Discover new kitchen selections
Add Prime to get Fast, Free delivery
Amazon prime logo
Buy new:
-21% $39.53
FREE delivery Thursday, May 22 to Nashville 37217
Ships from: Amazon.com
Sold by: Amazon.com
$39.53 with 21 percent savings
List Price: $49.95
FREE Returns
FREE delivery Thursday, May 22 to Nashville 37217
Or Prime members get FREE delivery Tuesday, May 20.
In Stock
$$39.53 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$39.53
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Amazon.com
Sold by
Amazon.com
Returns
30-day refund/replacement
30-day refund/replacement
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$19.95
Get Fast, Free Shipping with Amazon Prime FREE Returns
The book is in solid, readable condition with some signs of wear on the cover and pages. There may be light creases or minor markings, but no significant tears or missing pages. The binding is intact and there may be minimal underlining, or margin notes. The book is in solid, readable condition with some signs of wear on the cover and pages. There may be light creases or minor markings, but no significant tears or missing pages. The binding is intact and there may be minimal underlining, or margin notes. See less
FREE delivery June 1 - 12 to Nashville 37217 on orders shipped by Amazon over $35
Or fastest delivery May 31 - June 10
$$39.53 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$39.53
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Violent Python 1st Edition

4.5 out of 5 stars 417 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$39.53","priceAmount":39.53,"currencySymbol":"$","integerValue":"39","decimalSeparator":".","fractionalValue":"53","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"QnaP6klepByS3p5KpmVmO7eEIxa14O%2B2Bs5jj3cxVrPFxPPzAuPhG%2F%2FUvcG3%2B9Z1EDuJDYJG49pjL6pr7V2Fv19SetNCnsTSEK%2FrWZxgFb5%2FcApLnCXprbBxAfs4kDk4uXwOalz7bU5j899MOjyhvg%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$19.95","priceAmount":19.95,"currencySymbol":"$","integerValue":"19","decimalSeparator":".","fractionalValue":"95","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"QnaP6klepByS3p5KpmVmO7eEIxa14O%2B27nX2cZRgH5WyXif53XHtUhnTnJB%2FsKlmOO1my1Ji37i%2Ba9oUu8M49xrLE7ZAN0zDagYpdneIP5RzTyRz14kEVStNTgsfjr42gEF5t%2Bfg89WtsuhihUVAZOsB8n%2FBo6zQXTLL7o7DVX4LvMJUlVj3KRI9ouytxra4","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

Frequently bought together

This item: Violent Python
$30.88
Get it May 22 - 27
Only 1 left in stock - order soon.
Ships from and sold by 365giftshop.
+
$29.88
Get it May 28 - Jun 4
In stock
Usually ships within 3 to 4 days.
Ships from and sold by allnewbooks.
+
$31.00
Get it as soon as Thursday, May 22
In Stock
Ships from and sold by Amazon.com.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
Some of these items ship sooner than the others.
Choose items to buy together.

Editorial Reviews

Review

"An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it." --Reference and Research Book News, August 2013

"A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title… The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be… useful tips and tricks will surely be acquired simply by working through the exercises." --The Ethical Hacker Network, February 2013

"Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm." --The Ethical Hacker Network, February 2013

"When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout." --Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth

"Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source." --James Shewmaker, Security Analyst, Bluenotch Corporation

"The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone." --Raphael Mudge, Creator of Armitage

Review

Discover how to use Python to exploit systems and build effective pen testing tools to defend your system from attackers

Product details

  • ASIN ‏ : ‎ 1597499579
  • Publisher ‏ : ‎ Syngress
  • Publication date ‏ : ‎ November 22, 2012
  • Edition ‏ : ‎ 1st
  • Language ‏ : ‎ English
  • Print length ‏ : ‎ 288 pages
  • ISBN-10 ‏ : ‎ 9781597499576
  • ISBN-13 ‏ : ‎ 978-1597499576
  • Item Weight ‏ : ‎ 2.31 pounds
  • Dimensions ‏ : ‎ 7.5 x 0.65 x 9.25 inches
  • Customer Reviews:
    4.5 out of 5 stars 417 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
T. J. O'Connor
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read book recommendations and more.

Customer reviews

4.5 out of 5 stars
417 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers find the book serves as a great practical introduction to Python, providing useful techniques for real-world programming. Moreover, the content is relevant to forensics, and one customer notes it covers plenty to get people familiar with the language. Additionally, the book presents material in an easy-to-read method, though some mention it contains typographical errors. The code quality receives mixed feedback, with some saying it really works while others find it bad. The book is fun to read, and customers appreciate its library content, with one highlighting its extensive collection of third-party libraries. However, the content is somewhat outdated.

AI-generated from the text of customer reviews

45 customers mention "Informational value"45 positive0 negative

Customers find the book provides useful techniques for real-world programming and serves as a great reference guide.

"...], but remember it is pure Python, which will help both introduce and fill in some blanks in both Ligh..." Read more

"...the book does cover some Python basics very well and steps through the install of both Python and packages used throughout the book, explaining why..." Read more

"...tester, but for anyone that does, I am confident this is an excellent resource." Read more

"...tool for them because of its innate readability, support for multiple programming paradigms, and tremendous library of existing modules that can be..." Read more

26 customers mention "Content quality"22 positive4 negative

Customers appreciate the content of the book, noting that the concepts presented are relevant and it is wonderful for forensics. One customer mentions it serves as a great introduction to Python for security, while another highlights its coverage of sploits and forensics investigations.

"...[ASIN:1118825098 The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac..." Read more

"...python tools such as BeautifulSoup and scapy but also covers enough of the security discipline to point would be coders in the right direction...." Read more

"...This book takes an idea and builds on it over a chapter, and starts again at the beginning of each chapter, providing an in-depth understanding in..." Read more

"As a cookbook, this has a lot of good ideas. I am looking for a good beginning-Python book, and this isn't that...." Read more

9 customers mention "Fun to read"9 positive0 negative

Customers find the book fun to read, with one mentioning that the projects are exciting.

"...know that I will ever be a great Python scripter, but it is fun to know the basics. I spent the next four days playing with some of the examples...." Read more

"...existing modules that can be adapted and connected to do new and interesting things...." Read more

"...The subject is very fun and interesting and if you are just getting started with Python then what a great way to get started than with this book on..." Read more

"...This book piqued my interest, and I believe it was worth while. Violent Python covers python and pen testing on a beginner's level...." Read more

4 customers mention "Library content"4 positive0 negative

Customers appreciate the library content of the book, with one mentioning its extensive collection of useful third-party libraries, while another notes it covers plenty to get readers familiar with Python.

"...Highly recommended for beginners and those with access to py libraries...." Read more

"...support for multiple programming paradigms, and tremendous library of existing modules that can be adapted and connected to do new and interesting..." Read more

"...to what is possible in the real world with Python and many useful third-party libraries: wireless and wired network sniffing and packet crafting,..." Read more

"...It's easy to follow and covers plenty to get people familiar with Python in a security context." Read more

4 customers mention "Python integration"4 positive0 negative

Customers appreciate the Python integration in the book, with reviews highlighting its coverage of networking, web interaction, and traffic analysis, including specific examples like analyzing 802.11 probes and beacons.

"...for instance the Windows Registry, but I found the networking stuff to be fascinating...." Read more

"...packet parsing using dpkt and Scapy, KML generation, and analyzing various types of traffic like the LOIC DDOS tool, varying TTLs from spoofed port..." Read more

"...Simple packet analysis, logging, web interaction, all components for attackers and defenders is demonstrated quite well...." Read more

"...this book really helps in regards to security concepts and networking with Python. Certainly a 'Cookbook' in format...." Read more

25 customers mention "Readability"14 positive11 negative

Customers have mixed opinions about the book's readability, with some finding it well-written and easy to read, while others report typographical errors and unclear writing.

"...The writing style is clear and easy to follow, I am working my way back through the sections on packet capture using the nmap libraries getting a..." Read more

"...for future projects in Python, one major downfall is the ridiculous number of typos...." Read more

"...provides a particularly useful tool for them because of its innate readability, support for multiple programming paradigms, and tremendous library..." Read more

"...Simple packet analysis, logging, web interaction, all components for attackers and defenders is demonstrated quite well...." Read more

10 customers mention "Code quality"3 positive7 negative

Customers have mixed opinions about the code in the book, with some reporting that it really works while others find it bad.

"...The reasons why I say this? - the code is bad: - it looks like "the Python antipattern cookbook", that is "how not to..." Read more

"...if there were only typos in the text itself, but even the code snippets have typos, rendering some programs unusable...." Read more

"...And all the code examples work. As they should." Read more

"...import new module. more code errors. thanks for that. I should have known better than to buy a coding book from 2013. Really?..." Read more

7 customers mention "Dated content"0 positive7 negative

Customers find the content of the book outdated.

"Husband really likes this book; however, it is a little dated. Overall concepts are very solid...." Read more

"...about this book, but it seems like it's fallen into disrepair and gone obsolete...." Read more

"...and the urls don’t work and the python (and other platforms) version is outdated. But wait! The concepts are great!..." Read more

"A little outdated! But i can't put it down!..." Read more

Don't get the Kindle edition
1 out of 5 stars
Don't get the Kindle edition
The Kindle edition has so many font and layout issues which renders the content mostly useless. See attached sample.
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

  • Reviewed in the United States on October 9, 2014
    My hosting provider, and my own servers, have py, but that doesn't mean you have access to the libraries mentioned in this fine little book! It attempts to be both an introduction to Python and an intro to some sploits and some forensics. It does a good job if you're into either, and just now starting to learn some of your own Python coding.

    The "hot book" on Python Forensics right now is Hosmer-- Python Forensics: A workbench for inventing and sharing digital forensic technology-- much more detailed, more expensive, more recent, and a much tighter focus on forensics than the broader brush of this book, which includes some pen development. Elesevier always gives their text web resources in the format elsevierdirect dot com forward slash companion then the isbn. This book's code is not as error filled as some earlier reviews said, so I'm guessing that it has been updated and corrected. Again, you'll need library access, and the code isn't as well annotated as Hosmer or Ligh's fine and classic Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code, but remember it is pure Python, which will help both introduce and fill in some blanks in both Ligh and Hosmer.

    By the way, Ligh also has a new, wonderful book out on forensics: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, and of course Ligh uses Python in all his books, blogs and articles as the "behind the scenes" create your own resource. I'm also a developer and contribute to zsand dot com's sandboxes, and one thing this book is missing that you'll find in both Ligh and Hosmer, are COMBINATIONS of sploit software that let you customize or see things like little python windows adding elements to the bigger API. An example would be embedding any PE (dll/exe etc.) in a "harmless" looking extension like .pdf, a network update or even a non-kernel/root looking extension like a screen tip or update.

    Speaking of, since the authors of this book are all military, the upside is seeing how that world thinks (worked in it for some years), but the downside is their "courtesy." For example, they will say that the problem with a Google sploit is that it "requires a developer id which compromises anonymity" but completely ignores how easy it is to buy, hack, borrow or get those credentials, ids and codes anonymously online. This doesn't have to be black, it can even be for your own honeypot or a follow up on an attack where you don't want your developer id revealed even if you do have you own!

    Highly recommended for beginners and those with access to py libraries. The caveat is that the freeware and GNU libraries out there are not enough, although they are much better than they were when this text was written, and Hosmer also shows you how to go direct instead of relying on libraries when you can't get them.
    7 people found this helpful
    Report
  • Reviewed in the United States on November 27, 2012
    Took a quick flick through to get an idea of the content and went back to cover the parts I am interested in.

    Although the book does cover some Python basics very well and steps through the install of both Python and packages used throughout the book, explaining why and where each one is needed I am not sure I would recommend the book to beginners and I do not think that is the target audience. If however you understand some programming basics and want to get into writing your own tools in Python this book will give you some of the most concise and well documented examples I have seen. Providing not just instructions on what you need to do but (more importantly) why you would want to do it. It provides the base scripts and the understanding leaving it up to the reader to take the script and expand on it as needed, an approach I like.

    The writing style is clear and easy to follow, I am working my way back through the sections on packet capture using the nmap libraries getting a lot of info as I go along. Without a doubt one of the best book purchases I have made and I would seriously recommend it to someone looking to write their own tools or to just get an understanding of Python hacking.
    6 people found this helpful
    Report
  • Reviewed in the United States on February 6, 2013
    I have wanted to play around with the Python scripting language for a while, but life is busy and I never really got the opportunity. Then Violent Python showed up on my "to read" list. So I opened it and there were coding examples very early in the book. The author talks about creating a development environment and that is probably a good idea, but I work on a Mac, and hoped things would just work. So when we got to page 21, Your First Program, I just brought up a terminal window and typed in what it said on the page. It worked! That got me excited and I went back through the first chapter where the author introduces the language. I do not know that I will ever be a great Python scripter, but it is fun to know the basics. I spent the next four days playing with some of the examples. I could not do all the examples, for instance the Windows Registry, but I found the networking stuff to be fascinating. I do not personally aspire to become a penetration tester, but for anyone that does, I am confident this is an excellent resource.
    6 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • MisterBG
    5.0 out of 5 stars reçu hier et déj)à conquis
    Reviewed in France on February 28, 2017
    J'ai reçu ce livre hier et m'en suis emparé de suite!
    contenu qui monte rapidement en complexité (tant mieux) et, cela mérite d'être cité, le tout est clairement expliqué.
    Je lis en pratiquant en même temps sur mon ordi pour mieux comprendre et c'est impeccable.

    il y a même un site ou on peut récupérer directement les codes présentés dans le livre, ce qui est un plus pour celui qui ne souhaite pas tout retaper. Personnelement, je préfère retaper car j'apprends mieux en faisant par moi-même (car c'est en faisant des "bêtises" qu'on arrive plus facilement à les identifier et à les éviter par la suite alors que si on se contente de copier/coller le code... l'apprentissage n'est pas aussi bon ;) )
    ce livre complète mes autres bouquins sur python "grey hat python", "black hat python". à mon avis ce livre est supérieur aux deux précédemment cités en terme de pédagogie tout du moins puisqu'ils n'ont pas non plus la même finalité.
    avoir des connaissances (et si possible un peu plus) en Python est selon moi un prérequis sinon, vous risquez de galérer pour aller plus loin que le chapître 1.
    Report
  • Andy
    5.0 out of 5 stars Sehr gut
    Reviewed in Germany on January 27, 2019
    Im Rahmen des Studiums unseres Sohnes mega hilfreich
  • るろうにプログラマ
    5.0 out of 5 stars 俗に言う、ハッキングの教科書
    Reviewed in Japan on October 7, 2014
    所謂世間一般のハッキングの本です。実際にPythonでスクリプトを作成しつつ ネットワーク侵入の手口や トラフィック解析などを取り上げます。
    各章の前半に語られるストーリーも面白く 英語も平易な書き方なので 何を言ってるか分からないという事はないと思います。
    日本にはこういうある意味コンピュータサイエンスを悪用?する手法を解説したものがないため、そういった手口を学ぶにはうってつけだと思います
  • Amazon Customer
    5.0 out of 5 stars great book for starting out in python
    Reviewed in Canada on November 2, 2016
    great book for starting out in python. it gives great examples and information about past use of the scripts. a must for any pen tester
  • Pen Name
    5.0 out of 5 stars Beep boop, i am a robot
    Reviewed in the United Kingdom on December 5, 2015
    Bought this quite a while ago. It explains the basics of python and programming quite nicely, and I feared that the whole book might stick to this basic theme but thankfully it didn't. Having already worked with python for a few years, it feels like this appeals to a range of capabilities.

    In terms of what it teaches you, there is a nice wide range of techniques and tools widely used in pen testing/exploitation with good progress in examples to show how each part of a program is pieced together for the end result.

    In summary, I feel this is great book for anyone(in terms of programming capabilities, but it definitely helps to have some experience) and is nice starter into pen testing/network analysis.