PYTHON PROGRAMMING LANGUAGE IN CYBERSECURITY
Authors: George Sulava, Luka Gurgenadze, Saba Tsirekidze, Giorgi Akhalaia
Affiliation: University of Young Penetration Testers, Ilia State University
Category:
Keywords: Cybersecurity, Python, Automation, Malware Analysis, SIEM Integration, Security Tools
ABSTRACT. Cybersecurity is gaining increasing importance in the digital age. To mitigate growing technological threats, it is essential to employ flexible and multifunctional programming languages that can support both defensive and offensive security tools. This article explores the role of the Python programming language in cybersecurity, analyzing its use across both defensive and offensive dimensions. It highlights how Python is applied for log analysis, process automation, honeypot management, integration with SIEM systems, and fuzz testing. The paper further examines offensive techniques such as reconnaissance, exploitation, phishing, malware development, and post-exploitation. Emphasis is placed on the versatility of Python libraries, which provide practical advantages for cybersecurity professionals. Python’s simplicity, adaptability, and significant role in threat intelligence, red teaming, and the automation of security tools are discussed, alongside its current limitations and challenges.
References:
Guzzi, P. H. 2019. "Computing Languages for Bioinformatics: Python." In *Encyclopedia of Bioinformatics and Computational Biology*, 195–198. Elsevier. https://doi.org/10.1016/B978-0-12-809633-8.20366-X.
Krishna, N. 2023. *Python for Cybersecurity Cookbook: 80+ Practical Recipes for Detecting, Defending, and Responding to Cyber Threats*. BPB Publications
Poston, H. E. 2022. *Python for Cybersecurity: Using Python for Cyber Offense and Defense*. Wiley.
Van Rossum, G., and F. L. Drake. 2011. *The Python Language Reference Manual: For Python Version 3.2*. Rev. and updated ed. Network Theory Ltd
Rayhan, A., R. Kinzler, and R. Rayhan. 2023. *Cybersecurity Best Practices for Python Web Applications*. https://doi.org/10.13140/RG.2.2.29658.11202
Biondi, P. 2017. *Scapy Documentation*. https://scapy.readthedocs.io/en/latest/
SecureAuth. 2022. "Impacket Documentation." Retrieved from online post
Sinha, S. 2017. *Beginning Ethical Hacking with Python*. Apress. https://doi.org/10.1007/978-1-4842-2541-7
Vineesh, C., and S. Nehemiah. 2021. "A Review on Using Python as a Preferred Programming Language for Beginners." *International Research Journal of Engineering and Technology (IRJET)* 8 (8)
Harshita, S., and S. Ravindra. 2018. "Python: An Appropriate Language for Real World Programming." *IRE Journals* 1 (9).
Pham, V., N. Kim, E. Seo, J. S. Ha, and T.-M. Chung. 2019. "A Method to Enhance the Security Capability of Python IDE." In *Future Data and Security Engineering*, edited by T. K. Dang, J. Küng, M. Takizawa, and S. H. Bui, Vol. 11814, 399–410. Springer International Publishing. https://doi.org/10.1007/978-3-030-35653-8_27
Menu