职场大变样社区

5598

主题

6638

帖子

79

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
79
跳转到指定楼层
楼主
发表于 2017-6-16 10:19:00 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
         
资料类型
电子书籍
百度网盘下载地址
游客,如果您要查看本帖隐藏内容请回复
如何获取金币1)成为VIP会员,免费下载本站所有资料,http://www.zcdby.com/thread-2979-1-1.html
2)充值购买金币,
http://www.zcdby.com/thread-3-1-1.html
3)给本站做贡献,积累足够的金币,http://www.zcdby.com/thread-3-1-1.html
网盘地址失效解决如果链接失效请将本帖地址,通过站内短信发送给管理员,http://www.zcdby.com/thread-727-1-1.html

介绍:
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker?s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
  - Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.
  - Data-mine popular social media websites and evade modern anti-virus.
,"Python is a hacker's language. With its decreased complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive tools already exist, learning Python can help you with the difficult cases where those tools fail"--,Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker?s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.
- Data-mine popular social media websites and evade modern anti-virus.

回复

使用道具 举报

0

主题

1

帖子

2

积分

新手上路

Rank: 1

积分
2
沙发
发表于 2019-11-25 17:14:41 | 只看该作者
啥也不说了,感谢楼主分享哇!
回复 支持 反对

使用道具 举报

0

主题

6

帖子

13

积分

新手上路

Rank: 1

积分
13
板凳
发表于 2020-3-24 21:20:17 | 只看该作者
啥也不说了,感谢楼主分享哇!
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

职场大变样社区 分享高质量学习资料(电子课本、毕业设计、编程视频、项目源码、电子书籍等)

快速回复 返回顶部 返回列表