"This book was a joy to read..."
--Henrik Lund Kramshoej, Kramses Blog
"If you use python for your day-to-day scripting and perform some reverse engineering (RE)/debugging/fuzzing tasks, then this definitely a book that is bound to catch your attention. "
--nan0tube, int 2Eh
"I recommend the book... Its a good book to help security engineers use python to begin analyzing software vulnerabilities. "
--Matthew Wollenweber, Cyberwart.com
"The book succeeded in showing me with relative ease how a trained security researcher or determined hacker could use relatively straightforward Python scripts to infiltrate the most prevalent consumer operating system today."
--Mike Riley, Dr. Dobb's CodeTalk
"...a fantastic book and I would absolutely recommend it to others."
--Ben Cecka, Ben's Blog
"I can recommend Gray Hat Python to all people who want to get an overview of hacking tools and hacking techniques that make use of Python. It is a no-nonsense book which follows a simple recipe."
"With a bare-bones approach for the topic, the book does enough to get the interested novice up to a decent level of expertise. "
--Ganadeva Bandyopadhyay, Desicritics.org
"...really well-written and has a nice structure which
is common among no starch press books, that is, more code less talk."