Buy new:
-11% $30.96$30.96
FREE delivery Wednesday, December 17 on orders shipped by Amazon over $35
Ships from: Amazon Sold by: Tiger Books LLC
Save with Used - Very Good
$5.30$5.30
$4.92 delivery Friday, December 19
Ships from: home of books Sold by: home of books
Add work books and access codes to your order
Sorry, there was a problem.
There was an error retrieving your Wish Lists. Please try again.Sorry, there was a problem.
List unavailable.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the author
OK
Black Hat Python: Python Programming for Hackers and Pentesters 1st Edition
Purchase options and add-ons
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:
- Create a trojan command-and-control using GitHub
- Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
- Escalate Windows privileges with creative process control
- Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
- Extend the popular Burp Suite web-hacking tool
- Abuse Windows COM automation to perform a man-in-the-browser attack
- Exfiltrate data from a network most sneakily
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.
- ISBN-101593275900
- ISBN-13978-1593275907
- Edition1st
- PublisherNo Starch Press
- Publication dateDecember 14, 2014
- LanguageEnglish
- Dimensions7.06 x 0.57 x 9.25 inches
- Print length192 pages
There is a newer edition of this item:
Frequently bought together

What do customers buy after viewing this item?
Lowest Price
in this set of products
Penetration Testing: A Hands-On Introduction to HackingPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Monday, Dec 15Most purchased | Highest rated
in this set of products
Python Crash Course, 3rd Edition: A Hands-On, Project-Based Introduction to ProgrammingPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Monday, Dec 15
Black Hat Python, 2nd Edition: Python Programming for Hackers and PentestersPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Monday, Dec 15
Hacking: The Art of Exploitation, 2nd EditionPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Monday, Dec 15
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security EngineersPaperback$3.99 shippingGet it Dec 16 - 18Only 1 left in stock - order soon.
Linux Basics for Hackers, 2nd Edition: Getting Started with Networking, Scripting, and Security in KaliPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Monday, Dec 15
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in KaliPaperbackFREE Shipping by AmazonGet it as soon as Tuesday, Dec 16
Black Hat Bash: Creative Scripting for Hackers and PentestersPaperbackFREE Shipping by AmazonGet it as soon as Monday, Dec 15
The Web Application Hacker's Handbook: Finding and Exploiting Security FlawsPaperbackFREE Shipping by AmazonGet it as soon as Monday, Dec 15
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurityPaperbackFREE Shipping by AmazonGet it as soon as Monday, Dec 15
Customers also bought or read
- Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
Paperback$27.32$27.32Delivery Monday - Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Paperback$29.81$29.81$3.99 delivery Thu, Dec 18 - The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Paperback$36.47$36.47FREE delivery Monday - Python Crash Course, 3rd Edition: A Hands-On, Project-Based Introduction to Programming#1 Best SellerIntroductory & Beginning Programming
Paperback$27.53$27.53Delivery Monday - Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities
Paperback$33.80$33.80Delivery Monday - Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Paperback$43.25$43.25FREE delivery Monday - Network Basics for Hackers: How Networks Work and How They Break
Paperback$36.41$36.41FREE delivery Monday - The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Paperback$8.99$8.99Delivery Monday - Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Paperback$35.00$35.00FREE delivery Mon, Jan 5 - Ghost in the Wires: My Adventures as the World's Most Wanted Hacker#1 Best SellerComputer Hacking
Paperback$16.99$16.99Delivery Monday - The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting
Paperback$35.33$35.33FREE delivery Monday - Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!
Paperback$39.99$39.99FREE delivery Monday - Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
Paperback$27.00$27.00Delivery Sun, Dec 28 - Python Crash Course, 2nd Edition: A Hands-On, Project-Based Introduction to Programming
Paperback$32.00$32.00Delivery Tue, Jan 6 - How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK (Hacking the planet)
Paperback$16.99$16.99Delivery Monday - Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Paperback$38.67$38.67FREE delivery Monday
From the Publisher
Editorial Reviews
Review
<—Computerworld
"Black Hat Python is an excellent way to start by fully investigating how the language can be used for both the light – and dark – sides of hacking."
<—ZDNet
About the Author
Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends his time bug hunting, reverse engineering, writing exploits, and coding Python. He is the author of Gray Hat Python, the first book to cover the use of Python for security analysis.
Product details
- Publisher : No Starch Press
- Publication date : December 14, 2014
- Edition : 1st
- Language : English
- Print length : 192 pages
- ISBN-10 : 1593275900
- ISBN-13 : 978-1593275907
- Item Weight : 15.8 ounces
- Dimensions : 7.06 x 0.57 x 9.25 inches
- Best Sellers Rank: #630,563 in Books (See Top 100 in Books)
- #271 in Computer Hacking
- #369 in Computer Network Security
- #423 in Python Programming
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book well-written and easy to follow, with good content quality that gets straight to the point. Moreover, the book serves as a great learning tool, particularly for advanced Python programmers, and customers find it fun to play with. Additionally, the pacing receives positive feedback for its great examples. However, the code functionality receives mixed reviews, with some customers reporting that the code works while others say it doesn't.
AI Generated from the text of customer reviews
Customers appreciate the content of the book, finding it well-documented and easy to follow, with clear explanations of Python programming.
"Good reference, good scripts" Read more
"Good book filled with tons of useful info. My only issue is that a lot of the code does not work...." Read more
"This is a well written book. The content is pertinent and easy to follow." Read more
"...to give this book 5 stars because the author does an excellent job of explaining Python in an informal way...." Read more
Customers find the book to be a great learning tool, particularly for advanced Python programmers, with one customer noting it teaches how to think like a hacker.
"...after following the steps verbatim, but otherwise a really good and helpful read." Read more
"Great book with some good techniques. Would absolutely recommend to any security researching looking to build their own tools in python" Read more
"...The book was a great learning tool and a lot of fun in exploring python and security issues in general." Read more
"Great for more advance python programers. Not recomended for people new to Python, the book assumes you have extensive knowledge of the language." Read more
Customers find the book easy to follow.
"This book provides (among other things) a very complete and easy to follow discussion on packet sniffing in the wild - without the use of other..." Read more
"This is a well written book. The content is pertinent and easy to follow." Read more
"...I gave this one star so that my message will be heard. This book is not for beginners...." Read more
"...This book has been both very easy to follow yet technical enough and full of useful info. Good stuff!" Read more
Customers appreciate the writing quality of the book, describing it as a well-written manuscript with good scripts.
"This book is well written, and a great way to learn python by building useful tools." Read more
"This is a well written book. The content is pertinent and easy to follow." Read more
"...The material is well written but lacks detail...." Read more
"There's a lot of great scripts in here that show you what Python can do. However, the book is short on explanations...." Read more
Customers find the book fun to read and play with, with one customer noting it's a great way to start using Python.
"Lots of fun projects in here." Read more
"Interresting book. For me, a web developper and a layman user of security." Read more
"The very interesting contents." Read more
"So far, pretty Interesting ... BUT, one question to the other reviewers ... did you all get the proxy to work on chapter 2?..." Read more
Customers like the appearance of the book.
"The book looks perfect. I love it." Read more
"...The program looks great so I still try to correct the dependency issue from time to time but initially I just gave up and continued with the book...." Read more
"Haven't had chance to deep-dive, yet. Looks promising." Read more
"...The cover definitely looks cool, but I'll be reading something that can keep my interest that's more in-depth first." Read more
Customers appreciate the pacing of the book, with one mentioning its very realistic examples.
"Has some great examples and tools in the book. Haven't used them all but am enjoying the book so far." Read more
"Great book with the best examples...." Read more
"very awesome and very realistic examples of when to use different libs" Read more
"...Very clear and concise with reality-based examples. If you are interested in expanding your Python tookit, then this book is for you." Read more
Customers have mixed experiences with the book's code functionality, with some finding it functional while others report that it does not work.
"All labs worked and led me to more advanced techniques." Read more
"...My only issue is that a lot of the code does not work. I've spent a lot of time making tweaks to get these applications to work correctly...." Read more
"...You'll have some fun to play with and fully functioning tools written by you by the end of chapter 2." Read more
"...On to the second chapter and half the code doesn't work...." Read more
Reviews with images
and one of my favorite technical guides of all
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on January 20, 2018Format: PaperbackVerified PurchaseSome really, fundamentally good python in this book. It's about really thinking out of the box with python, and as a learning tool, it's fun, as a reference, it's on my shelf. The author knows his OSINT really well, and this is a part of the field, so it is also valuable for those in the field, and those who are curious about the dynamics of network programming, not a "how to commit a felony" book. Sure, an evil guy could make a payload, but really?
The book was a great learning tool and a lot of fun in exploring python and security issues in general.
- Reviewed in the United States on December 15, 2015Format: PaperbackVerified PurchaseGoing to give this book 5 stars because the author does an excellent job of explaining Python in an informal way. Easily taking someone from a beginner level to a more advanced level. However I must add that in Chapter 1, it was nowhere near as easy to set up WingIDE as he explained. Now to be fair I was installing on Kali 2.0, but I downloaded the newest versions as well as the exact versions that were in the book. Still with no success. Yes I also tried the dependency command that was given as well as hours of Linux "dependency" posts. The program looks great so I still try to correct the dependency issue from time to time but initially I just gave up and continued with the book. Do not let this deter you. If you are interested in Python development or learning it for pen-testing purposes, then this book should be on your bookshelf.
- Reviewed in the United States on September 13, 2020Format: PaperbackVerified PurchaseI use this as a supplemental text in both my undergraduate systems programming course and in my advanced graduate class in data security. In the undergraduate class it lets the students practice their python and see some of network programming without getting lost in all the structs and pointers of the C language API. (Python neatly wraps the system calls, then once the students are more comfortable with C we look at those). In the advanced class, seeing how tools like nmap, netcat, and wget can be emulated with a python program is very informative. Especially when we use it to get around software installation restrictions imposed by the i****ts at the university.
- Reviewed in the United States on October 7, 2015Format: PaperbackVerified PurchaseThis is a well written book. The content is pertinent and easy to follow.
- Reviewed in the United States on March 29, 2015Format: PaperbackVerified PurchaseComing from more of a network and security generalist's background I found this book to be very informative and direct to the point depending on what you are trying to accomplish at what stage of your attack. I did find that you have to follow the precise instructions in chapter 1 - setting up your enviornment, for most of the code to work. Python has changed quite a bit from version 2 and you have to pay attention while attempting to write and use the code. Don't skip chapter 1.
What I found very useful was the socket programming and client/server/netcat examples found early on in the book. The examples get more complex quckly after chapter 2 but Justin does a great job at notating the relevant sections and walking the reader through it carefully. Great reference book to keep by your side.
- Reviewed in the United States on December 24, 2016Format: PaperbackVerified PurchaseI have finally read this book - in one sitting - a lot of good information that gives a good sense of how TCP/UDP/SSH etc works. Good examples with tools, the only thing is that this was written for python 2.7 I believe, so I had to google some of the library imports because of name changes
- Reviewed in the United States on September 13, 2016Great book with the best examples. You should brush up on your Python first as this book does expect some understanding of Python beforehand, however, Python being the easy language that it is to learn, this shouldn't be a difficult task to complete.
- Reviewed in the United States on December 19, 2017Format: PaperbackVerified PurchaseWhile I applaud the authors enthusiasm for the subject matter, and the method to why you learn on python2.7 (that part want actually explained, but it makes sebse) the editing in this book is pretty terrible. On to the second chapter and half the code doesn't work. You end up spending a significant amount of time debugging or finding similar examples that work on the web.
Fortunately, the author does have an online link to all the code, however, that link is located in the preface.
I am a proponent of typing things out manually to learn them, sure. But after you type something out and it doesn't work because the author put it in the book wrong... well, it is disheartening. My suggestion is to use the code online and just follow along in the book.
Top reviews from other countries
GreameReviewed in the United Kingdom on April 5, 20155.0 out of 5 stars Black Hat Python is a really fascinating book for security-minded ...
Format: PaperbackVerified PurchaseBlack Hat Python is a really fascinating book for security-minded python programmers. It comes with plenty of code examples, which are clearly explained. It's worth noting that the code is Python 2.x however, so if (like me) you're more familiar with Python 3.x, some of the examples will need to be modified before they'll run, and you may have a harder time ferreting out some of the libraries mentioned.
-
Amazon KundeReviewed in Germany on January 12, 20185.0 out of 5 stars Nice done!
Format: PaperbackVerified PurchaseIt is a great book for all levels - you don’t get bored if you already know python but it’s easy enough to beginners. It’s interesting for pentesters as it gives new ideas and tools.
-
AlessandroReviewed in Italy on August 8, 20155.0 out of 5 stars notevole davvero
Format: PaperbackVerified Purchaseposso trovare un'unica piccola pecca: e' scritto in py 2.7Ma non e' davvero importante: codice chiarissimo, ben spiegato e comprensibilissimo: tradurlo al 3.4 e' assai facile. Di piu': a me non interessa davvero l'haching di rete, ma la gestione dei protocolli di rete si. E questo libro e' il migliore, che usi python, che abbia letto al riguardo. Da consigliare anche a chi abbia solo le conoscenze di base della programmazione in generale e di python in particolare.
Davvero.
-
Ernesto Guevara GonzagaReviewed in Mexico on April 23, 20195.0 out of 5 stars Buen libro
Format: PaperbackVerified PurchaseUn buen inicio en python y hacking
-
BortReviewed in Spain on January 2, 20215.0 out of 5 stars Imprescindible para iniciarse.
Format: PaperbackVerified PurchaseOJO que la mayoria de ejemplos son con python 2.7 . Es un libro muy bueno siempre que se tenga eso en cuenta.

















![Computer Networking Bible: [3 in 1] The Complete Crash Course to Effectively Design, Implement and Manage Networks. Including Sections on Security, Performance and Scalability](/api/flow.js?q=https%3A%2F%2Fm.media-amazon.com%2Fimages%2FI%2F41H4YJnxKgL._AC_SR100%2C100_QL65_.jpg)


