Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/smartFlash/pySecurity
Python tutorials
https://github.com/smartFlash/pySecurity
Last synced: about 1 month ago
JSON representation
Python tutorials
- Host: GitHub
- URL: https://github.com/smartFlash/pySecurity
- Owner: smartFlash
- License: mit
- Created: 2015-02-08T02:17:22.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2019-11-29T03:13:15.000Z (about 5 years ago)
- Last Synced: 2024-08-03T15:05:26.172Z (4 months ago)
- Language: CSS
- Size: 1.1 MB
- Stars: 663
- Watchers: 61
- Forks: 287
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - smartFlash/pySecurity - Python tutorials (CSS)
README
## python系列教程(翻译)
```python
~# python
>>> import urllib
>>> from bs4 import BeautifulSoup
>>> url = urllib.urlopen("http://www.primalsecurity.net")
>>> output = BeautifulSoup(url.read(), 'lxml')
>>> output.title
Primal Security Podcast
>>>
```这是一套python系列教程,学习本套教程不需要你有任何编程背景。教程由最简单的hello world到信息安全应用实例。逐个难点击破:
0x0 – [入门](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x0.md)
0x0 – [入门 Pt.2](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x02.md)
0×1 – [端口扫描](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x1.md)
0x2 – [反向shell](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x2.md)
0x3 – [编写Fuzz测试脚本](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x3.md)
0x4 – [Python转exe](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x4.md)
0x5 – [Web请求](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x5.md)
0x6 – [爬虫](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x6.md)
0x7 – [Web扫描和利用](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x7.md)
0x8 – [Whois查询](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x8.md)
0x9 – [系统命令调用](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x9.md)
0xA – [Python版的Metasploit](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x10.md)
0xB – [伪终端](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x11.md)
0xC – [exp编写](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0xc.md)
用例1: [CVE-2014-6271](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x13.md)
用例2: [CVE-2012-1823](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x14.md)
用例3: [CVE-2012-3152](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x15.md)
用例4: [CVE-2014-3704](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x16.md)
原文地址:http://www.primalsecurity.net/tutorials/python-tutorials/