Vtome.ru - электронная библиотека

Ethical Hacking with Python: Build 35+ hacking tools with Python programming

  • Добавил: literator
  • Дата: 1-03-2023, 12:50
  • Комментариев: 0
Ethical Hacking with Python: Build 35+ hacking tools with Python programmingНазвание: Ethical Hacking with Python: Build 35+ hacking tools with Python programming
Автор: Abdeladim Fadheli
Издательство: PublishDrive
Год: 2022
Страниц: 302
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.4 MB

Learn How To Build 37 Ethical Hacking Tools from Scratch using Python.

From simple port scanners to advanced reverse shells, you'll be amazed how such tools can be made with Python! Python is one of the best programming languages for building automation scripts, Infosec tools, and even malware! This EBook is a practical hands-on for Python programmers that hope to expand their knowledge in Cyber security and Python by building their own tools for information gathering, penetration testing, digital forensic investigation, and more!

Ethical hacking, also known as penetration testing, is an increasingly important field in today's interconnected world. With the growing prevalence of cyber threats, organizations and individuals need skilled ethical hackers to help identify and fix security vulnerabilities before malicious actors can exploit them. Python is a high-level, general-purpose interpreted programming language. It is designed to be highly readable and easy to use. Today, it's widely used in many domains, such as data science, web development, software development, and ethical hacking. Python’s flexibility and simplicity make it ideal for building custom security tools and performing penetration testing.

Here's what you'll get:
- Tons of Programs to Build: Build 37 tools
- Working Code: You'll get access to a downloadable link of 45 Python (.py) code files counting 4059 lines of code!

This EBook is for:
- Python programmers who are interested in building tools in the cyber security field.
- Python beginners who seek to expand their knowledge in Python and information security.
- Cyber security enthusiasts who want to utilize the tools built in the EBook and apply their skills.

The book is divided into 6 chapters:
Chapter 1 the first chapter, we start by building information gathering tools about domain names and IP addresses using the WHOIS database and tools like Nmap.
Chapter 2 we create some useful malware in Python, ransomware, a keylogger, and an advanced reverse shell that can take screenshots, record the microphone, and more.
Chapter 3 dive into password crackers and how to build such tools using libraries like pikepdf, paramiko, ftplib, and more.
Chapter 4 build tools for digital forensic investigations in this chapter. We detail how to extract metadata from media files and PDF documents. After that, we see how to pull cookies and passwords from the Chrome browser, hide data in images, and more.
Chapter 5 We write network-related penetration tools; we heavily depend on the Scapy library to perform a wide variety of exciting programs, such as ARP spoofing, DNS spoofing, SYN flooding, and many more.
Chapter 6 the final chapter, we build an advanced email spider that can crawl websites and extract email addresses to store them locally in a text file.

Target Audience:
This book is for Python programmers that look to make their own tools in the information security field. If you're a complete Python beginner, I recommend you take a quick online Python course, books like Python Crash Course and Automating the Boring Stuff with Python , or even a free YouTube video such as FreeCodeCamp's Python intro. You're ready to start if you know the basics of Python, such as variables, conditions, loops, functions, and classes.

Скачать Ethical Hacking with Python: Build 35+ hacking tools with Python programming












ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.