// Comparison

Black Hat Bash vs Black Hat Python: Which Should You Read?

Two cybersecurity books on Offensive, compared honestly: who each is for, what each does best, and which to read first.

Intermediate
4/52024
Black Hat Bash

Creative Scripting for Hackers and Pentesters

Nick Aleks, Dolev Farhi

Nick Aleks and Dolev Farhi on getting offensive work done with the shell: privilege escalation tooling, lateral movement, and pipelining bash with the rest of the toolkit.

Intermediate
4/52021
Black Hat Python

Python Programming for Hackers and Pentesters

Justin Seitz, Tim Arnold

Justin Seitz and Tim Arnold's hands-on tour of writing offensive tooling in Python: network sniffers, web scrapers, GitHub-based command-and-control, screen capture, keylogging, and Volatility extensions.

Read this if

Pentesters and red teamers who land on a Linux box and need to do offensive work with whatever bash is already there. The book covers privilege escalation, lateral movement, log tampering, and the practical recipes that bash actually shines at.
Working pentesters and red teamers who want to stop fighting other people's tools and start writing their own. The book that turns Python from a scripting language into an offensive multitool.

Skip this if

Beginners with no shell-scripting fluency, or readers who only work on Windows. The book assumes you can write a basic for-loop and an if-conditional; the value is in the offensive idioms.
Beginners with no Python experience, or readers wanting a structured CS curriculum. Seitz and Arnold assume you can already program; the value is in offensive idioms, not language fundamentals.

Key takeaways

  • Most offensive bash is data plumbing: enumerate, parse, pivot, exfiltrate. The book's framing makes the workflow explicit instead of magic.
  • Living-off-the-land on Linux is a real strategy; bash + awk + sed + curl is often more reliable than dropping a custom binary on a hardened target.
  • The chapters on log tampering, persistence via cron / systemd, and privilege escalation chains are the practical core for any operator who finishes a foothold and needs to keep moving.
  • Most operational tools you use can be replaced by ~50 lines of Python that do exactly what you need; the book is a series of working examples of that thesis.
  • The networking, web-scraping and process-injection chapters individually pay back the cost of the book once you've used the patterns three times.
  • The 2nd edition (Python 3, modern libraries) is the one to buy; the first edition's Python 2 code is dated.

How they compare

Black Hat Bash and Black Hat Python are both rated 4/5 in our catalog. Pick by topic preference and reading style rather than by rating.

Both books target intermediate-level readers, so the choice is about topic, not difficulty.

Black Hat Bash and Black Hat Python both cover Offensive, Tooling, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics