Gray Hat C: Creating and Automating Security Tools

COMPUTERS / General


Learn to use C#’s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Windows, Mac, Linux, and even mobile devices.
Following a crash course in C# and some of its advanced features, you’ll learn how to:
  • Write…

price: $32.37 Buy Now

Download Now Read Online

Gray Hat C


Download Now Read Online

Author by : Brandon Perry
Languange Used : en
Release Date : 2017-05-15
Publisher by : No Starch Press

Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulne

Gray Hat C


Download Now Read Online

Author by : Brandon Perry
Languange Used : en
Release Date : 2017-06-28
Publisher by : No Starch Press

Learn to use C#’s powerful set of core ­libraries to automate tedious yet important tasks like fuzzing, per

Gray Hat Python


Download Now Read Online

Author by : Justin Seitz
Languange Used : en
Release Date : 2009
Publisher by : No Starch Press

"Gray Hat Python," the first Python book written for advanced security analysts, explains the intricacies of u

Black Hat Python


Download Now Read Online

Author by : Justin Seitz
Languange Used : en
Release Date : 2014-12-14
Publisher by : No Starch Press

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explo

Violent Python


Download Now Read Online

Author by : TJ O'Connor
Languange Used : en
Release Date : 2012-12-28
Publisher by : Newnes

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a pra

Game Hacking


Download Now Read Online

Author by : Nick Cano
Languange Used : en
Release Date : 2016-12-16
Publisher by : No Starch Press

You don’t need to be a wizard to transform a game you like into a game you love. Imagine if you could give y

Penetration Testing


Download Now Read Online

Author by : Georgia Weidman
Languange Used : en
Release Date : 2014-06-14
Publisher by : No Starch Press

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and app

Leave a Reply