×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Python Hacking for Cybersecurity Professionals
Introduction to Python for ethical hacking!
video1 - (Introduction - Welcome to Python For Ethical Hacking!) (5:16)
video2 - (Introduction - VirtualBox 6.0.4 Installation) (11:41)
video3 - (Introduction - Kali Linux 2019.1a Installation) (17:07)
video4 - (Introduction - Guest Additions Installation) (15:08)
video5 - (Introduction - Python In Kali Terminal) (13:33)
Port and vulnerability scanning
video6 - (Port And Vulnerability Scanning - Making Simple Portscanner) (15:33)
video7 - (Port and Vulnerability Scanning - Adding Raw_input To Our Portscanner) (9:24)
video8 - (Port and Vulnerability Scanning - Scanning First 1000 Ports) (4:47)
video9 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 1) (13:13)
video10 - (Port and Vulnerability Scanning - Coding Advance Portscanner Part 2) (8:51)
video11 - (Port and Vulnerability Scanning - Finishing And Testing Advance Portscanner) (9:00)
video12 - (Port and Vulnerability Scanning - Configuring IP Address And Installing Metasploitable) (8:14)
video13 - (Port and Vulnerability Scanning - Returning Banner From Open Port) (14:46)
video14 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 1) (11:57)
video15 - (Port and Vulnerability Scanning - Coding Vulnerability Scanner Part 2) (7:21)
SSH & FTP attacks
video16 - (SSH & FTP Attacks - Automating SSH Login Part 1) (9:55)
video17 - (SSH & FTP Attacks - Automating SSH Login Part 2) (9:21)
video18 - (SSH & FTP Attacks - Testing SSH Login Program) (8:37)
video19 - (SSH & FTP Attacks - Coding SSH Bruteforcer) (10:38)
video20 - (SSH & FTP Attacks - Executing Command On Target After Bruteforcing SSH) (10:11)
video21 - (SSH & FTP Attacks - Anonymus FTP Login Attack) (9:55)
video22 - (SSH & FTP Attacks - Username & Passwordlist Attack on FTP) (17:32)
Password Cracking
video23 - (Password Cracking - SHA256, SHA512, MD5 ...) (8:37)
video24 - (Password Cracking - Cracking SHA1 Hash With Online Dictionary) (16:41)
video26 - (Password Cracking - Cracking Crypt Password With Salt) (24:02)
video25 - (Password Cracking - Getting Password From MD5 Hash) (13:26)
Sniffers, Flooders, and Spoofers
video27 - (Sniffers, Flooders, Spoofers ... - Chaning MAC Address Manualy) (8:35)
video28 - (Sniffers, Flooders, Spoofers ... - Coding MAC Changer) (17:00)
video29 - (Sniffers, Flooders, Spoofers ... - Theory Behind ARP Spoofing) (4:43)
video30 - (Sniffers, Flooders, Spoofers ... - Crafting Malicious ARP Packet) (19:28)
video31 - (Sniffers, Flooders, Spoofers ... - Coding ARP Spoofer) (13:33)
video32 - (Sniffers, Flooders, Spoofers ... - Forwarding Packets And Restoring ARP Tables) (8:07)
video33 - (Sniffers, Flooders, Spoofers ... - Spoofing Our IP Address And Sending Message With TCP Payload) (12:02)
video34 - (Sniffers, Flooders, Spoofers ... - Running SynFlooder With Changed Source IP Address) (11:22)
video35 - (Sniffers, Flooders, Spoofers ... - Getting Source And Destination MAC Address From Received Packets) (24:46)
video36 - (Sniffers, Flooders, Spoofers ... - Sniffing FTP Username And Password Part1) (8:12)
video37 - (Sniffers, Flooders, Spoofers ... - Sniffing FTP Username And Password Part2) (12:12)
video38 - (Sniffers, Flooders, Spoofers ... - Getting Passwords From HTTP Websites) (14:04)
Coding DNS spoofer
video39 - (Coding Dnsspoofer - Cloning Any Webpage) (10:37)
video40 - (Coding Dnsspoofer - Printing DNS Queries) (10:01)
video41 - (Coding Dnsspoofer - Redirecting Response To Cloned Page) (16:48)
video42 - (Coding Dnsspoofer - Setting IP Table Rules and Running DnsSpoofer) (10:40)
Network Analysis
video43 - (Network Analysis - Analyzing Ethernet Header) (16:10)
video44 - (Network Analysis - Analyzing IP Header Part 1) (10:27)
video45 - (Network Analysis - Analyzing IP Header Part 2) (25:35)
video46 - (Network Analysis - Analyzing TCP Header) (15:15)
video47 - (Network Analysis - Analyzing UDP Header) (13:21)
Multi Functioning Reverse Shell
video48 - (Multi Functioning Reverse Shell - Theory Behind Socket Programming) (7:20)
video49 - (Multi Functioning Reverse Shell - Wine & Pyinstaller Installation) (7:45)
video50 - (Multi Functioning Reverse Shell - Setting Up Listener) (8:19)
video51 - (Multi Functioning Reverse Shell - Establishing Connection Between Target and Server) (6:32)
video52 - (Multi Functioning Reverse Shell - Implementing Send & Recv Functions) (11:30)
video53 - (Multi Functioning Reverse Shell - Executing Commands on Target System) (11:44)
video54 - (Multi Functioning Reverse Shell - Importing JSON Library To Parse Data) (8:21)
video55 - (Multi Functioning Reverse Shell - Converting Python Backdoor To .exe) (8:15)
video56 - (Multi Functioning Reverse Shell - Using OS Library To Change DIrectory) (10:00)
video57 - (Multi Functioning Reverse Shell - Downloading & Uploading Files To Target PC) (19:07)
video58 - (Multi Functioning Reverse Shell - Hiding Our Backdoor And Creating Persistence) (13:50)
video59 - (Multi Functioning Reverse Shell - Trying to Connect To Server Every 20 Seconds) (7:55)
video60 - (Multi Functioning Reverse Shell - Downloading Files To Target PC) (11:51)
video61 - (Multi Functioning Reverse Shell - Capturing Screenshot On Target PC) (23:08)
video62 - (Multi Functioning Reverse Shell - Administrator Privilege Check) (8:15)
video63 - (Multi Functioning Reverse Shell - Starting Other Programs WIth Our Shell) (10:47)
video64 - (Multi Functioning Reverse Shell - Running Our Shell As An Image, Audio, Pdf ...) (20:09)
Coding keylogger
video65 - (Coding Keylogger - Installing Pynput) (6:21)
video66 - (Coding Keylogger - Printing Space Character) (8:50)
video67 - (Coding Keylogger - Calling Timer On Our Keylogger) (9:58)
video68 - (Coding Keylogger - Adding Keylogger To Our Backdoor) (13:00)
Command and Control Center
video69 - (Command And Control Center - What Is A Threaded Server) (5:07)
video70 - (Command And Control Center - Accepting Connections With A Thread) (13:14)
video71 - (Command And Control Center - Managing Multiple Sessions) (8:41)
video72 - (Command And Control Center - Testing Threaded Server With Windows 10 Target) (9:05)
video73 - (Command And Control Center - Fixing Q Command) (11:14)
video74 - (Command And Control Center - Coding Exit Function) (13:53)
video75 - (Command And Control Center - Attacking Multiple targets And Gathering Botnet) (16:29)
Website penetration testing with Python
video76 - (Website Penetration Testing With Python - Stealing Saved Wireless Passwords) (22:00)
video77 - (Website Penetration Testing With Python - Saving Passwords To a File) (3:03)
video78 - (Website Penetration Testing With Python - Bruteforcing Gmail) (10:15)
video79 - (Website Penetration Testing With Python - Bruteforcing Any Login Page Part 1) (13:01)
video80 - (Website Penetration Testing With Python - Bruteforcing Any Login Page Part 2) (10:11)
video81 - (Website Penetration Testing With Python - Finding Hidden Directories Part 1) (5:12)
video82 - (Website Penetration Testing With Python - Finding Hidden Directories Part 2) (6:40)
video83 - (Website Penetration Testing With Python - Discovering Subdomains) (11:33)
video84 - (Website Penetration Testing With Python - Changing HTTP Headers) (14:00)
video85 - (Website Penetration Testing With Python - Starting Basic And Digest Authentication Bruteforcer) (10:25)
video86 - (Website Penetration Testing With Python - Controlling Threads) (8:37)
video87 - (Website Penetration Testing With Python - Coding Run Function) (10:10)
video88 - (Website Penetration Testing With Python - Printing Usage And Testing Our Program) (12:38)
video89 - (Website Penetration Testing With Python - Taking A Look At Ransomware) (8:22)
video58 - (Multi Functioning Reverse Shell - Hiding Our Backdoor And Creating Persistence)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock