
Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools
Categories: Ethical Hacking & Cyber Security, Programming Languages
Course Content
S01. Introduction to Python for ethical hacking!
-
01. Introduction – Welcome to Python For Ethical Hacking!
00:00 -
02. Introduction – VirtualBox 6.0.4 Installation
00:00 -
03. Introduction – Kali Linux 2019.1a Installation
00:00 -
04. Introduction – Guest Additions Installation
00:00 -
05. Introduction – Python In Kali Terminal
00:00
S02. Port and vulnerability scanning
-
06. Port And Vulnerability Scanning – Making Simple Portscanner
00:00 -
07. Port and Vulnerability Scanning – Adding Raw_input To Our Portscanner
00:00 -
08. Port and Vulnerability Scanning – Scanning First 1000 Ports
00:00 -
09. Port and Vulnerability Scanning – Coding Advance Portscanner Part 1
00:00 -
10. Port and Vulnerability Scanning – Coding Advance Portscanner Part 2
00:00 -
11. Port and Vulnerability Scanning – Finishing And Testing Advance Portscanner
00:00 -
12. Port and Vulnerability Scanning – Configuring IP Address And Installing Metasploitable
00:00 -
13. Port and Vulnerability Scanning – Returning Banner From Open Port
00:00 -
14. Port and Vulnerability Scanning – Coding Vulnerability Scanner Part 1
00:00 -
15. Port and Vulnerability Scanning – Coding Vulnerability Scanner Part 2
00:00
S03. SSH & FTP attacks
-
16. SSH & FTP Attacks – Automating SSH Login Part 1
00:00 -
17. SSH & FTP Attacks – Automating SSH Login Part 2
00:00 -
18. SSH & FTP Attacks – Testing SSH Login Program
00:00 -
19. SSH & FTP Attacks – Coding SSH Bruteforcer
00:00 -
20. SSH & FTP Attacks – Executing Command On Target After Bruteforcing SSH
00:00 -
21. SSH & FTP Attacks – Anonymus FTP Login Attack
00:00 -
22. SSH & FTP Attacks – Username & Passwordlist Attack on FTP
00:00
S04. Password cracking
-
23. Password Cracking – SHA256, SHA512, MD5 …
00:00 -
24. Password Cracking – Cracking SHA1 Hash With Online Dictionary
00:00 -
25. Password Cracking – Getting Password From MD5 Hash
00:00 -
26. Password Cracking – Cracking Crypt Password With Salt
00:00
S05. Sniffers, flooders, and spoofers
-
27. Sniffers, Flooders, Spoofers … – Changing MAC Address Manually
00:00 -
28. Sniffers, Flooders, Spoofers … – Coding MAC Changer
00:00 -
29. Sniffers, Flooders, Spoofers … – Theory Behind ARP Spoofing
00:00 -
30. Sniffers, Flooders, Spoofers … – Crafting Malicious ARP Packet
00:00 -
31. Sniffers, Flooders, Spoofers … – Coding ARP Spoofer
00:00 -
32. Sniffers, Flooders, Spoofers … – Forwarding Packets And Restoring ARP Tables
00:00 -
33. Sniffers, Flooders, Spoofers … – Spoofing Our IP Address And Sending Message With TCP Payload
00:00 -
34. Sniffers, Flooders, Spoofers … – Running SynFlooder With Changed Source IP Address
00:00 -
35. Sniffers, Flooders, Spoofers … – Getting Source And Destination MAC Address From Received Packets
00:00 -
36. Sniffers, Flooders, Spoofers … – Sniffing FTP Username And Password Part1
00:00 -
37. Sniffers, Flooders, Spoofers … – Sniffing FTP Username And Password Part2
00:00 -
38. Sniffers, Flooders, Spoofers … – Getting Passwords From HTTP Websites
00:00
S06. Coding DNS spoofer
-
39. Coding Dnsspoofer – Cloning Any Webpage
00:00 -
40. Coding Dnsspoofer – Printing DNS Queries
00:00 -
41. Coding Dnsspoofer – Redirecting Response To Cloned Page
00:00 -
42. Coding Dnsspoofer – Setting IP Table Rules and Running DnsSpoofer
00:00
S07. Network analysis
-
43. Network Analysis – Analyzing Ethernet Header
00:00 -
44. Network Analysis – Analyzing IP Header Part 1
00:00 -
45. Network Analysis – Analyzing IP Header Part 2
00:00 -
46. Network Analysis – Analyzing TCP Header
00:00 -
47. Network Analysis – Analyzing UDP Header
00:00
S08. Multi functioning reverse shell
-
48. Multi Functioning Reverse Shell – Theory Behind Socket Programming
00:00 -
49. Multi Functioning Reverse Shell – Wine & Pyinstaller Installation
00:00 -
50. Multi Functioning Reverse Shell – Setting Up Listener
00:00 -
51. Multi Functioning Reverse Shell – Establishing Connection Between Target and Server
00:00 -
52. Multi Functioning Reverse Shell – Implementing Send & Recv Functions
00:00 -
53. Multi Functioning Reverse Shell – Executing Commands on Target System
00:00 -
54. Multi Functioning Reverse Shell – Importing JSON Library To Parse Data
00:00 -
55. Multi Functioning Reverse Shell – Converting Python Backdoor To .exe
00:00 -
56. Multi Functioning Reverse Shell – Using OS Library To Change Directory
00:00 -
57. Multi Functioning Reverse Shell – Downloading & Uploading Files To Target PC
00:00 -
58. Multi Functioning Reverse Shell – Hiding Our Backdoor And Creating Persistence
00:00 -
59. Multi Functioning Reverse Shell – Trying to Connect To Server Every 20 Seconds
00:00 -
60. Multi Functioning Reverse Shell – Downloading Files To Target PC
00:00 -
61. Multi Functioning Reverse Shell – Capturing Screenshot On Target PC
00:00 -
62. Multi Functioning Reverse Shell – Administrator Privilege Check
00:00 -
63. Multi Functioning Reverse Shell – Starting Other Programs WIth Our Shell
00:00 -
64. Multi Functioning Reverse Shell – Running Our Shell As An Image, Audio, Pdf …
00:00
S09. Coding keylogger
-
65. Coding Keylogger – Installing Pynput
00:00 -
66. Coding Keylogger – Printing Space Character
00:00 -
67. Coding Keylogger – Calling Timer On Our Keylogger
00:00 -
68. Coding Keylogger – Adding Keylogger To Our Backdoor
00:00
S10. Command and control center
-
69. Command And Control Center – What Is A Threaded Server
00:00 -
70. Command And Control Center – Accepting Connections With A Thread
00:00 -
71. Command And Control Center – Managing Multiple Sessions
00:00 -
72. Command And Control Center – Testing Threaded Server With Windows 10 Target
00:00 -
73. Command And Control Center – Fixing Q Command
00:00 -
74. Command And Control Center – Coding Exit Function
00:00 -
75. Command And Control Center – Attacking Multiple targets And Gathering Botnet
00:00
S11. Website penetration testing with Python
-
76. Website Penetration Testing With Python – Stealing Saved Wireless Passwords
00:00 -
77. Website Penetration Testing With Python – Saving Passwords To a File
00:00 -
78. Website Penetration Testing With Python – Bruteforcing Gmail
00:00 -
79. Website Penetration Testing With Python – Bruteforcing Any Login Page Part 1
00:00 -
80. Website Penetration Testing With Python – Bruteforcing Any Login Page Part 2
00:00 -
81. Website Penetration Testing With Python – Finding Hidden Directories Part 1
00:00 -
82. Website Penetration Testing With Python – Finding Hidden Directories Part 2
00:00 -
83. Website Penetration Testing With Python – Discovering Subdomains
00:00 -
84. Website Penetration Testing With Python – Changing HTTP Headers
00:00 -
85. Website Penetration Testing With Python – Starting Basic And Digest Authentication Bruteforcer
00:00 -
86. Website Penetration Testing With Python – Controlling Threads
00:00 -
87. Website Penetration Testing With Python – Coding Run Function
00:00 -
88. Website Penetration Testing With Python – Printing Usage And Testing Our Program
00:00 -
89. Website Penetration Testing With Python – Taking A Look At Ransomware
00:00
Student Ratings & Reviews
No Review Yet
Your Instructor
Muaaz Farooq
Follow Me: