Hello guest, if you read this it means you are not registered. Click here to register in a few simple steps, you will enjoy all features of our Forum.
Rules have been updated! Here

Tags
Author: MaskedUser - Replies: 1 - Views: 3571
Python Based Veil Framework 3.1 (Evasion)
Veil Options:
  --list-tools          List Veil's tools
  -t TOOL, --tool TOOL  Specify Veil tool to use (Evasion, Ordnance etc.)
  --update              Update the Veil framework
  --setup              Run the Veil framework setup file & regenerate the
                        configuration
  --config              Regenerate the Veil framework configuration file
  --version            Displays version and quits

[*]Callback Settings:
  --ip IP, --domain IP  IP address to connect back t
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 1923
[packt] Hands-On Penetration Testing with Python
[Image: https://i.postimg.cc/SR6b80PT/image.png]

With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands intensive automation and innovation, and Python is at the forefront. Given the huge number of tools written in Python and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.

Hands-On Penetration Testing with Python
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2041
[packt] Learning Python Web Penetration Testing: Automate web penetration testing act
[Image: https://i.postimg.cc/7PpxT8Hw/image.png]

Key Features
  • Understand the web application penetration testing methodology and toolkit using Python
  • Write a web crawler/spider with the Scrapy library
  • Detect and exploit SQL injection vulnerabilities by creating a script all by yourself
Book Description
Web penetration testing is the use of tools and code to attack a website or web app in order to assess its
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2308
Math Adventures with Python: An Illustrated Guide to Exploring Math with Code
[Image: https://i.imgur.com/J0kXenX.png]
Math Adventures with Python will show you how to harness the power of programming to keep math relevant and fun. With the aid of the Python programming language, you'll learn how to visualize solutions to a range of math problems as you use code to explore key mathematical concepts like algebra, trigonometry, matrices, and cellular automata.

Once you've learned the programming basics like loops and variables, you'll write your own programs to
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2497
Filter Banks and Audio Coding: Compressing Audio Signals Using Python
[Image: https://i.imgur.com/eWe1wv5.png]
This textbook presents the fundamentals of audio coding, used to compress audio and music signals, using Python programs both as examples to illustrate the principles and for experiments for the reader. Together, these programs then form complete audio coders. The author starts with basic knowledge of digital signal processing (sampling, filtering) to give a thorough introduction to filter banks as used in audio coding, and their design methods. He the
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2944
Hands-on JavaScript for Python Developers: Leverage your Python knowledge to quickly
[Image: https://i.imgur.com/gQpu8WW.png]
Key Features
  • Discover similarities and differences between JavaScript and Python coding conventions
  • Explore frontend web concepts, UI/UX techniques, and JavaScript frameworks to enhance your web development skills
  • Put your JS knowledge into practice by developing a full-stack web app with React and Express
Book Description
Knowledge of Python is a great foundation for learning other languages. This book will help you a
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2328
Discovering Computer Science: Interdisciplinary Problems, Principles, and Python 2nd
[Image: https://i.imgur.com/CYqAuO9.png]
"Havill's problem-driven approach introduces algorithmic concepts in context and motivates students with a wide range of interests and backgrounds."

-- Janet Davis, Associate Professor and Microsoft Chair of Computer Science, Whitman College

"This book looks really great and takes exactly the approach I think should be used for a CS 1 course. I think it really fills a need in the textbook landscape."

[i]-- [b]Marie desJar
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2309
Machine Learning Pocket Reference: Working with Structured Data in Python
[Image: https://i.imgur.com/wuYAk2D.png]

With detailed notes, tables, and examples, this handy reference will help you navigate the basics of structured machine learning. Author Matt Harrison delivers a valuable guide that you can use for additional support during training and as a convenient resource when you dive into your next machine learning project.
Ideal for programmers, data scientists, and AI engineers, this book includes an overview of the machine learning process and walks you t
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2354
Black Hat Python: Python Programming for Hackers and Pentesters, 2nd
[Image: https://i.imgur.com/nXh0h1a.png]

Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, 2nd Edition, you’ll explore the darker side of Python’s capabilities—writing networ
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 2252
Understanding Network Hacks: Attack and Defense with Python 3, 2nd
[Image: https://i.imgur.com/R4gfgKK.png]

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems an