. In the grand scheme of things, these drawbacks only reinforce the teaching of a big mindset, so in my opinion it is not that Hacker's deal. The concepts presented here are very illuminating and how to implement them with Python was a valuable experience in general.
|
|
Recommended to buy:
Yes
|
Great book
Derived From Web , Oct 27, 2021
The book was in near new condition for a used book. The postage was amazingly fast to Malaysia. Great book for anyone who wants to learn and play with some of Kali Linux's malicious features. Obviously for ethical reasons.
|
|
Recommended to buy:
Yes
|
Vague. For advanced users.
Derived From Web , Sep 15, 2021
The book has a lot of information, but is very vague on the explanations. I would say that this book is definitely for advanced users. I was really looking forward to receiving this and now flipped through it, I felt it was quite disappointing. It tries to cover a lot of material and I just don 't think it tries to get through it all very well.
|
|
Recommended to buy:
No
|
This is a networking book
Derived From Web , May 18, 2021
This books for people to see how the network tool works like the Nectar tool and the Sniffer tool.
|
|
Recommended to buy:
No
|
New from | Used from |
---|