Violent Python and over 2 million other books are available for Amazon Kindle . Learn more

Sign in to turn on 1-Click ordering.
Trade in Yours
For a 9.41 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Start reading Violent Python on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Violent Python [Paperback]

TJ O'Connor
4.7 out of 5 stars  See all reviews (14 customer reviews)
RRP: 30.99
Price: 21.07 & FREE Delivery in the UK. Details
You Save: 9.92 (32%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
In stock.
Dispatched from and sold by Amazon. Gift-wrap available.
Want it tomorrow, 23 July? Choose Express delivery at checkout. Details


Amazon Price New from Used from
Kindle Edition 19.15  
Paperback 21.07  
Trade In this Item for up to 9.41
Trade in Violent Python for an Amazon Gift Card of up to 9.41, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Book Description

3 Dec 2012 1597499579 978-1597499576
"Violent Python" shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

Frequently Bought Together

Violent Python + The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy + Metasploit: The Penetration Tester's Guide
Price For All Three: 66.48

Buy the selected items together

Product details

  • Paperback: 352 pages
  • Publisher: Syngress (3 Dec 2012)
  • Language: English
  • ISBN-10: 1597499579
  • ISBN-13: 978-1597499576
  • Product Dimensions: 2 x 19.1 x 23.5 cm
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (14 customer reviews)
  • Amazon Bestsellers Rank: 8,582 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, and more.

Product Description


"An information security specialist with the US Army, O'Connor introduces the hacker's programming language Python to new users, and describes some advanced features to those who already know it."--Reference and Research Book News, August 2013 "A quick glance at [the authors] collective credentials and experience undoubtedly creates high expectations for this title. The end result is that the book demonstrates how powerful just a few dozen lines of Python code can be. useful tips and tricks will surely be acquired simply by working through the exercises."--The Ethical Hacker Network, February 27, 2013 "Violent Python is an excellent resource that develops and enhances a diverse set of security-related Python skills. The book also serves as a great reference, where recipes could be quickly implemented to address specific issues as they arise. Readers who are actively working in an InfoSec position will likely be able to put their newly acquired skills to use immediately, and those looking to break into the field will acquire skills that differentiate themselves from others who are dependent on prebuilt tools. This title is highly recommended for anyone who wants to improve his or her Python skills within the InfoSec realm."--The Ethical Hacker Network, February 27, 2013 "When it comes to Python and penetration testing, TJ O'Connor is the grand Python master. This is the book that keeps on giving. From building penetration testing Python scripts, to antivirus-evading penetration testing malware, to interrogating the Windows Registry and investigating other forensic artifacts...O'Connor masterfully walks the reader from basic to advanced penetration testing techniques with sample code throughout."--Ove Carroll, SANS Certified Instructor, Co-Author of SANS Forensics 408 - Windows In Depth "Violent Python is chalked full of practical examples and is for all security professionals. It covers the spectrum - knowledge for pen testers to forensic analysts, beginner to advanced and offensive to defensive tasks. If you are involved in information security and are looking for a Python book, this is an excellent source."--James Shewmaker, Security Analyst, Bluenotch Corporation "The best hackers know when to write their own tools. Violent Python is a very relevant collection of examples to seed your personal hacking toolbox. From offensive actions to digital forensics, this book has useful bits for everyone."--Raphael Mudge, Creator of Armitage

About the Author

TJ O'Connor is a Department of Defense expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency's annual Cyber Defense Exercise and won the National Defense University's first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition. TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USENIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians. TJ O'Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USENIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defense exercises, including winning the National Defense University Cyber Challenge, coaching the winning team at the National Security Agency's Cyber Defense Exercise and working as a red team member of the Northeast Regional Collegiate Cyber Defense Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

4.7 out of 5 stars
4.7 out of 5 stars
Most Helpful Customer Reviews
8 of 8 people found the following review helpful
5.0 out of 5 stars Worth every penny! 4 July 2013
By Andy
Format:Paperback|Verified Purchase
I decided to buy this book and use it's python examples to learn the language in a fun/useful way. having read quite a lot of books on the subject I must say that the author has done a great work with this book. Every chapter is based on some historical event (in digital security) which you'll then recreate in an easy step by step guide. In this way every script you make has a context. You have a reason for writing the script. You'll both write defensive tools, which can prevent or trace an attack, but you'll also laucnh some attacks yourself. There's even a chapter on forensics where you'll learn how to get hold of all the data stored by Skype, Firefox and Itunes(Iphone).

Reading this book will give you a better understanding on IT security and the Python language, but more advanced readers/nerds may not find the book as useful as a newbie . Highly recommended as an introduction to Python and IT security .
Was this review helpful to you?
2 of 2 people found the following review helpful
5.0 out of 5 stars Great and inspirational! 22 Mar 2014
I've read this book from front to back about three times, and this has to be one of the best books, I've ever read about Python and hacking.
The author is very informative, straight to the point and shares some great stories.
I'm a rookie when it comes to python. I always thought that python has a huge potential as a "hackers programming language" and this books really shows why python is an awesome programming/scripting language. This book rekindled my passion to learn how to make my own tools.
Some of the exploits are old tricks, but it's hard to keep up with the hacking scene. But I have to say I actually use some of the programs that are taught/made in this book.
If you like Python and hacking, buy this book.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
Format:Paperback|Verified Purchase
I give this book 3 stars for introducing me to Metasploit and some interesting Python libraries, but withhold 2 stars for being riddled with mistakes in both the text and the code. I really hope nobody is using the horrible examples in this book to learn Python. It's also too expensive for what it is.
Was this review helpful to you?
2 of 2 people found the following review helpful
5.0 out of 5 stars Great practical examples 2 Aug 2013
Format:Paperback|Verified Purchase
Good use of python and shows the flexibility by using lower-level interfaces to gather the data and then being able to manipulate the data. The examples are great to either take directly or to use for your own code. Good explanations of the source code too.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
Format:Paperback|Verified Purchase
This book really got my imagination going, the Author is very knowledgeable. You should put this book on your reading.

However, I have a few criticisms:

Code examples are messy. It does not take much to follow standard naming conventions using PEP 8. I understand this is not a Python ‘how to’ book, but following some basic rules wouldn't have detracted from the simplicity, if anything, it would assists it!

The Author does offer code downloads which is good, however the code formatting in the book makes it very hard to follow along if you are typing it out.

Last, I was hoping for some examples using Tor and Python, I think this would have fitted in very well.

In summary, you don’t have to be a Python developer to get a lot out of this book! It reads well and has nice 'real life' stories with examples, but I would not recommend this book if you are trying to actually learn Python.
Comment | 
Was this review helpful to you?
5 of 6 people found the following review helpful
5.0 out of 5 stars well thought through and well written 30 May 2013
Format:Paperback|Verified Purchase
The user will need some basic python knowledge before they use this book but I would imagine they could work through the python manual at the same time as reading this.

I really like this book, ok some parts can be described as introductory but they inform the reader enough so that they can go out and apply what they have learned.

If you are looking for a set of scripts you can use out of the box this book will satisfy you, however if you are looking for good ideas that you can pick up and run with this book has lots of them.

I really enjoyed this book as it reminded me of simple scripts I wrote years ago and provided the basis for some quite intelligent scripts I have written since.

This was well worth the money.
Comment | 
Was this review helpful to you?
3 of 4 people found the following review helpful
5.0 out of 5 stars Excellent !! 29 Aug 2013
By **
Format:Paperback|Verified Purchase
Good way to get to know Python and what you can do with it. Easy to follow with good explanations. Yeah - Excellent
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category