Description:Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.Following a crash course in C# and some of its advanced features, you'll learn how to:Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injectionGenerate shellcode in Metasploit to create cross-platform and cross-architecture payloadsAutomate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injectionsWrite a .NET decompiler for Mac and LinuxParse and read offline registry hives to dump system informationAutomate the security tools Arachni and Metasploit using their MSGPACK RPCsStreamline and simplify your work day with Gray Hat C# and C#'s extensive repertoire of powerful tools and libraries.We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools. To get started finding Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools, you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Pages
—
Format
PDF, EPUB & Kindle Edition
Publisher
—
Release
—
ISBN
1593277598
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools
Description: Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.Following a crash course in C# and some of its advanced features, you'll learn how to:Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injectionGenerate shellcode in Metasploit to create cross-platform and cross-architecture payloadsAutomate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injectionsWrite a .NET decompiler for Mac and LinuxParse and read offline registry hives to dump system informationAutomate the security tools Arachni and Metasploit using their MSGPACK RPCsStreamline and simplify your work day with Gray Hat C# and C#'s extensive repertoire of powerful tools and libraries.We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools. To get started finding Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools, you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.