Goodreads helps you keep track of books you want to read.
Start by marking “Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools” as Want to Read:
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools
Enlarge cover
Rate this book
Clear rating
Open Preview

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

3.88  ·  Rating details ·  16 ratings  ·  3 reviews
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.

Following a crash course in C# and some of its advanced features, you'll learn
...more
Paperback, 304 pages
Published June 18th 2017 by No Starch Press
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Gray Hat C#, please sign up.

Be the first to ask a question about Gray Hat C#

Community Reviews

Showing 1-41
Average rating 3.88  · 
Rating details
 ·  16 ratings  ·  3 reviews


More filters
 | 
Sort order
Start your review of Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools
JP
Mar 16, 2019 rated it liked it
Odd book. Not quite what I expected. If you're looking for a reference on how to tie one of the various mentioned tools into a C# project yourself, it will have a potentially useful starter at least. Other than that, the specific sections could use a bit more fleshing out to be useful alone and all together, it's an odd combination.

Structurewise, the first section of the book was odd. Basically a tutorial of C#, but only a limited subset of functionality, chosen oddly. Then a number of web
...more
Brendan
Sep 04, 2017 rated it really liked it
Really helpful book if you are into security testing automation. Assumes quite a bit of knowledge of the security tools you will be automating. Some i've used, others I haven't, so there is a lot of extra reading on the side. I mostly bought this book for the chapter on automating Metasploit as I'm planning on configuring automated tests against our code base at work. I did learn about a bunch of security tools that I had never heard about, which I'm sure some of you might find helpful as well.
Tom
Nov 04, 2019 rated it it was amazing
Excellent book, and an a great way to learn Mono.
Matthew Shinker
rated it liked it
Jan 18, 2019
Richard osbourn
rated it it was amazing
Jan 17, 2018
Steffen Diedrichsen
rated it really liked it
Nov 12, 2018
Subhajit Das
rated it really liked it
Dec 08, 2019
Angel Salinas
rated it liked it
Aug 04, 2019
Brandon
rated it it was amazing
Jun 29, 2019
Nick
rated it it was amazing
Oct 05, 2019
Michael Park
rated it liked it
Jul 26, 2017
Jim Keeler
rated it liked it
Sep 13, 2019
Justino Garcia
rated it really liked it
Mar 18, 2018
James Lee
rated it it was amazing
Oct 27, 2019
Caiho Gabryell
rated it liked it
Dec 02, 2017
Ernest Mallett
rated it liked it
Jul 06, 2018
Tom
added it
Jan 07, 2017
Sam Johnson
marked it as to-read
Jun 19, 2017
Modi123
marked it as to-read
Jun 29, 2017
Isaiah
marked it as to-read
Jul 04, 2017
Huy Le
marked it as to-read
Jul 10, 2017
Kevin
is currently reading it
Jul 14, 2017
Rogelio
marked it as to-read
Dec 18, 2017
Jarvellis
marked it as to-read
Dec 18, 2017
Tom
marked it as to-read
Dec 19, 2017
Ken
marked it as to-read
Dec 19, 2017
Jake
is currently reading it
Dec 19, 2017
Phlorislaitvert
marked it as to-read
Dec 20, 2017
Bimber55
marked it as to-read
Dec 20, 2017
Ray
marked it as to-read
Dec 28, 2017
Coffee  Shop  Snake
marked it as to-read
Jan 11, 2018
Francois Begin
marked it as to-read
Jan 11, 2018
Victor
marked it as to-read
Jan 13, 2018
Rahul Gupta
marked it as to-read
Jan 13, 2018
Matt
marked it as to-read
Feb 03, 2018
Andrzej
marked it as to-read
Mar 08, 2018
Leigh
marked it as to-read
Mar 31, 2018
Maximiliano Gomez Vidal
marked it as to-read
Apr 28, 2018
Mike
marked it as to-read
Jun 17, 2018
Tim
marked it as to-read
Jul 06, 2018
Wissam
marked it as to-read
Jul 18, 2018
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Red Team Field Manual (RTFM)
  • Serious Cryptography: A Practical Introduction to Modern Encryption
  • Windows® Internals, Part 1: Covering Windows Server® 2008 R2 and Windows 7
  • Strategy
  • The Hacker Playbook 2: Practical Guide To Penetration Testing
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • The Strategy of Conflict: With a New Preface by the Author
  • Finnegans Wake
  • The Hacker Playbook 3: Practical Guide To Penetration Testing
  • Blue Team Handbook: Soc, Siem, and Threat Hunting Use Cases: A Condensed Field Guide for the Security Operations Team
  • Attacking Microsoft Azure: A Penetration Tester's Guide
  • Switch: How to Change Things When Change Is Hard
  • The Gray Man (Gray Man, #1)
  • Leviathan Wakes (The Expanse, #1)
  • Longitude: The True Story of a Lone Genius Who Solved the Greatest Scientific Problem of His Time
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »