-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Python for Security and Networking - Third Edition
By :
In the following links, you will find more information about the tools mentioned and the official Python documentation for the socket module:
When a pentest is performed, sometimes critical vulnerabilities are located that, when exploited, allow a shell to be generated, which can be bound or reversed as appropriate. For this purpose, there is an interesting project on GitHub called Shellerator that, by means of a wizard, teaches valid commands that can be executed against the target for the generation of a shell. This project is developed in Python 3 and has a file called requirements.txt to install all the dependencies using PIP. Another interesting project is https://github.com...