Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters

Last Updated: January 7, 2024By Tags:


Price: $29.87
(as of Jan 07, 2024 01:31:31 UTC – Details)

Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you’ll explore the darker side of Python’s capabilities: everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans.

All of the code in this edition has been updated to Python 3.x. You’ll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites.

You’ll even learn how to:
Create a trojan command-and-control server using GitHubDetect sandboxing and automate common malware tasks like keylogging and screenshottingExtend the Burp Suite web-hacking toolEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machineAbuse Windows COM automationExfiltrate data from a network undetected When it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python.

From the Publisher

Copy of Black Hat Python, 2nd Edition on black background with No Starch Press logoCopy of Black Hat Python, 2nd Edition on black background with No Starch Press logo

Spread of Black Hat Python, 2e on yellow background with plug-in coding and textSpread of Black Hat Python, 2e on yellow background with plug-in coding and text

Copies of Black Hat Python on black backgroundCopies of Black Hat Python on black background

Spread of Black Hat Python, 2e on yellow background with figures and textSpread of Black Hat Python, 2e on yellow background with figures and text

‘Eye-Opening’

“Whether you’re interested in becoming a serious hacker/penetration tester or just want to know how they work, this book is one you need to read. Intense, technically sound, and eye-opening.” —Sandra Henry-Stocker, IT World

‘Incredible’

“Another incredible Python book. With a minor tweak or two many of these programs will have at least a ten year shelf life, and that is rare for a security book.” —Stephen Northcutt, founding president of the SANS Technology Institute

‘Belongs on Your Bookshelf’

“If you work as a computer security professional and want to code in Python, this is definitely a book that belongs on your bookshelf.” —Craig Mullins, Data and Technology Today

Man in hoodie with pink headphone in front of a monkey paintingMan in hoodie with pink headphone in front of a monkey painting

About the Author

Justin Seitz is an independent security consultant who has trained and consulted with Fortune 500 companies, law enforcement agencies, and governments around the world. He is the the creator of Hunchly and the author of Gray Hat Python, the first book to cover Python for security analysis. Justin can be found teaching OSINT techniques on his blog and is active on Twitter as @jms_dot_py.

Man in front of a foggy mountainMan in front of a foggy mountain

About the Author

Tim Arnold is currently a professional Python programmer and statistician. He spent much of his early career at North Carolina State University as a respected international speaker and educator. Among his accomplishments, he has ensured that educational tools are accessible to underserved communities worldwide, including making mathematical documentation accessible to the blind. Tim lives in North Carolina with his wife, Treva, and a villainous cockatiel named Sidney. You can find him on Twitter at @jtimarnold.

Man in hoodie with pink headphone in front of a monkey paintingMan in hoodie with pink headphone in front of a monkey painting

Man in front of a foggy mountainMan in front of a foggy mountain

Who Should Read This Book

Intermediate Python programmers who want to learn hacking techniques. Security professionals and hobbyists who already use hacking tools but want to build their own. Security professionals who write hacking tools in other languages and want to do so in Python.

No Starch Press logo. A black circle with a white iron with a star in the centerNo Starch Press logo. A black circle with a white iron with a star in the center

About the Publisher

No Starch Press has published the finest in geek entertainment since 1994, creating both timely and timeless titles like Python Crash Course, Python for Kids, How Linux Works, and Hacking: The Art of Exploitation. An independent, San Francisco-based publishing company, No Starch Press focuses on a curated list of well-crafted books that make a difference. They publish on many topics, including computer programming, cybersecurity, operating systems, and LEGO. The titles have personality, the authors are passionate experts, and all the content goes through extensive editorial and technical reviews. Long known for its fun, fearless approach to technology, No Starch Press has earned wide support from STEM enthusiasts worldwide.

Publisher ‏ : ‎ No Starch Press; 2nd edition (April 14, 2021)
Language ‏ : ‎ English
Paperback ‏ : ‎ 216 pages
ISBN-10 ‏ : ‎ 1718501129
ISBN-13 ‏ : ‎ 978-1718501126
Item Weight ‏ : ‎ 14.4 ounces
Dimensions ‏ : ‎ 7 x 0.48 x 9.19 inches

Leave A Comment