Please Sign Up to Request This Product

Violent Python

A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

You need to be an approved reviewer to request a product. Please sign up to request access or login to your account.

If you've already signed up and you haven't heard from us yet please email reviewers@oreilly.com and we will check on your request.

Description

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.



- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.

Reviews

On Jul 22 Noah Spahn wrote: Enjoyable intro to a field of study
TJ O'Connor does a great job of conveying his enthusiasm for subject. The experience of reading this book, reminds me of visiting the office of an expert in his field who is excitedly sharing his knowledge. Full Review  >

Rating: StarStarStarStarStar4.0

On Jun 30 Marc 137 wrote: Your swiss knife
A source of grey hat ideas Full Review  >

Rating: StarStarStarStarStar4.0

On Jun 25 Grant van Staden wrote: A Practical introduction to security using python
This is a great book for those wanting a bit more context surrounding security and forensic analysis or those curious about how attacks are constructed. Each chapter is capable of being read on its own so you can cherry-pick subjects that interest you. As can be expected, it’s full of Python code which provides useful and fun examples. Full Review  >

Rating: StarStarStarStarStar4.0

On Jun 25 Kenta Hood wrote:
Full Review  >

Rating: StarStarStarStarStar3.0

On Jun 12 Eric Chou wrote:
Full Review  >

Rating: StarStarStarStarStar5.0

On Jun 10 Dylan Scott wrote: Security using Python
This book served as an introduction into the world of security for me since I have never studied in this area. I like to see discussions involving code and that was one of the reasons I started this book as it seemed very practical. Full Review  >

Rating: StarStarStarStarStar4.0

On May 20 Carel Fenijn wrote:
Full Review  >

Rating: StarStarStarStarStar4.0

Receive free ebooks and videos in exchange for your reviews.

Join the O'Reilly Reader Review Program

Learn more >

Returning?

Top Reviewers

Michal Konrad Owsiak, 93 Reviews

Santosh Shanbhag, 58 Reviews

Surachart Opun, 57 Reviews

Doron Katz, 56 Reviews

Shawn Day, 55 Reviews

See More Reviewers >

Featured Review

JavaScript: The Definitive Guide

Arthur Zubarev wrote:
t not be your 1st or may be 2nd book if you are new to JavaScript
A better name for this book would be JavaScript Bible, alas seems that this trademark… Full Review >

Rating: StarStarStarStarStar5.0