Python hacker. Those are two words you really could use to describe me. At Immunity, I am lucky enough to work with people who actually, really, know how to code Python. I am not one of those people. I spend a great deal of my time penetration testing, and that requires rapid Python tool development, with a focus on execution and delivering results (not necessarily on prettiness, optimization, or even stability). Throughout this book you will learn that this is how I code, but I also feel as though it is part of what makes me a strong pentester. I hope that this philosophy and style helps you as well. As you progress through the book, you will also realize that I don’t take deep dives on any single topic. This is by design. I want to give you the bare minimum, with a little flavor, so that you have some foundational knowl- edge. With that in mind, I’ve sprinkled ideas and homework assignments throughout the book to kickstart you in your own direction. I encourage you to explore these ideas, and I would love to hear back any of your own implementations, tooling, or homework assignments that you have done. xviii Preface As with any technical book, readers at different skill levels with Python (or information security in general) will experience this book differently. Some of you may simply grab it and nab chapters that are pertinent to a consulting gig you are on, while others may read it cover to cover. I would recommend that if you are a novice to intermediate Python programmer that you start at the beginning of the book and read it straight through in order. You will pick up some good building blocks along the way. To start, I lay down some networking fundamentals in Chapter 2 and slowly work our way through raw sockets in Chapter 3 and using Scapy in Chapter 4 for some more interesting network tooling. The next section of the book deals with hacking web applications, starting with your own custom tooling in Chapter 5 and then extending the popular Burp Suite in Ch
2021-10-30 11:53:54 10.08MB hacker python black_hat
1
Resource.Hacker.3.4 ResourcesExtract_v1.15 eXeScope_6.5 今天用了用,顺便收集了,很好的东西。
2021-10-25 13:55:06 957KB Resource Hacker exescope
1
Linux Basics for Hackers 中文版
2021-10-22 08:22:56 5.58MB Linux  Hacker
1
内核级后门软件,用户可以通过本软件隐藏文件、进程、系统服务、系统驱动、注册表键的键和键值、打开的端口以及虚构可用磁盘空间。程序同时也在内存中伪装它所做的改动,并且隐身地控制被隐藏进程。程序安装隐藏后门,注册隐藏系统服务并且安装系统驱动。该后门技术允许植入Redirector。鉴于参数过多,不推荐新手使用。
2021-10-09 17:04:14 69KB rootkit hacker defender
1
HackerRank-30天代码:这是适用于Hacker Ranker的30天代码实践解决方案的全部内容(在Java中)
2021-09-28 06:04:00 1KB Java
1
本书介绍了各种高效编程方法,展示了计算机代码与指令,以及指令间的内在关联。
2021-09-16 20:37:51 10.64MB 算法,高效程序
1
SRC经验文档
2021-09-06 15:28:42 3.31MB src 漏洞 经验 hacker
1
这是著名的Y Combinator的Hacker新闻网站的部分克隆。 它是使用React JS的官方Api制成的。 应用共有4个视图(页面),3个主页和一个嵌套页面; 主要页面有:热门故事,它是一个主页,它显示热门故事列表,新故事(新故事列表)和所有评论,其中显示了网站上发布的每个故事的评论列表(按时间排序); 热门或新故事页面列表包含20个故事,您可以使用屏幕底部显示的自定义分页来回浏览故事(从服务器发送的故事总数约为500个)。 “热门新闻”或“新故事”页面上每个故事的标题均包含指向该故事或文章发布所在网页的链接,如果您单击该链接,它将在新页面中打开; 您可以通过单击故事框中包含的链接来单独查看每个故事的评论(从“热门故事”或“新故事”页面),这些评论将显示在上述嵌套页面中; 默认情况下,将显示所有故事的评论及其答复,但是您可以通过单击折叠('-')符号来分别折叠(当然,以
2021-08-27 16:16:18 203KB JavaScript
1
该项目是通过引导的。 可用脚本 在项目目录中,可以运行: yarn start 在开发模式下运行该应用程序。 打开在浏览器中查看它。 如果您进行编辑,则页面将重新加载。 您还将在控制台中看到任何棉绒错误。 yarn test 在交互式监视模式下启动测试运行器。 有关更多信息,请参见关于的部分。 yarn build 构建生产到应用程序build文件夹。 它在生产模式下正确捆绑了React,并优化了构建以获得最佳性能。 最小化内部版本,文件名包含哈希值。 您的应用已准备好进行部署! 有关更多信息,请参见关于的部分。 yarn eject 注意:这是单向操作。 eject ,您将无法返回! 如果您对构建工具和配置选择不满意,则可以随时eject 。 此命令将从您的项目中删除单个生成依赖项。 相反,它将所有配置文件和传递依赖项(webpack,Babel,ESLint等)直接复
2021-08-27 16:08:51 216KB JavaScript
1
hacker Defender 客户端 服务器 bdcli100.exe
2021-08-13 23:17:32 198KB hacker Defender 客户端 服务器
1