Skip to Main Content (Press Enter)
Check Out
The Bestselling Books of All Time
See the List
Toggle side nav
Black Hat Python, 2nd Edition by Justin Seitz and Tim Arnold

Black Hat Python, 2nd Edition

Best Seller
Black Hat Python, 2nd Edition by Justin Seitz and Tim Arnold
Paperback $44.95
Feb 16, 2021 | ISBN 9781718501126

Also available from:

See All Formats (1) +
  • Feb 16, 2021 | ISBN 9781718501126

    Also available from:

  • Feb 16, 2021 | ISBN 9781718501133

    Available from:

*This title is not eligible for purchase to earn points nor for redemption with your code in the Reader Rewards program

Product Details


Praise for the first edition of Black Hat Python

“Another incredible Python book. With a minor tweak or two many of these programs will have at least a ten year shelf life, and that is rare for a security book.”
—Stephen Northcutt, founding president of the SANS Technology Institute

“A great book using Python for offensive security purposes.”
—Andrew Case, Volatility core developer and coauthor of The Art of Memory Forensics

“If you truly have a hacker’s mindset, a spark is all you need to make it your own and do something even more amazing. Justin Seitz offers plenty of sparks.”
—Ethical Hacker 

“Whether you’re interested in becoming a serious hacker/penetration tester or just want to know how they work, this book is one you need to read. Intense, technically sound, and eye-opening.”
—Sandra Henry-Stocker, IT World 

“Definitely a recommended read for the technical security professional with some basic previous exposure to Python.”
—Richard Austin, IEEE Cipher

“A well-written book that will put you on track to being able to write powerful and potentially scary tools. It’s up to you to use them for good.”
—Steve Mansfield-Devine, editor of Elsevier’s Network Security Newsletter

“A well implemented read with lots of good ideas for fun offensive Python projects. So enjoy, and don’t forget it’s all about the code!”
—Dan Borges, LockBoxx

“A useful eye-opener.”
—MagPi Magazine

Table Of Contents

Chapter 1: Setting up Your Python Environment
Chapter 2: The Network Basics
Chapter 3: The Network: Raw Sockets and Sniffing
Chapter 4: Owning the Network with Scapy
Chapter 5: Web Hackery
Chapter 6: Extending Burp Proxy
Chapter 7: GitHub Command and Control
Chapter 8: Common Trojaning Tasks on Windows
Chapter 9: Fun with Internet Explorer
Chapter 10: Windows Privilege Escalation
Chapter 11: Automating Offensive Forensics

Back to Top