Artículo: AMZ-B0FGWJBBC9
Weaponized Code: Python Programming for Hackers: Turn Python into Your Most Powerful Hacking Weapon (Ghosts of the Network: Inside the hidden world of ... from foundations to future series. Book 2)
Sin stock
0.20 kg
No
Nuevo
Amazon
- How to build port scanners, login brute-forcers, and packet sniffers
- How to exploit web apps with Python — including SQL injection and XSS
- How to write your own Remote Access Trojan (RAT) and keylogger
- How to bypass antivirus using obfuscation, encoding, and polymorphic code
- How to exfiltrate data and build command-and-control (C2) infrastructure
- How to simulate a full red-team kill chain with only Python
- How to use AI to mutate payloads and outpace modern detection systems
- Ethical hackers and penetration testers
- Cybersecurity students and red teamers
- Python programmers looking to expand into security
- Readers of Black Hat Python, Violent Python, or Hacking: The Art of Exploitation
Producto prohibido
Este producto no está disponible