Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Foreword About the Authors About the Technical Editor Acknowledgments Chapter 0. Introduction
Book Overview and Key Learning Points Book Audience How this Book is Organized Conclusion
Chapter 1. Introduction to command shell scripting
Information in this Chapter On Shell Scripting UNIX, Linux, and OS X Shell Scripting Bash Basics Putting It All Together with Bash Windows Scripting PowerShell Basics Putting it all together with PowerShell Summary ENDNOTES
Chapter 2. Introduction to Python
Information in this Chapter What is Python? Where is Python Useful? Python Basics File Manipulation Network Communications Summary ENDNOTES
Chapter 3. Introduction to Perl
Information in this Chapter Where Perl is Useful Working with Perl Perl Basics Putting It All together Summary ENDNOTES
Chapter 4. Introduction to Ruby
Information in this Chapter Where Ruby is Useful Ruby Basics Building Classes with Ruby File Manipulation Database Basics Network Operations Putting It All Together Summary ENDNOTES
Chapter 5. Introduction to Web scripting with PHP
Information in this Chapter Where Web scripting is Useful Getting Started with PHP Handling Forms with PHP File Handling and Command Execution Putting It All Together Summary
Chapter 6. Manipulating Windows with PowerShell
Information in this Chapter Dealing with Execution Policies in PowerShell Penetration Testing uses for PowerShell PowerShell and Metasploit Summary ENDNOTES
Chapter 7. Scanner scripting
Information in this Chapter Working with Scanning Tools Netcat Nmap Nessus/OpenVAS Summary ENDNOTES
Chapter 8. Information gathering
Information in this Chapter Information Gathering for Penetration Testing Talking to Google Web Automation with Perl Working with Metadata Putting It All Together Summary ENDNOTES
Chapter 9. Exploitation scripting
Information in this Chapter Building Exploits with Python Creating Metasploit Exploits Exploiting PHP Scripts Cross-Site Scripting Summary
Chapter 10. Post-exploitation scripting
Information in this Chapter Why Post-Exploitation Is Important Windows Shell Commands Gathering Network Information Scripting Metasploit Meterpreter Database Post-Exploitation Summary
Appendix: Subnetting and CIDR addresses
Netmask Basics
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion