Skip to content

smartFlash/pySecurity

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

python系列教程(翻译)

~# python
>>> import urllib
>>> from bs4 import BeautifulSoup
>>> url = urllib.urlopen("http://www.primalsecurity.net")
>>> output = BeautifulSoup(url.read(), 'lxml')
>>> output.title
<title>Primal Security Podcast</title>
>>>

这是一套python系列教程,学习本套教程不需要你有任何编程背景。教程由最简单的hello world到信息安全应用实例。逐个难点击破:

0x0 – 入门

0x0 – 入门 Pt.2

0×1 – 端口扫描

0x2 – 反向shell

0x3 – 编写Fuzz测试脚本

0x4 – Python转exe

0x5 – Web请求

0x6 – 爬虫

0x7 – Web扫描和利用

0x8 – Whois查询

0x9 – 系统命令调用

0xA – Python版的Metasploit

0xB – 伪终端

0xC – exp编写

用例1: CVE-2014-6271

用例2: CVE-2012-1823

用例3: CVE-2012-3152

用例4: CVE-2014-3704

原文地址:http://www.primalsecurity.net/tutorials/python-tutorials/

About

Python tutorials

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy