
Violent Python
A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
- 288 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Violent Python
A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
About this book
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices- Data-mine popular social media websites and evade modern anti-virus
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1
Introduction
Information in this chapter:






Introduction: A Penetration Test with Python
Setting Up Your Development Environment
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Trade marks
- Acknowledgements
- Dedication
- Lead Author – TJ O’Connor
- Contributing Author Bio – Rob Frost
- Technical Editor Bio – Mark Baggett
- Introduction
- Chapter 1. Introduction
- Chapter 2. Penetration Testing with Python
- Chapter 3. Forensic Investigations with Python
- Chapter 4. Network Traffic Analysis with Python
- Chapter 5. Wireless Mayhem with Python
- Chapter 6. Web Recon with Python
- Chapter 7. Antivirus Evasion with Python
- Index