
Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools
Course Content
Introduction to Python for ethical hacking!
-
Introduction – Welcome to Python For Ethical Hacking!
-
Introduction – VirtualBox 6.0.4 Installation
-
Introduction – Kali Linux 2019.1a Installation
-
Introduction – Guest Additions Installation
-
Introduction – Python In Kali Terminal
Port and vulnerability scanning
-
Port And Vulnerability Scanning – Making Simple Portscanner
-
Port and Vulnerability Scanning – Adding Raw_input To Our Portscanner
-
Port and Vulnerability Scanning – Scanning First 1000 Ports
-
Port and Vulnerability Scanning – Coding Advance Portscanner Part 1
-
Port and Vulnerability Scanning – Coding Advance Portscanner Part 2
-
Port and Vulnerability Scanning – Finishing And Testing Advance Portscanner
-
Port and Vulnerability Scanning – Configuring IP Address And Installing Metasploitable
-
Port and Vulnerability Scanning – Returning Banner From Open Port
-
Port and Vulnerability Scanning – Coding Vulnerability Scanner Part 1
-
Port and Vulnerability Scanning – Coding Vulnerability Scanner Part 2
SSH & FTP attacks
-
SSH & FTP Attacks – Automating SSH Login Part 1
-
SSH & FTP Attacks – Automating SSH Login Part 2
-
SSH & FTP Attacks – Testing SSH Login Program
-
SSH & FTP Attacks – Coding SSH Bruteforcer
-
SSH & FTP Attacks – Executing Command On Target After Bruteforcing SSH
-
SSH & FTP Attacks – Anonymus FTP Login Attack
-
SSH & FTP Attacks – Username & Passwordlist Attack on FTP
Password cracking
-
Password Cracking – SHA256, SHA512, MD5 …
-
Password Cracking – Cracking SHA1 Hash With Online Dictionary
-
Password Cracking – Getting Password From MD5 Hash
-
Password Cracking – Cracking Crypt Password With Salt
Sniffers, flooders, and spoofers
-
Sniffers, Flooders, Spoofers … – Changing MAC Address Manually
-
Sniffers, Flooders, Spoofers … – Coding MAC Changer
-
Sniffers, Flooders, Spoofers … – Theory Behind ARP Spoofing
-
Sniffers, Flooders, Spoofers … – Crafting Malicious ARP Packet
-
Sniffers, Flooders, Spoofers … – Coding ARP Spoofer
-
Sniffers, Flooders, Spoofers … – Forwarding Packets And Restoring ARP Tables
-
Sniffers, Flooders, Spoofers … – Spoofing Our IP Address And Sending Message With TCP Payload
-
Sniffers, Flooders, Spoofers … – Running SynFlooder With Changed Source IP Address
-
Sniffers, Flooders, Spoofers … – Getting Source And Destination MAC Address From Received Packets
-
Sniffers, Flooders, Spoofers … – Sniffing FTP Username And Password Part1
-
Sniffers, Flooders, Spoofers … – Sniffing FTP Username And Password Part2
-
Sniffers, Flooders, Spoofers … – Getting Passwords From HTTP Websites
Coding DNS spoofer
-
Coding Dnsspoofer – Cloning Any Webpage
-
Coding Dnsspoofer – Printing DNS Queries
-
Coding Dnsspoofer – Redirecting Response To Cloned Page
-
Coding Dnsspoofer – Setting IP Table Rules and Running DnsSpoofer
Network analysis
-
Network Analysis – Analyzing Ethernet Header
-
Network Analysis – Analyzing IP Header Part 1
-
Network Analysis – Analyzing IP Header Part 2
-
Network Analysis – Analyzing TCP Header
-
Network Analysis – Analyzing UDP Header
Multi functioning reverse shell
-
Multi Functioning Reverse Shell – Theory Behind Socket Programming
-
Multi Functioning Reverse Shell – Wine & Pyinstaller Installation
-
Multi Functioning Reverse Shell – Setting Up Listener
-
Multi Functioning Reverse Shell – Establishing Connection Between Target and Server
-
Multi Functioning Reverse Shell – Implementing Send & Recv Functions
-
Multi Functioning Reverse Shell – Executing Commands on Target System
-
Multi Functioning Reverse Shell – Importing JSON Library To Parse Data
-
Multi Functioning Reverse Shell – Converting Python Backdoor To .exe
-
Multi Functioning Reverse Shell – Using OS Library To Change Directory
-
Multi Functioning Reverse Shell – Downloading & Uploading Files To Target PC
-
Multi Functioning Reverse Shell – Hiding Our Backdoor And Creating Persistence
-
Multi Functioning Reverse Shell – Trying to Connect To Server Every 20 Seconds
-
Multi Functioning Reverse Shell – Downloading Files To Target PC
-
Multi Functioning Reverse Shell – Capturing Screenshot On Target PC
-
Multi Functioning Reverse Shell – Administrator Privilege Check
-
Multi Functioning Reverse Shell – Starting Other Programs WIth Our Shell
-
Multi Functioning Reverse Shell – Running Our Shell As An Image, Audio, Pdf …
Coding keylogger
-
Coding Keylogger – Installing Pynput
-
Coding Keylogger – Printing Space Character
-
Coding Keylogger – Calling Timer On Our Keylogger
-
Coding Keylogger – Adding Keylogger To Our Backdoor
Command and control center
-
Command And Control Center – What Is A Threaded Server
-
Command And Control Center – Accepting Connections With A Thread
-
Command And Control Center – Managing Multiple Sessions
-
Command And Control Center – Testing Threaded Server With Windows 10 Target
-
Command And Control Center – Fixing Q Command
-
Command And Control Center – Coding Exit Function
-
Command And Control Center – Attacking Multiple targets And Gathering Botnet
Website penetration testing with Python
-
Website Penetration Testing With Python – Stealing Saved Wireless Passwords
-
Website Penetration Testing With Python – Saving Passwords To a File
-
Website Penetration Testing With Python – Bruteforcing Gmail
-
Website Penetration Testing With Python – Bruteforcing Any Login Page Part 1
-
Website Penetration Testing With Python – Bruteforcing Any Login Page Part 2
-
Website Penetration Testing With Python – Finding Hidden Directories Part 1
-
Website Penetration Testing With Python – Finding Hidden Directories Part 2
-
Website Penetration Testing With Python – Discovering Subdomains
-
Website Penetration Testing With Python – Changing HTTP Headers
-
Website Penetration Testing With Python – Starting Basic And Digest Authentication Bruteforcer
-
Website Penetration Testing With Python – Controlling Threads
-
Website Penetration Testing With Python – Coding Run Function
-
Website Penetration Testing With Python – Printing Usage And Testing Our Program
-
Website Penetration Testing With Python – Taking A Look At Ransomware
Student Ratings & Reviews
No Review Yet
Your Instructor
admin@skillfly.com
Follow Me: