Companies Home Search Profile

Master Python Hacking: 15+ Projects from Beginner to Expert

Focused View

Nazar Diachok

14:47:28

0 View
  • 1. Introduction.mp4
    03:06
  • 2. Before we start.mp4
    01:32
  • 1. ISO and VMWARE Installation.mp4
    03:11
  • 2. Kali Linux Setup.mp4
    15:25
  • 3. Windows Setup.mp4
    05:29
  • 4. Python and VSCode Installation for Windows.mp4
    06:54
  • 5. Python and VSCode Installation for Kali Linux.mp4
    10:24
  • 1. Working with basik functions and variables.mp4
    07:28
  • 2. Lists an Dictionaries in Python.mp4
    06:18
  • 3. Working with if, elif, else.mp4
    05:27
  • 4. Loops in Python.mp4
    08:37
  • 5. Functions in Python.mp4
    03:32
  • 6. Error handling in Python.mp4
    05:23
  • 7. Threading inPython.mp4
    09:00
  • 8. Working with Files.mp4
    05:05
  • 9. More practice with Threads.mp4
    09:46
  • 10. Progress Bar in Python.mp4
    03:18
  • 1. What is DNS.mp4
    05:06
  • 2. Creating DNS Records Enumeration Tool.mp4
    08:45
  • 3. Creating Subdomain Enumeration Tool.mp4
    10:10
  • 4. Homework.html
  • Files.zip
  • 1. First Function for PDF Protector.mp4
    08:26
  • 2. Finishing our PDF Protector.mp4
    05:58
  • 3. Homework.html
  • Files.zip
  • 1. Function to generate passwords on the fly.mp4
    11:48
  • 2. Extracting passwords from wordlist.mp4
    06:35
  • 3. Making our program faster.mp4
    07:32
  • 4. Takeing arguments from the user.mp4
    27:38
  • 5. Homework.html
  • Files.zip
  • 1. What is ARP.mp4
    04:07
  • 2. Creating ARP request.mp4
    04:36
  • 3. Extracting info from the answer.mp4
    08:17
  • 4. Working with Threads for our program.mp4
    11:25
  • 5. Homework.html
  • Files.zip
  • 1. Creating main function for our program.mp4
    07:02
  • 2. Extracting Banner from our target.mp4
    04:17
  • 3. Working with Threads.mp4
    08:53
  • 4. Formating our result.mp4
    10:44
  • 5. Homework.html
  • Files.zip
  • 1. Function to generate passwords on the fly.mp4
    07:51
  • 2. Function to verify hash.mp4
    11:10
  • 3. Working with wordlist.mp4
    12:45
  • 4. Takeing input from the user.mp4
    12:26
  • 5. Homework.html
  • Files.zip
  • 1. What is SSH.mp4
    03:00
  • 2. Init SSH connection.mp4
    06:00
  • 3. Error Handling.mp4
    06:55
  • 4. User input.mp4
    07:02
  • 5. Testing our program.mp4
    09:17
  • 6. Sarting our advanced SSH cracker.mp4
    05:21
  • 7. Functions to generate passwords on the fly & extract passwords from the wordlist.mp4
    06:49
  • 8. Working with user input.mp4
    07:15
  • 9. Testing our program.mp4
    14:30
  • 10. Fixing errors.mp4
    05:09
  • 11. Homework.html
  • Files.zip
  • 1. What is FTP.mp4
    01:23
  • 2. Main function.mp4
    06:42
  • 3. Working with wordlist.mp4
    04:58
  • 4. Testing our basik program.mp4
    04:23
  • 5. Starting advanced program.mp4
    06:34
  • 6. Working with user input.mp4
    08:13
  • 7. Parse arguments.mp4
    09:13
  • 8. Testing our program.mp4
    02:43
  • 9. Homework.html
  • Files.zip
  • 1. What is keylogger.mp4
    01:00
  • 2. Creation of basik keylogger.mp4
    06:24
  • 3. Creation of more advanced keylogger.mp4
    10:01
  • 4. Homework.html
  • Files.zip
  • 1. What is Reverse Shell.mp4
    03:10
  • 2. Creating custom Listener.mp4
    05:41
  • 3. Creating client side code.mp4
    02:50
  • 4. Functions to send and recieve data.mp4
    07:13
  • 5. cd, upload and download commands.mp4
    19:39
  • 6. Homework.html
  • Files.zip
  • 1. What is Info Stealer.mp4
    01:16
  • 2. Extracting decryption key.mp4
    13:52
  • 3. Extracting Credentials.mp4
    11:32
  • 4. Decrypting Extracted Passwords.mp4
    12:13
  • 5. Extracting data from clipboard.mp4
    02:10
  • 6. Extracting System Info.mp4
    10:07
  • 7. Testing our program.mp4
    09:34
  • 8. Homework.html
  • Files.zip
  • 1. What is Botnet.mp4
    05:46
  • 2. First function for SSH Botnet.mp4
    06:14
  • 3. Init Connection.mp4
    13:59
  • 4. Testing and Fixing problems.mp4
    08:24
  • 5. Commands execution on our bots.mp4
    18:19
  • 6. Adding Function for DDOS.mp4
    09:00
  • 7. Testing and problems solving.mp4
    20:40
  • 8. Homework.html
  • Files.zip
  • 1. What is Internet Worm.mp4
    05:14
  • 2. SSH exploit explanation.mp4
    04:24
  • 3. NFS exploit explanation.mp4
    02:36
  • 4. PsExec exploit explanation.mp4
    03:43
  • 5. WMI exploit explanation.mp4
    02:13
  • 6. RDP exploit explanation.mp4
    03:01
  • 7. Payload creation.mp4
    09:25
  • 8. Function to automatically scan network.mp4
    09:21
  • 9. Creation of SSH exploit.mp4
    13:31
  • 10. Testing and Fixing problems.mp4
    12:40
  • 11. Creating NFS, PsExec, WMI exploits.mp4
    20:30
  • 12. Testing and Fixing network problems.mp4
    06:35
  • 13. Creating RDP exploit.mp4
    13:29
  • 14. Homework.html
  • Files.zip
  • 1. Explanation of basik botnet.mp4
    03:02
  • 2. Starting our basik botnet.mp4
    08:26
  • 3. Creating Center for our botnet.mp4
    06:58
  • 4. Finishing our basik botnet.mp4
    06:32
  • 5. explanation of advanced botnet.mp4
    40:52
  • 6. ddos.mp4
    08:32
  • 7. extracting passwords.mp4
    18:18
  • 8. Secure Communication.mp4
    05:57
  • 9. Main function.mp4
    13:19
  • 10. String obfuscation and advanced techniques on client side code.mp4
    13:06
  • 11. Testing our Advanced Botnet.mp4
    35:47
  • 12. Homework.html
  • Files.zip
  • Description


    Write 15+ tools to learn malware development & python programming & ethical hacking | No prior knowledge required

    What You'll Learn?


    • Malware development with python 3
    • Python 3 for ethical hacking and penetration test
    • Create advanced malwares with Pyhton 3
    • Advanced techniques for security bypass
    • Create custom tools for ethical hacking
    • 100+ video materials
    • presentation for each malware and tool
    • 13+ hours of hands on experience
    • 15+ tools and malwares creation
    • basik networking
    • Botnets creation
    • Internet worm creation
    • advanced tools creation
    • advanced malware development
    • python 3 for hacking
    • penetration test
    • ethical hacking
    • hacking
    • python programming
    • Network & Security
    • Password cracking
    • advanced malicious codes creation
    • malware development

    Who is this for?


  • Aspiring Ethical Hackers: Individuals who are new to cybersecurity and want to learn how to use Python for ethical hacking and penetration testing. This course is ideal for those starting their journey in cybersecurity and ethical hacking.
  • Python Programmers with Interest in Security: Developers who are proficient in Python and want to expand their skill set by learning how to apply Python to various hacking techniques, tools, and projects.
  • Cybersecurity Students: Students pursuing cybersecurity degrees or certifications who are looking to supplement their education with practical, hands-on projects that demonstrate how Python can be used in real-world hacking scenarios.
  • IT Professionals and Network Administrators: IT professionals, system administrators, or network engineers who want to enhance their security skills by learning how to identify, exploit, and protect against vulnerabilities using Python.
  • Hobbyists and Self-Learners: Individuals who have a passion for cybersecurity, ethical hacking, or programming and are eager to learn through guided projects, even without formal training or a professional background in the field.
  • Cybersecurity Enthusiasts Transitioning to Python: Those already familiar with other programming languages or security tools, looking to transition into Python for more powerful and flexible hacking solutions.
  • What You Need to Know?


  • basik programming experience would be an advantage but not required
  • basik IT knowledge
  • basik networking knowledge would be an advantage but not required
  • More details


    Description

    This course, "Python3 for Ethical Hacking and Advanced Malware Development from Scratch," is designed for beginner, professionals, penetration testers, ethical hackers in the cybersecurity field who wish to delve into the world of ethical hacking and advanced malware development. Since no prior knowledge is required, this course serves as an ideal starting point for beginners while offering substantial depth for those with some experience in the field.

    Participants embark on a comprehensive journey, beginning with the fundamentals of Python3, a programming language known for its simplicity and versatility in cybersecurity. As the course progresses, students transition from basic programming concepts to creating complex hacking programs and developing advanced malware.

    Throughout the course, students create over 15 practical hacking programs, each designed to enhance their understanding of various cybersecurity techniques and methodologies. These programs cover a wide range of hacking scenarios, including network penetration testing, vulnerability assessment, and data exfiltration. By actively developing these tools, students gain hands-on experience in identifying, exploiting, and mitigating security vulnerabilities.

    In addition to the various hacking techniques, the course places significant emphasis on the ethical dimensions and appropriate use of hacking skills. Students learn about the importance of ethical hacking, the legal frameworks, and best practices to ensure that their activities positively contribute to the cybersecurity community.

    Advanced malware development is another cornerstone of this course. Participants study the intricacies of developing, deploying, and analyzing malware. They learn to create stealthy and effective malicious software while understanding the defensive measures necessary to counteract such threats.

    By the end of this course, students possess a robust toolkit of Python-based hacking programs and a strong foundation in malware development, equipping them with the skills needed to succeed in the dynamic field of cybersecurity.

    Who this course is for:

    • Aspiring Ethical Hackers: Individuals who are new to cybersecurity and want to learn how to use Python for ethical hacking and penetration testing. This course is ideal for those starting their journey in cybersecurity and ethical hacking.
    • Python Programmers with Interest in Security: Developers who are proficient in Python and want to expand their skill set by learning how to apply Python to various hacking techniques, tools, and projects.
    • Cybersecurity Students: Students pursuing cybersecurity degrees or certifications who are looking to supplement their education with practical, hands-on projects that demonstrate how Python can be used in real-world hacking scenarios.
    • IT Professionals and Network Administrators: IT professionals, system administrators, or network engineers who want to enhance their security skills by learning how to identify, exploit, and protect against vulnerabilities using Python.
    • Hobbyists and Self-Learners: Individuals who have a passion for cybersecurity, ethical hacking, or programming and are eager to learn through guided projects, even without formal training or a professional background in the field.
    • Cybersecurity Enthusiasts Transitioning to Python: Those already familiar with other programming languages or security tools, looking to transition into Python for more powerful and flexible hacking solutions.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Nazar Diachok
    Nazar Diachok
    Instructor's Courses
    I am penetration tester and Cybersecurity specialist, i have a big experience in malware development. I have three certificates as network administartor CCNA, CCNA2 and CCNA3, and experience in many programming languages C/C++, C#, Python, Java Script, and windows/linux servers administration. I have CompTI Security+ certificate and know how to build security on a high level, i have a big experience and can share it with you
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 102
    • duration 14:47:28
    • Release Date 2024/10/03