The Complete Python Hacking Course: Beginner to Advanced!
- Description
- Curriculum
- FAQ
- Reviews
If you would like to master ethical hacking, you are going to LOVE our bestselling Python course! Learn ethical hacking and penetration testing while working on practical Python coding projects. We will cover the following topics in this course:
-
Introduction and setup
-
Port and vulnerability scanning
-
SSH and FTP attacks
-
Password cracking
-
Sniffers, flooders and spoofers
-
DNS spoofing
-
Network analysis
-
Coding a multi-functioning reverse shell
-
Keyloggers
-
Command and control center
-
Website penetration testing
This course was designed for students interested in intermediate to advanced level ethical hacking tutorials, however it is still taught in a step-by-step, beginner friendly method. English subtitles are available and all lectures are downloadable for offline viewing. 1 on 1 assistance with the coding projects is available within the discussion forum.
Still not sold? Check out these great reviews!
“It’s already fun wow. I enjoy learning ethical hacking and python”
“Great even for non-programmers!”
“Great Course”
Thank you for taking the time to read this and we hope to see you in the course!
-
6Coding a simple port scannerVideo lesson
-
7Adding raw_input to our port scannerVideo lesson
-
8Scanning the first 1,000 portsVideo lesson
-
9Coding an advanced port scanner part 1Video lesson
-
10Coding an advanced port scanner part 2Video lesson
-
11Finishing and testing our scannerVideo lesson
-
12Configuring IP address and installing MetasploitableVideo lesson
-
13Returning banner from open portVideo lesson
-
14Coding a vulnerability scanner part 1Video lesson
-
15Coding a vulnerability scanner part 2Video lesson
-
16Automating SSH login part 1Video lesson
-
17Automating SSH login part 2Video lesson
-
18Testing our SSH login programVideo lesson
-
19Coding a SSH brute-forcerVideo lesson
-
20Executing commands on target after brute-forcing SSHVideo lesson
-
21Anonymous FTP login attackVideo lesson
-
22Username & password list attack on FTPVideo lesson
-
27Changing MAC address manuallyVideo lesson
-
28Coding MAC address changerVideo lesson
-
29Theory behind ARP spoofingVideo lesson
-
30Crafting malicious ARP packetVideo lesson
-
31Coding ARP spooferVideo lesson
-
32Forwarding packets and restoring ARP tablesVideo lesson
-
33Spoofing our IP address and sending message with TCP payloadVideo lesson
-
34Running SynFlooder with changed source IP addressVideo lesson
-
35Getting source and destination MAC address from received packetsVideo lesson
-
36Sniffing FTP username and password part 1Video lesson
-
37Sniffing FTP username and password part 2Video lesson
-
38Getting passwords from HTTP websitesVideo lesson
-
48Theory behind socket programmingVideo lesson
-
49Wine and Pyinstaller installationVideo lesson
-
50Setting up listenerVideo lesson
-
51Establishing connection between target and serverVideo lesson
-
52Implementing send & receive functionsVideo lesson
-
53Executing commands on target systemVideo lesson
-
54Importing JSON library to parse dataVideo lesson
-
55Converting Python backdoor to .exeVideo lesson
-
56Using OS library to change directoryVideo lesson
-
57Downloading & uploading files to target PCVideo lesson
-
58Hiding our backdoor and creating persistenceVideo lesson
-
59Trying to connect to server every 20 secondsVideo lesson
-
60Downloading files to target PCVideo lesson
-
61Capturing screenshot on target PCVideo lesson
-
62Administrator privilege checkVideo lesson
-
63Starting other programs with our shellVideo lesson
-
64Running our shell as an image, audio, PDFVideo lesson
-
69What is a threaded server?Video lesson
-
70Accepting connections with a threadVideo lesson
-
71Managing multiple sessionsVideo lesson
-
72Testing threaded server with Windows 10 targetVideo lesson
-
73Fixing Q commandVideo lesson
-
74Coding exit functionVideo lesson
-
75Attacking multiple targets and gathering botnetVideo lesson

External Links May Contain Affiliate Links read more