没有合适的资源?快使用搜索试试~ 我知道了~
Hacking with Python (The Ultimate Beginner's Guide) by Steve Tal...
1星 需积分: 9 8 下载量 152 浏览量
2018-03-05
11:41:49
上传
评论
收藏 3.17MB PDF 举报
温馨提示
Chapter 1: Preparation For Hacking Chapter 2: Python Basics Chapter 3: Writing Python Programs Chapter 5: Operators and Expressions Chapter 6: Functions and Modules Chapter 7: Setting Up for Hacking Chapter 8: Network Hacking Chapter 9: Hacks for the Web Chapter 10: Understanding Attacks Using Python Chapter 11: Other Nifty Hacks to Try
资源推荐
资源详情
资源评论
HackingwithPython
TheUltimateBeginner ’ sGuide
Introduction
ThisbookwillshowyouhowtousePython,createyourownhackingtools,andmakethemost
outofavailableresourcesthataremadeusingthisprogramminglanguage.
Ifyoudonothaveexperienceinprogramming,don’tworry–thisbookwillshowguideyou
throughunderstandingthebasicconceptsofprogrammingandnavigatingPythoncodes.
Thisbookwillalsoserveasyourguideinunderstandingcommonhackingmethodologiesandin
learninghowdifferenthackersusethemforexploitingvulnerabilitiesorimprovingsecurity.You
willalsobeabletocreateyourownhackingscriptsusingPython,usemodulesandlibrariesthat
areavailablefromthird-partysources,andlearnhowtotweakexistinghackingscriptstoaddress
yourowncomputingneeds.
ThankyouandIhopeyouenjoyit!
Copyright2017bySteveTaleAllrightsreserved.
Thisdocumentisgearedtowardsprovidingexactandreliableinformationinregardstothetopic
and issue covered. The publication is sold with the idea that the publisher is not required to
renderaccounting,officiallypermitted,orotherwise,qualifiedservices.Ifadviceisnecessary,
legalorprofessional,a21practicedindividualintheprofessionshouldbeordered.
-FromaDeclarationofPrincipleswhichwasacceptedandapprovedequallybyaCommitteeof
theAmericanBarAssociationandaCommitteeofPublishersandAssociations.
In no way is it legal to reproduce, duplicate, or transmit any part of this document in either
electronicmeansorinprintedformat.Recordingofthispublicationisstrictlyprohibitedandany
storage ofthis documentis not allowedunlesswith written permission from the publisher. All
rightsreserved.
The information provided herein is stated to be truthful and consistent, in that any liability, in
termsofinattentionorotherwise,byanyusageorabuseofanypolicies,processes,ordirections
contained within is the solitary and utter responsibility of the recipient reader. Under no
circumstances will any legal responsibility or blame be held against the publisher for any
reparation,damages,ormonetarylossduetotheinformationherein,eitherdirectlyorindirectly.
Respectiveauthorsownallcopyrightsnotheldbythepublisher.
Theinformationhereinisofferedforinformationalpurposessolely,andisuniversalasso.The
presentationoftheinformationiswithoutcontractoranytypeofguaranteeassurance.
The trademarks that are used are without any consent, and the publication of the trademark is
without permission or backing by the trademark owner. All trademarks and brands within this
bookareforclarifyingpurposesonlyandaretheownedbytheownersthemselves,notaffiliated
withthisdocument.
Tableofcontents
Chapter1:PreparationForHacking
Chapter2:PythonBasics
Chapter3:WritingPythonPrograms
Chapter5:OperatorsandExpressions
Chapter6:FunctionsandModules
Chapter7:SettingUpforHacking
Chapter8:NetworkHacking
Chapter9:HacksfortheWeb
Chapter10:UnderstandingAttacksUsingPython
Chapter11:OtherNiftyHackstoTry
Conclusion
Bonus:PreviewOf‘IntroductiontoPython3
剩余93页未读,继续阅读
资源评论
- 「已注销」2019-07-06预览版也发上了,,,
ulynn8203
- 粉丝: 0
- 资源: 7
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- (源码)基于Java和Python的垃圾图像分类系统.zip
- (源码)基于Spring Boot和Beetl的代码生成管理系统.zip
- (源码)基于低功耗设计的无线互呼通信系统.zip
- (源码)基于Arduino的盲人碰撞预警系统.zip
- 自己学习java安全的一些总结,主要是安全审计相关.zip
- (源码)基于C++的多线程外部数据排序与归并系统.zip
- 编译的 FFmpeg 二进制 Android Java 库.zip
- 纯 Java git 解决方案.zip
- (源码)基于Spring Boot和Vue的后台管理系统.zip
- 用于将 Power BI 嵌入到您的应用中的 JavaScript 库 查看文档网站和 Wiki 了解更多信息 .zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功