Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Book

ISBN: 1597499579

ISBN13: 9781597499576

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$11.39
Save $38.56!
List Price $49.95
Almost Gone, Only 1 Left!

You Might Also Enjoy

Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz, Tim Arnold

from: $6.89

Hacking: The Art of Exploitation
Hacking: The Art of Exploitation
Jon Erickson

from: $13.49

Red Team Field Manual
Red Team Field Manual
Ben Clark

from: $4.89

The Hacker Playbook 3: Practical Guide to Penetration Testing
The Hacker Playbook 3: Practical Guide to Penetration Testing
Peter Kim

from: $19.39

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Andrew Honig, Michael Sikorski

from: $21.49

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
OccupyTheWeb

from: $20.19

Hacking For Dummies
Hacking For Dummies
Kevin Beaver

from: $5.99

Computer Networking: A Top-Down Approach
Computer Networking: A Top-Down Approach
James F. Kurose, Keith Ross, Keith W. Ross

from: $4.25

CompTIA Network All-In-One Exam Guide
CompTIA Network All-In-One Exam Guide
Mike Meyers

from: $5.19

Gray Hat Python
Gray Hat Python
Justin Seitz

from: $5.99

Learn Windows PowerShell in a Month of Lunches
Learn Windows PowerShell in a Month of Lunches
Jeffrey Hicks, Don Jones

from: $5.89

Automate the Boring Stuff with Python: Practical Programming for Total Beginners
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
Albert Sweigart, Al Sweigart

from: $10.89

Linux Pocket Guide
Linux Pocket Guide
Daniel J. Barrett

from: $4.29

Kali Linux: Kali Linux Made Easy For Beginners And Intermediates; Step By Step With Hands On Projects (Including Hacking and Cybersecurity Basics with Kali Linux)
Kali Linux: Kali Linux Made Easy For Beginners And Intermediates; Step By Step With Hands On Projects (Including Hacking and Cybersecurity Basics with Kali Linux)
Berg Craig

from: $16.32

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson

from: $5.89

The Protocols (TCP/IP Illustrated, Volume 1)
The Protocols (TCP/IP Illustrated, Volume 1)
W. Richard Stevens, Kevin R. Fall

from: $12.99

CompTIA A+ Certification All-In-One Exam Guide, Exams 220-701 & 220-702
CompTIA A+ Certification All-In-One Exam Guide, Exams 220-701 & 220-702
Mike Meyers, Michael Meyers

from: $7.69

Shell Scripting: How to Automate Command Line Tasks Using Bash Scripting and Shell Programming
Shell Scripting: How to Automate Command Line Tasks Using Bash Scripting and Shell Programming
Jason Cannon

from: $14.99

Kali Linux Revealed: Mastering the Penetration Testing Distribution
Kali Linux Revealed: Mastering the Penetration Testing Distribution
Mati Aharoni, Jim O'Gorman, Raphaël Hertzog

Out of Stock

Book Overview

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

Customer Reviews

0 customer rating | 0 review
There are currently no reviews. Be the first to review this work.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured