Uthena is completely renewed!

Sign up and sell your own courses with PLR licenses learn more

Discover our newest courses view courses

Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools
Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools

Course Details

Course Duration
    17.5 hours

Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools

    Advance your career in cyber security by learning how to use python for ethical hacking from Kali Linux installation to basic scripts and coding your own tools!
$37.81
ad406d09-6031-4d0d-925f-ff4a6b43fe33.png__PID:d680e215-74b8-4303-9236-ee46220280fb

Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools

Would you like to learn how to use python for ethical hacking from Kali Linux installation to basic scripts and coding your own tools because this knowledge can be useful for you to advance your ethical hacking career?

In this course you will learn:

Python for ethical hacking!
Port and vulnerability scanning
SSH & FTP attacks
Password cracking
Sniffers, flooders, and spoofers
Coding DNS spoofer
Network analysis
and more…

This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!

What do you learn in this course

Course Curriculum
    1. Introduction to Python for ethical hacking!
    - Welcome to Python for ethical hacking!
    - VirtualBox 6.0.4 installation
    - Kali Linux 2019.1a installation
    - Guest additions installation
    - Python in Kali terminal

    2. Port and vulnerability scanning
    - Making simple port scanner
    - Adding raw_input to our port scanner
    - Scanning first 1000 ports
    - Coding advance port scanner - part 1
    - Coding advance port scanner - part 2
    - Finishing and testing advance port scanner
    - Configuring IP address and installing Metasploitable
    - Returning banner from open port
    - Coding vulnerability scanner - part 1
    - Coding vulnerability scanner - part 2

    3. SSH & FTP attacks
    - Automating SSH login - part 1
    - Automating SSH login - part 2
    - Testing SSH login program
    - Coding SSH Bruteforcer
    - Executing command on target after brute forcing SSH
    - Anonymous FTP login attack
    - Username & password list attack on FTP

    4. Password cracking
    - SHA256, SHA512 and MD5
    - Cracking SHA1 hash with online dictionary
    - Getting password from MD5 hash
    - Cracking crypt password with Salt

    5. Sniffers, flooders, and spoofers
    - Changing MAC address manually
    - Coding MAC changer
    - Theory behind ARP spoofing
    - Crafting malicious ARP packet
    - Coding ARP spoofer
    - Forwarding packets and restoring ARP tables
    - Spoofing our IP address and sending message with TCP payload
    - Running SynFlooder with changed source IP address
    - Getting source and destination MAC address from received packets
    - Sniffing FTP username and password - part 1
    - Sniffing FTP username and password - part 2
    - Getting passwords from HTTP websites

    6. Coding DNS spoofer
    - Cloning any webpage
    - Printing DNS queries
    - Redirecting response to cloned page
    - Setting IP table rules and running DNS spoofer

    7. Network analysis
    - Analyzing Ethernet header
    - Analyzing IP header - part 1
    - Analyzing IP header - part 2
    - Analyzing TCP header
    - Analyzing UDP header

    8. Multi functioning reverse shell
    - Theory behind socket programming
    - Wine & Pyinstaller installation
    - Setting up listener
    - Establishing connection between target and server
    - Implementing send & recv functions
    - Executing commands on target system
    - Importing JSON library to parse data
    - Converting Python backdoor to .exe
    - Using OS library to change directory
    - Downloading & uploading files to target PC
    - Hiding our backdoor and creating persistence
    - Trying to connect to server every 20 seconds
    - Downloading files to target PC
    - Capturing screenshot on target PC
    - Administrator privilege check
    - Starting other programs with our shell
    - Running our shell as an image, audio, Pdf...

    9. Coding keylogger
    - Installing Pynput
    - Printing space character
    - Calling timer on our keylogger
    - Adding keylogger to our backdoor

    10. Command and control center
    - What is a threaded server
    - Accepting connections with a thread
    - Managing multiple sessions
    - Testing threaded server with Windows 10 target
    - Fixing Q command
    - Coding exit function
    - Attacking multiple targets and gathering botnet

    11. Website penetration testing with Python
    - Stealing saved wireless passwords
    - Saving passwords to a file
    - Bruteforcing Gmail
    - Bruteforcing any login page - part 1
    - Bruteforcing any login page - part 2
    - Finding hidden directories - part 1
    - Finding hidden directories - part 2
    - Discovering subdomains
    - Changing HTTP headers
    - Starting basic and digest authentication bruteforcer
    - Controlling threads
    - Coding run function
    - Printing usage and testing our program
    - Taking a look at ransomware
Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools
Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools
$37.81
Course Duration
    17.5 hours
✧ Access to High-Quality PLR Video Courses ✧    ✧ Full Customization Rights ✧    ✧ Time and Resource Efficiency ✧    ✧ Diverse Course Selection ✧    ✧ Scalability ✧    ✧ Cost-Effective Business Model ✧    ✧ Immediate Market Entry ✧    ✧ Enhanced Brand Authority ✧    ✧ Multiple Revenue Streams ✧    ✧ Flexible Pricing Control ✧    ✧ Comprehensive Instructor Support ✧    ✧ Community Engagement ✧    ✧ Marketing Assistance ✧    ✧ No Platform Restrictions ✧    ✧ Continuous Content Updates ✧   

You May Also Like

Artificial Intelligence explained for Beginners
Artificial Intelligence explained for Beginners

Artificial Intelligence explained for Beginners

$37.81
Python Pro - The Complete Python Bootcamp for Noobs
Python Pro - The Complete Python Bootcamp for Noobs

Python Pro - The Complete Python Bootcamp for Noobs

$37.81
How To Create and Manage SQLite Databases From Scratch
How To Create and Manage SQLite Databases From Scratch

How To Create and Manage SQLite Databases From Scratch

$37.81
Complete Network Hacking Course 2025: Beginner to Advanced
Complete Network Hacking Course 2025: Beginner to Advanced

Complete Network Hacking Course 2025: Beginner to Advanced

$47.81

Take this course today!

Finance Courses

download (16).jpeg__PID:5e3446c4-4069-404b-9908-0d86528aa28e

AI Courses

dNsJYY6kQfGsV9E8CBql_PLR-id111.webp__PID:ad419409-c383-4924-9c18-07727a8f49f3

Design Courses

WDyL9KU0TmLZGgKGGFIq_PLR-id021.webp__PID:bb0d40e1-5432-440e-8925-b664b890ed43

Hobby Courses

t2Dk3p1TTJKVrZXQEauf_MRR-id100.webp__PID:31caa22e-c67a-4e48-bb0d-40e15432040e

Marketing courses

download (17).jpeg__PID:1c180772-7a8f-49f3-b1ca-a22ec67ace48

Mental Health Courses

download (18).jpeg__PID:5d4db460-c1a5-43db-823b-fdc3cef59747

More courses

You may like these other courses

Artificial Intelligence explained for Beginners
Artificial Intelligence explained for Beginners

Artificial Intelligence explained for Beginners

$37.81
How To Create and Manage SQLite Databases From Scratch
How To Create and Manage SQLite Databases From Scratch

How To Create and Manage SQLite Databases From Scratch

$37.81
Complete Network Hacking Course 2025: Beginner to Advanced
Complete Network Hacking Course 2025: Beginner to Advanced

Complete Network Hacking Course 2025: Beginner to Advanced

$47.81
Python Pro - The Complete Python Bootcamp for Noobs
Python Pro - The Complete Python Bootcamp for Noobs

Python Pro - The Complete Python Bootcamp for Noobs

$37.81
Using ChatGPT for YouTube Growth
Using ChatGPT for YouTube Growth

Using ChatGPT for YouTube Growth

$19.00
#1 Cryptocurrency Mining Opportunity
#1 Cryptocurrency Mining Opportunity
#1 Cryptocurrency Mining Opportunity

#1 Cryptocurrency Mining Opportunity

$37.81
10 Step Startup: The Complete Entrepreneurship Course Online
10 Step Startup: The Complete Entrepreneurship Course Online

10 Step Startup: The Complete Entrepreneurship Course Online

$37.81
ChatGPT: The Complete Bootcamp for Beginners with Practical
ChatGPT: The Complete Bootcamp for Beginners with Practical

ChatGPT: The Complete Bootcamp for Beginners with Practical

$37.81
Complete Ethical Hacking Course 2025: Go From Zero to Hero
Complete Ethical Hacking Course 2025: Go From Zero to Hero

Complete Ethical Hacking Course 2025: Go From Zero to Hero

$47.81
Email marketing without asking for an email address!
Email marketing without asking for an email address!

Email marketing without asking for an email address!

$37.81
Creativity Productivity Challenge: Starting Over!
Creativity Productivity Challenge: Starting Over!

Creativity Productivity Challenge: Starting Over!

$37.81
Get Hired on Upwork!
Get Hired on Upwork!

Get Hired on Upwork!

$37.81
Create a Calculator Application in Android Studio
Create a Calculator Application in Android Studio

Create a Calculator Application in Android Studio

$37.81
Facebook & Social Media Contests To Boost Engagement
Facebook & Social Media Contests To Boost Engagement

Facebook & Social Media Contests To Boost Engagement

$27.81

What can you do with PLR/MRR license for Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools

  • Private Label Right License (PLR)

    With a PLR license for the course: Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools you can do several things. The main benefits include the option to modify the content, as well as selling the course and keeping the income for yourself.

    [YES] Product may be sold separately
    [YES] Product may be bundled with other products
    [YES] Product can be a bonus for another product
    [YES] Can be added to paid membership sites
    [YES] Can add bonuses to the Product for sale
    [YES] Can be sold as a physical product
    [YES] Can be sold as a digital product
    [YES] You may put your own name on the sales letter
    [YES] You may rename the product
    [YES] You may edit the sales material
    [YES] You may edit the content of the product
    [YES] You may use the source code/material to create new products
    [YES] You may use the name(s) of the author/creator/seller of the Product
    [YES] Can translate the course into other languages
    [YES] Can be used to build a list

    [NO] Can offer Resale Rights
    [NO] Can be used for YouTube or other free video sites
    [NO] Can be added to free membership sites
    [NO] Can be given away for free
    [NO] Can be used or sold on Uthena
    [NO] Can be used or sold on Udemy, Skillshare, or other course platforms you don't own
    [NO] Can offer Master Resale Rights
    [NO] Can offer Private Label Rights

  • Master Resell Rights License (MRR)

    With a MRR license for the course: Python Hacking for Cyber Security from Basic Scripts to Coding Custom Tools you can do several things. The main benefit compared to a PLR license include the option to offer resell rights.

    [YES] Product may be sold separately
    [YES] Product may be bundled with other products
    [YES] Product can be a bonus for another product
    [YES] Can be added to paid membership sites
    [YES] Can add bonuses to the Product for sale
    [YES] Can be sold as a physical product
    [YES] Can be sold as a digital product
    [YES] You may put your own name on the sales letter
    [YES] You may rename the product
    [YES] You may edit the sales material
    [YES] You may edit the content of the product
    [YES] You may use the source code/material to create new products
    [YES] You may use the name(s) of the author/creator/seller of the Product
    [YES] Can translate the course into other languages
    [YES] Can be used to build a list
    [YES] Can offer Resale Rights

    [NO] Can be used for YouTube or other free video sites
    [NO] Can be added to free membership sites
    [NO] Can be given away for free
    [NO] Can be used or sold on Uthena
    [NO] Can be used or sold on Udemy, Skillshare, or other course platforms you don't own
    [NO] Can offer Master Resale Rights
    [NO] Can offer Private Label Rights