Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Python3 For Ethical Hacking & Malware Dev From Scratch

    Posted By: ELK1nG
    Python3 For Ethical Hacking & Malware Dev From Scratch

    Python3 For Ethical Hacking & Malware Dev From Scratch
    Published 7/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 5.97 GB | Duration: 14h 48m

    Write 15+ hacking programs for hacking with advanced malware development | No prior knowledge required

    What you'll learn

    Malware development with python3

    Python3 for ethical hacking and penetration test

    Create advanced malwares with Pyhton3

    Advanced techniques for security bypass

    Create custom tools for ethical hacking

    100+ video materials

    presentation for each malware and tool

    13+ hours of hands on experience

    15+ tools and malwares creation

    basik networking

    Botnets creation

    Internet worm creation

    advanced tools creation

    advanced malware development

    Requirements

    basik programming experience would be an advantage but not required

    basik IT knowledge

    basik networking knowledge would be an advantage but not required

    Description

    This course, "Python3 for Ethical Hacking & Malware Development From Scratch," is meticulously designed for aspiring cybersecurity professionals eager to delve into the world of ethical hacking and advanced malware development. With no prior knowledge required, this course serves as an ideal starting point for beginners while offering substantial depth for those with some experience in the field.Participants will embark on a comprehensive journey, beginning with the fundamentals of Python3, the programming language renowned for its simplicity and versatility in cybersecurity. As the course progresses, learners will transition from basic programming concepts to crafting sophisticated hacking programs and developing advanced malware.Throughout the course, students will create over 15 practical hacking programs, each designed to enhance their understanding of various cybersecurity techniques and methodologies. These programs will cover a broad spectrum of hacking scenarios, including network penetration testing, vulnerability assessment, and data exfiltration. By actively developing these tools, learners will gain hands-on experience in identifying, exploiting, and mitigating security vulnerabilities.In addition to hacking techniques, the course places a significant emphasis on ethical considerations and the responsible use of hacking skills. Students will learn the importance of ethical hacking, legal frameworks, and best practices to ensure their activities contribute positively to the cybersecurity community.Advanced malware development is another cornerstone of this course. Participants will explore the intricacies of malware design, implementation, and analysis. They will learn to create stealthy, effective malware while understanding the defensive measures required to counteract such threats.By the end of this course, students will possess a robust toolkit of Python-based hacking programs and a solid foundation in malware development, equipping them with the skills necessary to excel in the dynamic field of cybersecurity.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 Before we start

    Section 2: Labs Setup

    Lecture 3 ISO and VMWARE Installation

    Lecture 4 Kali Linux Setup

    Lecture 5 Windows Setup

    Lecture 6 Python and VSCode Installation for Windows

    Lecture 7 Python and VSCode Installation for Kali Linux

    Section 3: Basik Python

    Lecture 8 Working with basik functions and variables

    Lecture 9 Lists an Dictionaries in Python

    Lecture 10 Working with if, elif, else

    Lecture 11 Loops in Python

    Lecture 12 Functions in Python

    Lecture 13 Error handling in Python

    Lecture 14 Threading inPython

    Lecture 15 Working with Files

    Lecture 16 More practice with Threads

    Lecture 17 Progress Bar in Python

    Section 4: Enumeration Tools

    Lecture 18 What is DNS?

    Lecture 19 Creating DNS Records Enumeration Tool

    Lecture 20 Creating Subdomain Enumeration Tool

    Lecture 21 Homework

    Section 5: PDF Protection Tool

    Lecture 22 First Function for PDF Protector

    Lecture 23 Finishing our PDF Protector

    Lecture 24 Homework

    Section 6: PDF Cracker Tool

    Lecture 25 Function to generate passwords on the fly

    Lecture 26 Extracting passwords from wordlist

    Lecture 27 Making our program faster

    Lecture 28 Takeing arguments from the user

    Lecture 29 Homework

    Section 7: Network Scanner

    Lecture 30 What is ARP?

    Lecture 31 Creating ARP request

    Lecture 32 Extracting info from the answer

    Lecture 33 Working with Threads for our program

    Lecture 34 Homework

    Section 8: Port Scanner

    Lecture 35 Creating main function for our program

    Lecture 36 Extracting Banner from our target

    Lecture 37 Working with Threads

    Lecture 38 Formating our result

    Lecture 39 Homework

    Section 9: Password Cracker

    Lecture 40 Function to generate passwords on the fly

    Lecture 41 Function to verify hash

    Lecture 42 Working with wordlist

    Lecture 43 Takeing input from the user

    Lecture 44 Homework

    Section 10: SSH cracker

    Lecture 45 What is SSH?

    Lecture 46 Init SSH connection

    Lecture 47 Error Handling

    Lecture 48 User input

    Lecture 49 Testing our program

    Lecture 50 Sarting our advanced SSH cracker

    Lecture 51 Functions to generate passwords on the fly & extract passwords from the wordlist

    Lecture 52 Working with user input

    Lecture 53 Testing our program

    Lecture 54 Fixing errors

    Lecture 55 Homework

    Section 11: FTP cracker

    Lecture 56 What is FTP?

    Lecture 57 Main function

    Lecture 58 Working with wordlist

    Lecture 59 Testing our basik program

    Lecture 60 Starting advanced program

    Lecture 61 Working with user input

    Lecture 62 Parse arguments

    Lecture 63 Testing our program

    Lecture 64 Homework

    Section 12: Keylogger creation

    Lecture 65 What is keylogger?

    Lecture 66 Creation of basik keylogger

    Lecture 67 Creation of more advanced keylogger

    Lecture 68 Homework

    Section 13: Reverse Shell

    Lecture 69 What is Reverse Shell

    Lecture 70 Creating custom Listener

    Lecture 71 Creating client side code

    Lecture 72 Functions to send and recieve data

    Lecture 73 cd, upload and download commands

    Lecture 74 Homework

    Section 14: Information Stealer

    Lecture 75 What is Info Stealer?

    Lecture 76 Extracting decryption key

    Lecture 77 Extracting Credentials

    Lecture 78 Decrypting Extracted Passwords

    Lecture 79 Extracting data from clipboard

    Lecture 80 Extracting System Info

    Lecture 81 Testing our program

    Lecture 82 Homework

    Section 15: SSH Botnet

    Lecture 83 What is Botnet

    Lecture 84 First function for SSH Botnet

    Lecture 85 Init Connection

    Lecture 86 Testing and Fixing problems

    Lecture 87 Commands execution on our bots

    Lecture 88 Adding Function for DDOS

    Lecture 89 Testing and problems solving

    Lecture 90 Homework

    Section 16: Internet Worm

    Lecture 91 What is Internet Worm?

    Lecture 92 SSH exploit explanation

    Lecture 93 NFS exploit explanation

    Lecture 94 PsExec exploit explanation

    Lecture 95 WMI exploit explanation

    Lecture 96 RDP exploit explanation

    Lecture 97 Payload creation

    Lecture 98 Function to automatically scan network

    Lecture 99 Creation of SSH exploit

    Lecture 100 Testing and Fixing problems

    Lecture 101 Creating NFS, PsExec, WMI exploits

    Lecture 102 Testing and Fixing network problems

    Lecture 103 Creating RDP exploit

    Lecture 104 Homework

    Section 17: Traditional Botnet

    Lecture 105 Explanation of basik botnet

    Lecture 106 Starting our basik botnet

    Lecture 107 Creating Center for our botnet

    Lecture 108 Finishing our basik botnet

    Lecture 109 explanation of advanced botnet

    Lecture 110 ddos

    Lecture 111 extracting passwords

    Lecture 112 Secure Communication

    Lecture 113 Main function

    Lecture 114 String obfuscation and advanced techniques on client side code

    Lecture 115 Testing our Advanced Botnet

    Lecture 116 Homework

    This course is for people who are ready for new challenges