×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Python for Ethical Hackers & Pentesters - Part 2
Multi Functioning Reverse Shell
Theory Behind Socket Programming (7:20)
Wine & Pyinstaller Installation (7:45)
Setting Up Listener (8:19)
Establishing Connection Between Target and Server (6:32)
Implementing Send & Recv Functions (11:30)
Executing Commands on Target System (11:44)
Importing JSON Library To Parse Data (8:21)
Converting Python Backdoor To .exe (8:15)
Using OS Library To Change Directory (10:00)
Downloading & Uploading Files To Target PC (19:07)
Hiding Our Backdoor And Creating Persistence (13:50)
Trying to Connect To Server Every 20 Seconds (7:55)
Downloading Files To Target PC (11:51)
Capturing Screenshot On Target PC (23:08)
Administrator Privilege Check (8:15)
Starting Other Programs With Our Shell (10:47)
Running Our Shell As An Image, Audio, Pdf (20:09)
Coding Keylogger
Installing Pynput (6:21)
Printing Space Character (8:50)
Calling Timer On Our Keylogger (9:58)
Adding Keylogger To Our Backdoor (13:00)
Command and Control Center
What Is A Threaded Server (5:07)
Accepting Connections With A Thread (13:14)
Managing Multiple Sessions (8:41)
Testing Threaded Server With Windows 10 Target (9:05)
Command And Control Center - Fixing Q Command (11:14)
Command And Control Center - Coding Exit Function (13:53)
Attacking Multiple targets And Gathering Botnet (16:29)
Website Penetration testing with Python
Stealing Saved Wireless Passwords (22:00)
Saving Passwords To a File (3:03)
Bruteforcing Gmail (10:15)
Bruteforcing Any Login Page Part 1 (13:01)
Bruteforcing Any Login Page Part 2 (10:11)
Finding Hidden Directories Part 1 (5:12)
Finding Hidden Directories Part 2 (6:40)
Discovering Subdomains (11:33)
Changing HTTP Headers (14:00)
Starting Basic And Digest Authentication Bruteforcer (10:25)
Controlling Threads (8:37)
Coding Run Function (10:10)
Printing Usage And Testing Our Program (12:38)
Taking A Look At Ransomware (8:22)
Attacking Multiple targets And Gathering Botnet
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock