A deep dive into finding security holes in any software and writing the code (shellcode) to exploit them. How to Use This Index
Automation is what separates the pros from the amateurs. This book teaches you how to write your own network sniffers, Trojans, and post-exploitation tools using Python.
—web apps, network security, or maybe the psychological side of social engineering?