Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker€s tools, this book will teach you to...

Buy Now From Amazon

Product Review

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker€s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

  • Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts
  • Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices
  • Data-mine popular social media websites and evade modern anti-virus


  • Used Book in Good Condition

Similar Products

Black Hat Python: Python Programming for Hackers and PentestersRtfm: Red Team Field ManualThe Hacker Playbook 3: Practical Guide To Penetration TestingHacking: The Art of Exploitation, 2nd EditionGray Hat Python: Python Programming for Hackers and Reverse EngineersPenetration Testing: A Hands-On Introduction to HackingPractical Malware Analysis: The Hands-On Guide to Dissecting Malicious SoftwareKali Linux Revealed: Mastering the Penetration Testing DistributionLinux Basics for Hackers: Getting Started with Networking, Scripting, and Security in KaliBlue Team Field Manual (BTFM) (RTFM)