没有合适的资源?快使用搜索试试~ 我知道了~
Hacking with Python (The Ultimate Beginner's Guide) by Steve Tal...
1星 需积分: 9 8 下载量 78 浏览量
2018-03-05
11:41:49
上传
评论
收藏 3.17MB PDF 举报
温馨提示
Chapter 1: Preparation For Hacking Chapter 2: Python Basics Chapter 3: Writing Python Programs Chapter 5: Operators and Expressions Chapter 6: Functions and Modules Chapter 7: Setting Up for Hacking Chapter 8: Network Hacking Chapter 9: Hacks for the Web Chapter 10: Understanding Attacks Using Python Chapter 11: Other Nifty Hacks to Try
资源推荐
资源详情
资源评论
HackingwithPython
TheUltimateBeginner ’ sGuide
Introduction
ThisbookwillshowyouhowtousePython,createyourownhackingtools,andmakethemost
outofavailableresourcesthataremadeusingthisprogramminglanguage.
Ifyoudonothaveexperienceinprogramming,don’tworry–thisbookwillshowguideyou
throughunderstandingthebasicconceptsofprogrammingandnavigatingPythoncodes.
Thisbookwillalsoserveasyourguideinunderstandingcommonhackingmethodologiesandin
learninghowdifferenthackersusethemforexploitingvulnerabilitiesorimprovingsecurity.You
willalsobeabletocreateyourownhackingscriptsusingPython,usemodulesandlibrariesthat
areavailablefromthird-partysources,andlearnhowtotweakexistinghackingscriptstoaddress
yourowncomputingneeds.
ThankyouandIhopeyouenjoyit!
Copyright2017bySteveTaleAllrightsreserved.
Thisdocumentisgearedtowardsprovidingexactandreliableinformationinregardstothetopic
and issue covered. The publication is sold with the idea that the publisher is not required to
renderaccounting,officiallypermitted,orotherwise,qualifiedservices.Ifadviceisnecessary,
legalorprofessional,a21practicedindividualintheprofessionshouldbeordered.
-FromaDeclarationofPrincipleswhichwasacceptedandapprovedequallybyaCommitteeof
theAmericanBarAssociationandaCommitteeofPublishersandAssociations.
In no way is it legal to reproduce, duplicate, or transmit any part of this document in either
electronicmeansorinprintedformat.Recordingofthispublicationisstrictlyprohibitedandany
storage ofthis documentis not allowedunlesswith written permission from the publisher. All
rightsreserved.
The information provided herein is stated to be truthful and consistent, in that any liability, in
termsofinattentionorotherwise,byanyusageorabuseofanypolicies,processes,ordirections
contained within is the solitary and utter responsibility of the recipient reader. Under no
circumstances will any legal responsibility or blame be held against the publisher for any
reparation,damages,ormonetarylossduetotheinformationherein,eitherdirectlyorindirectly.
Respectiveauthorsownallcopyrightsnotheldbythepublisher.
Theinformationhereinisofferedforinformationalpurposessolely,andisuniversalasso.The
presentationoftheinformationiswithoutcontractoranytypeofguaranteeassurance.
The trademarks that are used are without any consent, and the publication of the trademark is
without permission or backing by the trademark owner. All trademarks and brands within this
bookareforclarifyingpurposesonlyandaretheownedbytheownersthemselves,notaffiliated
withthisdocument.
Tableofcontents
Chapter1:PreparationForHacking
Chapter2:PythonBasics
Chapter3:WritingPythonPrograms
Chapter5:OperatorsandExpressions
Chapter6:FunctionsandModules
Chapter7:SettingUpforHacking
Chapter8:NetworkHacking
Chapter9:HacksfortheWeb
Chapter10:UnderstandingAttacksUsingPython
Chapter11:OtherNiftyHackstoTry
Conclusion
Bonus:PreviewOf‘IntroductiontoPython3
剩余93页未读,继续阅读
资源评论
- 「已注销」2019-07-06预览版也发上了,,,
ulynn8203
- 粉丝: 0
- 资源: 7
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功