Cyber security is a vast and dynamically growing field. So far in this book, we have discussed various use cases in which Python comes in handy. The reader can utilize this knowledge to explore further scenarios in which Python can be applied in the cyber security domain. In this concluding chapter, we will try to cover a few other ways in which we can use Python. We will look at the following:
- Parsing Nessus and Nmap reports with Python
- Writing custom Linux- and Windows-based keyloggers in Python and sharing logs across the network
- Parsing Tweeter tweets
- Extracting browser-saved passwords
- Antivirus-free persistence shells
- Bypassing host-based firewalls