Shop Tiger Mist
Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows.
Buy new:
-11% $30.96
FREE delivery Wednesday, December 17 on orders shipped by Amazon over $35
Ships from: Amazon
Sold by: Tiger Books LLC
$30.96 with 11 percent savings
List Price: $34.95
Get Fast, Free Shipping with Amazon Prime
FREE delivery Wednesday, December 17 on orders shipped by Amazon over $35
Or Prime members get FREE delivery Friday, December 12.
Arrives before Christmas
Only 1 left in stock - order soon.
$$30.96 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$30.96
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon
Amazon
Ships from
Amazon
Returns
FREE refund/replacement until Jan 31, 2026
FREE refund/replacement until Jan 31, 2026
For the 2025 holiday season, eligible items purchased between November 1 and December 31, 2025 can be returned until January 31, 2026.
Read full return policy
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
{{numberOfItems}} item(s) added for {{price}}
$5.30
ALMOST NO WEAR, NO MARKINGS IN THE BOOK, SHIPS PROMPTLY!!! ALMOST NO WEAR, NO MARKINGS IN THE BOOK, SHIPS PROMPTLY!!! See less
$4.92 delivery Friday, December 19. Details
Arrives before Christmas
Only 1 left in stock - order soon.
$$30.96 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$30.96
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Ships from and sold by home of books.
{{numberOfItems}} item(s) added for {{price}}
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Get new release updates & improved recommendations
Something went wrong. Please try your request again later.

Black Hat Python: Python Programming for Hackers and Pentesters 1st Edition

4.6 out of 5 stars (578)

{"desktop_buybox_group_1":[{"displayPrice":"$30.96","priceAmount":30.96,"currencySymbol":"$","integerValue":"30","decimalSeparator":".","fractionalValue":"96","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"RYADSIzi1dnJENfwQAhxxfuv88F%2Fi%2BuZVscPCS7mV0FiGaLmbIBp%2FdWxmcnrd7Dfqx6Sm2ip%2Ft1cpL99bAsXdhyGX1w4aIDWIDqa8YvOjQbxQGJwblpwqPK3eX2PpUqrojJFZcptMzwCpNllEN%2FY7Esv2xFxmkb4MmO5jGDQ3mLBNJYZeuV6D9jhMOGdoNTg","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$5.30","priceAmount":5.30,"currencySymbol":"$","integerValue":"5","decimalSeparator":".","fractionalValue":"30","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"RYADSIzi1dnJENfwQAhxxfuv88F%2Fi%2BuZiiCTN3qpjhwYv%2Boi%2BQn7n%2BYilXv4TmcRizYIhfKaZQWFmveWU%2FXPmzX7NmPKyaE7Ydf23ZLJmfdsmG%2Bgxn22JVNY2bRfFOKTaUJ%2Fc87wZY1qz8FxRHYJsIBPPwNRhtHi4UC3FDPj%2Bg2zS2OzS4JHzw%3D%3D","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:

  • Create a trojan command-and-control using GitHub
  • Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
  • Escalate Windows privileges with creative process control
  • Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
  • Extend the popular Burp Suite web-hacking tool
  • Abuse Windows COM automation to perform a man-in-the-browser attack
  • Exfiltrate data from a network most sneakily
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.

When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.

There is a newer edition of this item:

Frequently bought together

This item: Black Hat Python: Python Programming for Hackers and Pentesters
$30.96
Get it as soon as Saturday, Dec 20
Sold by WorthWhile Reads and ships from Amazon Fulfillment.
+
$27.32
Get it as soon as Monday, Dec 15
In Stock
Ships from and sold by Amazon.com.
+
$35.75
Get it as soon as Tuesday, Dec 16
In Stock
Ships from and sold by Amazon.com.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
Some of these items ship sooner than the others.
Choose items to buy together.

Customers also bought or read

Loading...

From the Publisher

A

Editorial Reviews

Review

"Whether you're interested in becoming a serious hacker/penetration tester or just want to know how they work, this book is one you need to read. Intense, technically sound, and eye-opening."
<—Computerworld

"
Black Hat Python is an excellent way to start by fully investigating how the language can be used for both the light – and dark – sides of hacking."
<—ZDNet

About the Author

Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends his time bug hunting, reverse engineering, writing exploits, and coding Python. He is the author of Gray Hat Python, the first book to cover the use of Python for security analysis.

Product details

  • Publisher ‏ : ‎ No Starch Press
  • Publication date ‏ : ‎ December 14, 2014
  • Edition ‏ : ‎ 1st
  • Language ‏ : ‎ English
  • Print length ‏ : ‎ 192 pages
  • ISBN-10 ‏ : ‎ 1593275900
  • ISBN-13 ‏ : ‎ 978-1593275907
  • Item Weight ‏ : ‎ 15.8 ounces
  • Dimensions ‏ : ‎ 7.06 x 0.57 x 9.25 inches
  • Best Sellers Rank: #630,563 in Books (See Top 100 in Books)
  • Customer Reviews:
    4.6 out of 5 stars (578)

About the author

Follow authors to get new release updates, plus improved recommendations.
Justin Seitz
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read book recommendations and more.

Customer reviews

4.6 out of 5 stars
578 global ratings

Customers say

Customers find the book well-written and easy to follow, with good content quality that gets straight to the point. Moreover, the book serves as a great learning tool, particularly for advanced Python programmers, and customers find it fun to play with. Additionally, the pacing receives positive feedback for its great examples. However, the code functionality receives mixed reviews, with some customers reporting that the code works while others say it doesn't.

22 customers mention "Content quality"18 positive4 negative

Customers appreciate the content of the book, finding it well-documented and easy to follow, with clear explanations of Python programming.

"Good reference, good scripts" Read more

"Good book filled with tons of useful info. My only issue is that a lot of the code does not work...." Read more

"This is a well written book. The content is pertinent and easy to follow." Read more

"...to give this book 5 stars because the author does an excellent job of explaining Python in an informal way...." Read more

14 customers mention "Learning tool"14 positive0 negative

Customers find the book to be a great learning tool, particularly for advanced Python programmers, with one customer noting it teaches how to think like a hacker.

"...after following the steps verbatim, but otherwise a really good and helpful read." Read more

"Great book with some good techniques. Would absolutely recommend to any security researching looking to build their own tools in python" Read more

"...The book was a great learning tool and a lot of fun in exploring python and security issues in general." Read more

"Great for more advance python programers. Not recomended for people new to Python, the book assumes you have extensive knowledge of the language." Read more

11 customers mention "Ease of follow"8 positive3 negative

Customers find the book easy to follow.

"This book provides (among other things) a very complete and easy to follow discussion on packet sniffing in the wild - without the use of other..." Read more

"This is a well written book. The content is pertinent and easy to follow." Read more

"...I gave this one star so that my message will be heard. This book is not for beginners...." Read more

"...This book has been both very easy to follow yet technical enough and full of useful info. Good stuff!" Read more

9 customers mention "Writing quality"9 positive0 negative

Customers appreciate the writing quality of the book, describing it as a well-written manuscript with good scripts.

"This book is well written, and a great way to learn python by building useful tools." Read more

"This is a well written book. The content is pertinent and easy to follow." Read more

"...The material is well written but lacks detail...." Read more

"There's a lot of great scripts in here that show you what Python can do. However, the book is short on explanations...." Read more

8 customers mention "Fun to read"7 positive1 negative

Customers find the book fun to read and play with, with one customer noting it's a great way to start using Python.

"Lots of fun projects in here." Read more

"Interresting book. For me, a web developper and a layman user of security." Read more

"The very interesting contents." Read more

"So far, pretty Interesting ... BUT, one question to the other reviewers ... did you all get the proxy to work on chapter 2?..." Read more

4 customers mention "Looks"4 positive0 negative

Customers like the appearance of the book.

"The book looks perfect. I love it." Read more

"...The program looks great so I still try to correct the dependency issue from time to time but initially I just gave up and continued with the book...." Read more

"Haven't had chance to deep-dive, yet. Looks promising." Read more

"...The cover definitely looks cool, but I'll be reading something that can keep my interest that's more in-depth first." Read more

4 customers mention "Pacing"4 positive0 negative

Customers appreciate the pacing of the book, with one mentioning its very realistic examples.

"Has some great examples and tools in the book. Haven't used them all but am enjoying the book so far." Read more

"Great book with the best examples...." Read more

"very awesome and very realistic examples of when to use different libs" Read more

"...Very clear and concise with reality-based examples. If you are interested in expanding your Python tookit, then this book is for you." Read more

6 customers mention "Code functionality"3 positive3 negative

Customers have mixed experiences with the book's code functionality, with some finding it functional while others report that it does not work.

"All labs worked and led me to more advanced techniques." Read more

"...My only issue is that a lot of the code does not work. I've spent a lot of time making tweaks to get these applications to work correctly...." Read more

"...You'll have some fun to play with and fully functioning tools written by you by the end of chapter 2." Read more

"...On to the second chapter and half the code doesn't work...." Read more

and one of my favorite technical guides of all
5 out of 5 stars
and one of my favorite technical guides of all
Not a comprehensive Python style guide or dictionary. Just a few things that you would want to know how to do specifically for pentesting and post exploitation work. An absolutely phenomenal place for red teamers to start with Python, and one of my favorite technical guides of all time
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

  • Reviewed in the United States on January 20, 2018
    Format: PaperbackVerified Purchase
    Some really, fundamentally good python in this book. It's about really thinking out of the box with python, and as a learning tool, it's fun, as a reference, it's on my shelf. The author knows his OSINT really well, and this is a part of the field, so it is also valuable for those in the field, and those who are curious about the dynamics of network programming, not a "how to commit a felony" book. Sure, an evil guy could make a payload, but really?

    The book was a great learning tool and a lot of fun in exploring python and security issues in general.
    One person found this helpful
    Report
  • Reviewed in the United States on December 15, 2015
    Format: PaperbackVerified Purchase
    Going to give this book 5 stars because the author does an excellent job of explaining Python in an informal way. Easily taking someone from a beginner level to a more advanced level. However I must add that in Chapter 1, it was nowhere near as easy to set up WingIDE as he explained. Now to be fair I was installing on Kali 2.0, but I downloaded the newest versions as well as the exact versions that were in the book. Still with no success. Yes I also tried the dependency command that was given as well as hours of Linux "dependency" posts. The program looks great so I still try to correct the dependency issue from time to time but initially I just gave up and continued with the book. Do not let this deter you. If you are interested in Python development or learning it for pen-testing purposes, then this book should be on your bookshelf.
    10 people found this helpful
    Report
  • Reviewed in the United States on September 13, 2020
    Format: PaperbackVerified Purchase
    I use this as a supplemental text in both my undergraduate systems programming course and in my advanced graduate class in data security. In the undergraduate class it lets the students practice their python and see some of network programming without getting lost in all the structs and pointers of the C language API. (Python neatly wraps the system calls, then once the students are more comfortable with C we look at those). In the advanced class, seeing how tools like nmap, netcat, and wget can be emulated with a python program is very informative. Especially when we use it to get around software installation restrictions imposed by the i****ts at the university.
    One person found this helpful
    Report
  • Reviewed in the United States on October 7, 2015
    Format: PaperbackVerified Purchase
    This is a well written book. The content is pertinent and easy to follow.
    One person found this helpful
    Report
  • Reviewed in the United States on March 29, 2015
    Format: PaperbackVerified Purchase
    Coming from more of a network and security generalist's background I found this book to be very informative and direct to the point depending on what you are trying to accomplish at what stage of your attack. I did find that you have to follow the precise instructions in chapter 1 - setting up your enviornment, for most of the code to work. Python has changed quite a bit from version 2 and you have to pay attention while attempting to write and use the code. Don't skip chapter 1.

    What I found very useful was the socket programming and client/server/netcat examples found early on in the book. The examples get more complex quckly after chapter 2 but Justin does a great job at notating the relevant sections and walking the reader through it carefully. Great reference book to keep by your side.
    6 people found this helpful
    Report
  • Reviewed in the United States on December 24, 2016
    Format: PaperbackVerified Purchase
    I have finally read this book - in one sitting - a lot of good information that gives a good sense of how TCP/UDP/SSH etc works. Good examples with tools, the only thing is that this was written for python 2.7 I believe, so I had to google some of the library imports because of name changes
    2 people found this helpful
    Report
  • Reviewed in the United States on September 13, 2016
    Great book with the best examples. You should brush up on your Python first as this book does expect some understanding of Python beforehand, however, Python being the easy language that it is to learn, this shouldn't be a difficult task to complete.
  • Reviewed in the United States on December 19, 2017
    Format: PaperbackVerified Purchase
    While I applaud the authors enthusiasm for the subject matter, and the method to why you learn on python2.7 (that part want actually explained, but it makes sebse) the editing in this book is pretty terrible. On to the second chapter and half the code doesn't work. You end up spending a significant amount of time debugging or finding similar examples that work on the web.

    Fortunately, the author does have an online link to all the code, however, that link is located in the preface.

    I am a proponent of typing things out manually to learn them, sure. But after you type something out and it doesn't work because the author put it in the book wrong... well, it is disheartening. My suggestion is to use the code online and just follow along in the book.
    11 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • Greame
    5.0 out of 5 stars Black Hat Python is a really fascinating book for security-minded ...
    Reviewed in the United Kingdom on April 5, 2015
    Format: PaperbackVerified Purchase
    Black Hat Python is a really fascinating book for security-minded python programmers. It comes with plenty of code examples, which are clearly explained. It's worth noting that the code is Python 2.x however, so if (like me) you're more familiar with Python 3.x, some of the examples will need to be modified before they'll run, and you may have a harder time ferreting out some of the libraries mentioned.
  • Amazon Kunde
    5.0 out of 5 stars Nice done!
    Reviewed in Germany on January 12, 2018
    Format: PaperbackVerified Purchase
    It is a great book for all levels - you don’t get bored if you already know python but it’s easy enough to beginners. It’s interesting for pentesters as it gives new ideas and tools.
    Report
  • Alessandro
    5.0 out of 5 stars notevole davvero
    Reviewed in Italy on August 8, 2015
    Format: PaperbackVerified Purchase
    posso trovare un'unica piccola pecca: e' scritto in py 2.7Ma non e' davvero importante: codice chiarissimo, ben spiegato e comprensibilissimo: tradurlo al 3.4 e' assai facile. Di piu': a me non interessa davvero l'haching di rete, ma la gestione dei protocolli di rete si. E questo libro e' il migliore, che usi python, che abbia letto al riguardo. Da consigliare anche a chi abbia solo le conoscenze di base della programmazione in generale e di python in particolare.

    Davvero.
  • Ernesto Guevara Gonzaga
    5.0 out of 5 stars Buen libro
    Reviewed in Mexico on April 23, 2019
    Format: PaperbackVerified Purchase
    Un buen inicio en python y hacking
  • Bort
    5.0 out of 5 stars Imprescindible para iniciarse.
    Reviewed in Spain on January 2, 2021
    Format: PaperbackVerified Purchase
    OJO que la mayoria de ejemplos son con python 2.7 . Es un libro muy bueno siempre que se tenga eso en cuenta.