Master Ethical Hacking with Python: Build 10+ Pen Testing Tools
Focused View
5:20:58
01-Description-of-Training.html
02-Video-Overview-(1-39-).mp4
01:39
01-1.-Getting-Started-(0-53-).mp4
00:53
02-2.-Welcome-To-Our-Python-Hacking-Course!-(2-52-).mp4
02:52
03-3.-Hacking-2-Target-Machines-At-Once---Course-Teaser-(5-44-).mp4
05:44
04-4.-Python-3-Experience--.html
05-5.-Virtual-Box-Install-(4-29-).mp4
04:29
06-6.-Creating-Virtual-Machine-(6-18-).mp4
06:18
07-7.-Kali-Linux-Installation-(5-55-).mp4
05:55
08-8.-Are-you-new-to-Kali-Linux--.html
09-9.-Installing-PyCharm-(7-58-).mp4
07:58
09-9.-Installing-PyCharm-(7-58-).zip
01-10.-Needed-Libraries-&-Virtual-Enviroment-(5-52-).mp4
05:52
02-11.-Scanning-For-One-Port-(7-22-).mp4
07:22
03-12.-Adding-Timeout-Function-(7-00-).mp4
07:00
04-13.-Converting-Domain-Name-To-An-IP-Address-(6-41-).mp4
06:41
05-14.-Scanning-Multiple-Targets-At-Once-(11-23-).mp4
11:23
06-15.-Grabbing-Banner-From-Open-Ports-(9-56-).mp4
09:56
07-16.-Importing-Portscanner-Into-A-Different-Program-(12.zip
07-16.-Importing-Portscanner-Into-A-Different-Program-(12-46-).mp4
12:46
01-17.-Creating-New-Project-And-Importing-Libraries-(4-10-).mp4
04:10
02-18.-Three-Things-We-Need-To-Run-Our-Program-(7-09-).mp4
07:09
03-19.-Converting-Portscanner-To-A-Class-(17-15-).mp4
17:15
04-20.-Finding-Vulnerable-Ports-(14-57-).mp4
14:57
05-21.-Vulnerability-Scanner-Recap-(3-46-).mp4
03:46
05-21.-Vulnerability-Scanner-Recap-(3-46-).zip
01-22.-BONUS-1---Installing-Metasploitable-(4-27-).mp4
04:27
02-23.-Establishing-SSH-Connection-With-The-Target-(7-33-).mp4
07:33
03-24.-Interacting-With-Passwords-File-(5-13-).mp4
05:13
04-25.-Automating-SSH-Connection-(5-20-).mp4
05:20
05-26.-SSH-Dictionary-Attack-(10-18-).mp4
10:18
06-27.-Faster-Bruteforcing-With-Threads-(6-40-).mp4
06:40
06-27.-Faster-Bruteforcing-With-Threads-(6-40-).zip
01-28.-What-is-ARP-Spoofing-&-How-To-Craft-ARP-Packet-In-Python-(8-31-).mp4
08:31
02-29.-Manually-Sending-Malicious-ARP-Packets-(13-58-).mp4
13:58
03-30.-Getting-Target-Machine-&-Router-MAC-Address-(9-16-).mp4
09:16
04-31.-Man-In-The-Middle-Attack-With-Python-(10-31-).mp4
10:31
05-32.-Program-Recap-&-What-Do-We-Use-It-For---(2-31-).mp4
02:31
05-32.-Program-Recap-&-What-Do-We-Use-It-For---(2-31-).zip
01-33.-Starting-Password-Sniffer-&-Combining-It-With-Arpspoofer-(5-34-).mp4
05:34
02-34.-Username-&-Password-Fields-(4-11-).mp4
04:11
03-35.-Finding-Password-Pattern-(7-19-).mp4
07:19
04-36.-Capturing-Website-Login-Information-(6-38-).mp4
06:38
05-37.-Combining-ARPSpoofer-With-Password-Sniffer-(5.zip
05-37.-Combining-ARPSpoofer-With-Password-Sniffer-(5-44-).mp4
05:44
01-38.-Getting-Hashed-Passwords-With-SQL-Injection-(6-10-).mp4
06:10
02-39.-Building-MD5-&-SHA1-Cracker-(16-34-).mp4
16:34
03-40.-BONUS2---Wireless-Bruteforcer-(4-15-).mp4
04:15
03-40.-BONUS2---Wireless-Bruteforcer-(4-15-).zip
01-41.-Installing-Python-3-For-Windows-&-Pyinstaller-(5-38-).mp4
05:38
02-42.-Processing-Keyboard-Inputs-(6-06-).mp4
06:06
03-43.-Hiding-Keylogger-And-Writing-Keyboard-Inputs-(12-20-).mp4
12:20
04-44.-Testing-Our-Keylogger-On-Windows-10-Target-(12-06-).mp4
12:06
More details
Course Overview
This comprehensive Python ethical hacking course teaches you to code 10+ penetration testing tools from scratch, covering Kali Linux setup, vulnerability scanning, password cracking, and advanced network attacks.
What You'll Learn
- Code your own penetration testing tools with Python 3
- Perform man-in-the-middle attacks and ARP spoofing
- Crack password hashes and bruteforce wireless networks
Who This Is For
- Aspiring network security professionals
- IT experts wanting to secure systems against attacks
- Ethical hackers seeking Python tool development skills
Key Benefits
- Hands-on projects including keyloggers and backdoors
- Learn to sniff passwords and exploit vulnerabilities
- Master multi-target attacks with threaded Python scripts
Curriculum Highlights
- Port scanning & vulnerability detection
- SSH bruteforcing with threading
- ARP spoofing & password sniffing
Focused display
Category
- language english
- Training sessions 43
- duration 5:20:58
- Release Date 2025/05/18