# py-sec-prog **Repository Path**: geekdoc0/py-sec-prog ## Basic Information - **Project Name**: py-sec-prog - **Description**: python 安全编程教程 - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2026-01-05 - **Last Updated**: 2026-01-05 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ## python 安全编程教程 > 原文:[Python Tutorials](http://www.primalsecurity.net/tutorials/python-tutorials/) > > 译者:[smartFlash](https://github.com/smartFlash) > > 来源:[pySecurity](https://github.com/smartFlash/pySecurity) > > 协议:[MIT License](https://github.com/smartFlash/pySecurity/blob/master/LICENSE) ```py ~# python >>> import urllib >>> from bs4 import BeautifulSoup >>> url = urllib.urlopen("http://www.primalsecurity.net") >>> output = BeautifulSoup(url.read(), 'lxml') >>> output.title Primal Security Podcast >>> ``` 这是一套 python 系列教程,学习本套教程不需要你有任何编程背景。教程由最简单的 hello world 到信息安全应用实例。逐个难点击破: 0x0 – [入门](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x0.md) 0x0 – [入门 Pt.2](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x02.md) 0×1 – [端口扫描](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x1.md) 0x2 – [反向 shell](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x2.md) 0x3 – [模糊测试](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x3.md) 0x4 – [Python 转 exe](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x4.md) 0x5 – [Web 请求](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x5.md) 0x6 – [爬虫](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x6.md) 0x7 – [Web 扫描和利用](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x7.md) 0x8 – [Whois 查询](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x8.md) 0x9 – [系统命令调用](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x9.md) 0xA – [Python 版的 Metasploit](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x10.md) 0xB – [伪终端](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x11.md) 0xC – [exp 编写](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0xc.md) 用例 1: [CVE-2014-6271](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x13.md) 用例 2: [CVE-2012-1823](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x14.md) 用例 3: [CVE-2012-3152](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x15.md) 用例 4: [CVE-2014-3704](https://github.com/smartFlash/pySecurity/blob/master/zh-cn/0x16.md)