Uthena is completely renewed!

Sign up and sell your own courses with PLR licenses learn more

Discover our newest courses view courses

Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools

17.5 hours

Advance your career in cyber security by learning how to use python for ethical hacking from Kali Linux installation to basic scripts and coding your own tools!

Get Private Label rights for this online course today and start selling it as your own!

License Type
$3781

Get a PLR License and:

✔ Whitelabel and brand as your own
✔ Modify and change to your needs
✔ Sell as your own and get 100% of earnings
✔ Make it a part of your product or offering
✔ Direct access after purchase

Specifications

  • Units
    89

Curriculum

1. Introduction to Python for ethical hacking!
- Welcome to Python for ethical hacking!
- VirtualBox 6.0.4 installation
- Kali Linux 2019.1a installation
- Guest additions installation
- Python in Kali terminal

2. Port and vulnerability scanning
- Making simple port scanner
- Adding raw_input to our port scanner
- Scanning first 1000 ports
- Coding advance port scanner - part 1
- Coding advance port scanner - part 2
- Finishing and testing advance port scanner
- Configuring IP address and installing Metasploitable
- Returning banner from open port
- Coding vulnerability scanner - part 1
- Coding vulnerability scanner - part 2

3. SSH & FTP attacks
- Automating SSH login - part 1
- Automating SSH login - part 2
- Testing SSH login program
- Coding SSH Bruteforcer
- Executing command on target after brute forcing SSH
- Anonymous FTP login attack
- Username & password list attack on FTP

4. Password cracking
- SHA256, SHA512 and MD5
- Cracking SHA1 hash with online dictionary
- Getting password from MD5 hash
- Cracking crypt password with Salt

5. Sniffers, flooders, and spoofers
- Changing MAC address manually
- Coding MAC changer
- Theory behind ARP spoofing
- Crafting malicious ARP packet
- Coding ARP spoofer
- Forwarding packets and restoring ARP tables
- Spoofing our IP address and sending message with TCP payload
- Running SynFlooder with changed source IP address
- Getting source and destination MAC address from received packets
- Sniffing FTP username and password - part 1
- Sniffing FTP username and password - part 2
- Getting passwords from HTTP websites

6. Coding DNS spoofer
- Cloning any webpage
- Printing DNS queries
- Redirecting response to cloned page
- Setting IP table rules and running DNS spoofer

7. Network analysis
- Analyzing Ethernet header
- Analyzing IP header - part 1
- Analyzing IP header - part 2
- Analyzing TCP header
- Analyzing UDP header

8. Multi functioning reverse shell
- Theory behind socket programming
- Wine & Pyinstaller installation
- Setting up listener
- Establishing connection between target and server
- Implementing send & recv functions
- Executing commands on target system
- Importing JSON library to parse data
- Converting Python backdoor to .exe
- Using OS library to change directory
- Downloading & uploading files to target PC
- Hiding our backdoor and creating persistence
- Trying to connect to server every 20 seconds
- Downloading files to target PC
- Capturing screenshot on target PC
- Administrator privilege check
- Starting other programs with our shell
- Running our shell as an image, audio, Pdf...

9. Coding keylogger
- Installing Pynput
- Printing space character
- Calling timer on our keylogger
- Adding keylogger to our backdoor

10. Command and control center
- What is a threaded server
- Accepting connections with a thread
- Managing multiple sessions
- Testing threaded server with Windows 10 target
- Fixing Q command
- Coding exit function
- Attacking multiple targets and gathering botnet

11. Website penetration testing with Python
- Stealing saved wireless passwords
- Saving passwords to a file
- Bruteforcing Gmail
- Bruteforcing any login page - part 1
- Bruteforcing any login page - part 2
- Finding hidden directories - part 1
- Finding hidden directories - part 2
- Discovering subdomains
- Changing HTTP headers
- Starting basic and digest authentication bruteforcer
- Controlling threads
- Coding run function
- Printing usage and testing our program
- Taking a look at ransomware

  • Direct Access

    You will receive the download files directly after purchase

  • Make it your own

    Modify, improve and change the course to your liking.

  • 14 Day Return Right

    Not happy with the course? You can request a refund within 14 days.

Get Private Label Rights for this online course:

Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools

Unlock the world of ethical hacking with our comprehensive course on Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools. This expertly designed program is tailored for beginners seeking to build a strong foundation in using Python for cyber security. Whether you're interested in launching a career in ethical hacking or simply want to enhance your skills, this course provides you with essential knowledge and practical experience.

What You'll Learn:

  • Python Programming Basics: Understand the fundamentals of Python, crucial for ethical hacking.
  • Port and Vulnerability Scanning: Master techniques to identify and exploit vulnerabilities in networks.
  • SSH & FTP Attacks: Learn how to perform secure shell and file transfer protocol attacks effectively.
  • Password Cracking Techniques: Discover methods to crack passwords and safeguard systems.
  • Network Analysis Tools: Utilize sniffers, flooders, and spoofers to analyze network traffic.
  • DNS Spoofing: Code your own DNS spoofer to manipulate domain name resolutions.

Why Choose This Course?

This course is uniquely crafted for total beginners, requiring no prior knowledge of programming or hacking. Each module is structured to ensure a smooth learning curve, combining theory and practical activities. By the end of this course, you will be equipped with skills that not only enhance your ethical hacking career but also increase your confidence in the cyber security field.

Join us and transform your passion for technology into a powerful skill set in ethical hacking. Enroll now and take the first step towards mastering Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools!

About the instructor

Uthena

Uthena offers a range of courses created by instructors that prefer to remain anonymous.

  • Private Label Right License (PLR) for the course: Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools

    With a PLR license you can modify and change a course to your needs. Next to this, you can keep 100% of the income if you sell the course as a part of your own products. This is what you can do:

    [YES] Product may be sold separately
    [YES] Product may be bundled with other products
    [YES] Product can be a bonus for another product
    [YES] Can be added to paid membership sites
    [YES] Can add bonuses to the Product for sale
    [YES] Can be sold as a physical product
    [YES] Can be sold as a digital product
    [YES] You may put your own name on the sales letter
    [YES] You may rename the product
    [YES] You may edit the sales material
    [YES] You may edit the content of the product
    [YES] You may use the source code/material to create new products
    [YES] You may use the name(s) of the author/creator/seller of the Product
    [YES] Can translate the course into other languages
    [YES] Can be used to build a list

    [NO] Can offer Resale Rights
    [NO] Can be used for YouTube or other free video sites
    [NO] Can be added to free membership sites
    [NO] Can be given away for free
    [NO] Can be used or sold on Uthena
    [NO] Can be used or sold on Udemy, Skillshare, or other course platforms you don't own
    [NO] Can offer Master Resale Rights
    [NO] Can offer Private Label Rights