Home Search Profile

Master Ethical Hacking with Python: Build 10+ Pen Testing Tools

Focused View

5:20:58

  • 01-Description-of-Training.html
  • 02-Video-Overview-(1-39-).mp4
    01:39
  • 01-1.-Getting-Started-(0-53-).mp4
    00:53
  • 02-2.-Welcome-To-Our-Python-Hacking-Course!-(2-52-).mp4
    02:52
  • 03-3.-Hacking-2-Target-Machines-At-Once---Course-Teaser-(5-44-).mp4
    05:44
  • 04-4.-Python-3-Experience--.html
  • 05-5.-Virtual-Box-Install-(4-29-).mp4
    04:29
  • 06-6.-Creating-Virtual-Machine-(6-18-).mp4
    06:18
  • 07-7.-Kali-Linux-Installation-(5-55-).mp4
    05:55
  • 08-8.-Are-you-new-to-Kali-Linux--.html
  • 09-9.-Installing-PyCharm-(7-58-).mp4
    07:58
  • 09-9.-Installing-PyCharm-(7-58-).zip
  • 01-10.-Needed-Libraries-&-Virtual-Enviroment-(5-52-).mp4
    05:52
  • 02-11.-Scanning-For-One-Port-(7-22-).mp4
    07:22
  • 03-12.-Adding-Timeout-Function-(7-00-).mp4
    07:00
  • 04-13.-Converting-Domain-Name-To-An-IP-Address-(6-41-).mp4
    06:41
  • 05-14.-Scanning-Multiple-Targets-At-Once-(11-23-).mp4
    11:23
  • 06-15.-Grabbing-Banner-From-Open-Ports-(9-56-).mp4
    09:56
  • 07-16.-Importing-Portscanner-Into-A-Different-Program-(12.zip
  • 07-16.-Importing-Portscanner-Into-A-Different-Program-(12-46-).mp4
    12:46
  • 01-17.-Creating-New-Project-And-Importing-Libraries-(4-10-).mp4
    04:10
  • 02-18.-Three-Things-We-Need-To-Run-Our-Program-(7-09-).mp4
    07:09
  • 03-19.-Converting-Portscanner-To-A-Class-(17-15-).mp4
    17:15
  • 04-20.-Finding-Vulnerable-Ports-(14-57-).mp4
    14:57
  • 05-21.-Vulnerability-Scanner-Recap-(3-46-).mp4
    03:46
  • 05-21.-Vulnerability-Scanner-Recap-(3-46-).zip
  • 01-22.-BONUS-1---Installing-Metasploitable-(4-27-).mp4
    04:27
  • 02-23.-Establishing-SSH-Connection-With-The-Target-(7-33-).mp4
    07:33
  • 03-24.-Interacting-With-Passwords-File-(5-13-).mp4
    05:13
  • 04-25.-Automating-SSH-Connection-(5-20-).mp4
    05:20
  • 05-26.-SSH-Dictionary-Attack-(10-18-).mp4
    10:18
  • 06-27.-Faster-Bruteforcing-With-Threads-(6-40-).mp4
    06:40
  • 06-27.-Faster-Bruteforcing-With-Threads-(6-40-).zip
  • 01-28.-What-is-ARP-Spoofing-&-How-To-Craft-ARP-Packet-In-Python-(8-31-).mp4
    08:31
  • 02-29.-Manually-Sending-Malicious-ARP-Packets-(13-58-).mp4
    13:58
  • 03-30.-Getting-Target-Machine-&-Router-MAC-Address-(9-16-).mp4
    09:16
  • 04-31.-Man-In-The-Middle-Attack-With-Python-(10-31-).mp4
    10:31
  • 05-32.-Program-Recap-&-What-Do-We-Use-It-For---(2-31-).mp4
    02:31
  • 05-32.-Program-Recap-&-What-Do-We-Use-It-For---(2-31-).zip
  • 01-33.-Starting-Password-Sniffer-&-Combining-It-With-Arpspoofer-(5-34-).mp4
    05:34
  • 02-34.-Username-&-Password-Fields-(4-11-).mp4
    04:11
  • 03-35.-Finding-Password-Pattern-(7-19-).mp4
    07:19
  • 04-36.-Capturing-Website-Login-Information-(6-38-).mp4
    06:38
  • 05-37.-Combining-ARPSpoofer-With-Password-Sniffer-(5.zip
  • 05-37.-Combining-ARPSpoofer-With-Password-Sniffer-(5-44-).mp4
    05:44
  • 01-38.-Getting-Hashed-Passwords-With-SQL-Injection-(6-10-).mp4
    06:10
  • 02-39.-Building-MD5-&-SHA1-Cracker-(16-34-).mp4
    16:34
  • 03-40.-BONUS2---Wireless-Bruteforcer-(4-15-).mp4
    04:15
  • 03-40.-BONUS2---Wireless-Bruteforcer-(4-15-).zip
  • 01-41.-Installing-Python-3-For-Windows-&-Pyinstaller-(5-38-).mp4
    05:38
  • 02-42.-Processing-Keyboard-Inputs-(6-06-).mp4
    06:06
  • 03-43.-Hiding-Keylogger-And-Writing-Keyboard-Inputs-(12-20-).mp4
    12:20
  • 04-44.-Testing-Our-Keylogger-On-Windows-10-Target-(12-06-).mp4
    12:06
  • More details


    Course Overview

    This comprehensive Python ethical hacking course teaches you to code 10+ penetration testing tools from scratch, covering Kali Linux setup, vulnerability scanning, password cracking, and advanced network attacks.

    What You'll Learn

    • Code your own penetration testing tools with Python 3
    • Perform man-in-the-middle attacks and ARP spoofing
    • Crack password hashes and bruteforce wireless networks

    Who This Is For

    • Aspiring network security professionals
    • IT experts wanting to secure systems against attacks
    • Ethical hackers seeking Python tool development skills

    Key Benefits

    • Hands-on projects including keyloggers and backdoors
    • Learn to sniff passwords and exploit vulnerabilities
    • Master multi-target attacks with threaded Python scripts

    Curriculum Highlights

    1. Port scanning & vulnerability detection
    2. SSH bruteforcing with threading
    3. ARP spoofing & password sniffing
    Focused display
    • language english
    • Training sessions 43
    • duration 5:20:58
    • Release Date 2025/05/18