Python3 For Ethical Hacking & Malware Dev From Scratch
Published 7/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.97 GB | Duration: 14h 48m
Published 7/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.97 GB | Duration: 14h 48m
Write 15+ hacking programs for hacking with advanced malware development | No prior knowledge required
What you'll learn
Malware development with python3
Python3 for ethical hacking and penetration test
Create advanced malwares with Pyhton3
Advanced techniques for security bypass
Create custom tools for ethical hacking
100+ video materials
presentation for each malware and tool
13+ hours of hands on experience
15+ tools and malwares creation
basik networking
Botnets creation
Internet worm creation
advanced tools creation
advanced malware development
Requirements
basik programming experience would be an advantage but not required
basik IT knowledge
basik networking knowledge would be an advantage but not required
Description
This course, "Python3 for Ethical Hacking & Malware Development From Scratch," is meticulously designed for aspiring cybersecurity professionals eager to delve into the world of ethical hacking and advanced malware development. With no prior knowledge required, this course serves as an ideal starting point for beginners while offering substantial depth for those with some experience in the field.Participants will embark on a comprehensive journey, beginning with the fundamentals of Python3, the programming language renowned for its simplicity and versatility in cybersecurity. As the course progresses, learners will transition from basic programming concepts to crafting sophisticated hacking programs and developing advanced malware.Throughout the course, students will create over 15 practical hacking programs, each designed to enhance their understanding of various cybersecurity techniques and methodologies. These programs will cover a broad spectrum of hacking scenarios, including network penetration testing, vulnerability assessment, and data exfiltration. By actively developing these tools, learners will gain hands-on experience in identifying, exploiting, and mitigating security vulnerabilities.In addition to hacking techniques, the course places a significant emphasis on ethical considerations and the responsible use of hacking skills. Students will learn the importance of ethical hacking, legal frameworks, and best practices to ensure their activities contribute positively to the cybersecurity community.Advanced malware development is another cornerstone of this course. Participants will explore the intricacies of malware design, implementation, and analysis. They will learn to create stealthy, effective malware while understanding the defensive measures required to counteract such threats.By the end of this course, students will possess a robust toolkit of Python-based hacking programs and a solid foundation in malware development, equipping them with the skills necessary to excel in the dynamic field of cybersecurity.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Before we start
Section 2: Labs Setup
Lecture 3 ISO and VMWARE Installation
Lecture 4 Kali Linux Setup
Lecture 5 Windows Setup
Lecture 6 Python and VSCode Installation for Windows
Lecture 7 Python and VSCode Installation for Kali Linux
Section 3: Basik Python
Lecture 8 Working with basik functions and variables
Lecture 9 Lists an Dictionaries in Python
Lecture 10 Working with if, elif, else
Lecture 11 Loops in Python
Lecture 12 Functions in Python
Lecture 13 Error handling in Python
Lecture 14 Threading inPython
Lecture 15 Working with Files
Lecture 16 More practice with Threads
Lecture 17 Progress Bar in Python
Section 4: Enumeration Tools
Lecture 18 What is DNS?
Lecture 19 Creating DNS Records Enumeration Tool
Lecture 20 Creating Subdomain Enumeration Tool
Lecture 21 Homework
Section 5: PDF Protection Tool
Lecture 22 First Function for PDF Protector
Lecture 23 Finishing our PDF Protector
Lecture 24 Homework
Section 6: PDF Cracker Tool
Lecture 25 Function to generate passwords on the fly
Lecture 26 Extracting passwords from wordlist
Lecture 27 Making our program faster
Lecture 28 Takeing arguments from the user
Lecture 29 Homework
Section 7: Network Scanner
Lecture 30 What is ARP?
Lecture 31 Creating ARP request
Lecture 32 Extracting info from the answer
Lecture 33 Working with Threads for our program
Lecture 34 Homework
Section 8: Port Scanner
Lecture 35 Creating main function for our program
Lecture 36 Extracting Banner from our target
Lecture 37 Working with Threads
Lecture 38 Formating our result
Lecture 39 Homework
Section 9: Password Cracker
Lecture 40 Function to generate passwords on the fly
Lecture 41 Function to verify hash
Lecture 42 Working with wordlist
Lecture 43 Takeing input from the user
Lecture 44 Homework
Section 10: SSH cracker
Lecture 45 What is SSH?
Lecture 46 Init SSH connection
Lecture 47 Error Handling
Lecture 48 User input
Lecture 49 Testing our program
Lecture 50 Sarting our advanced SSH cracker
Lecture 51 Functions to generate passwords on the fly & extract passwords from the wordlist
Lecture 52 Working with user input
Lecture 53 Testing our program
Lecture 54 Fixing errors
Lecture 55 Homework
Section 11: FTP cracker
Lecture 56 What is FTP?
Lecture 57 Main function
Lecture 58 Working with wordlist
Lecture 59 Testing our basik program
Lecture 60 Starting advanced program
Lecture 61 Working with user input
Lecture 62 Parse arguments
Lecture 63 Testing our program
Lecture 64 Homework
Section 12: Keylogger creation
Lecture 65 What is keylogger?
Lecture 66 Creation of basik keylogger
Lecture 67 Creation of more advanced keylogger
Lecture 68 Homework
Section 13: Reverse Shell
Lecture 69 What is Reverse Shell
Lecture 70 Creating custom Listener
Lecture 71 Creating client side code
Lecture 72 Functions to send and recieve data
Lecture 73 cd, upload and download commands
Lecture 74 Homework
Section 14: Information Stealer
Lecture 75 What is Info Stealer?
Lecture 76 Extracting decryption key
Lecture 77 Extracting Credentials
Lecture 78 Decrypting Extracted Passwords
Lecture 79 Extracting data from clipboard
Lecture 80 Extracting System Info
Lecture 81 Testing our program
Lecture 82 Homework
Section 15: SSH Botnet
Lecture 83 What is Botnet
Lecture 84 First function for SSH Botnet
Lecture 85 Init Connection
Lecture 86 Testing and Fixing problems
Lecture 87 Commands execution on our bots
Lecture 88 Adding Function for DDOS
Lecture 89 Testing and problems solving
Lecture 90 Homework
Section 16: Internet Worm
Lecture 91 What is Internet Worm?
Lecture 92 SSH exploit explanation
Lecture 93 NFS exploit explanation
Lecture 94 PsExec exploit explanation
Lecture 95 WMI exploit explanation
Lecture 96 RDP exploit explanation
Lecture 97 Payload creation
Lecture 98 Function to automatically scan network
Lecture 99 Creation of SSH exploit
Lecture 100 Testing and Fixing problems
Lecture 101 Creating NFS, PsExec, WMI exploits
Lecture 102 Testing and Fixing network problems
Lecture 103 Creating RDP exploit
Lecture 104 Homework
Section 17: Traditional Botnet
Lecture 105 Explanation of basik botnet
Lecture 106 Starting our basik botnet
Lecture 107 Creating Center for our botnet
Lecture 108 Finishing our basik botnet
Lecture 109 explanation of advanced botnet
Lecture 110 ddos
Lecture 111 extracting passwords
Lecture 112 Secure Communication
Lecture 113 Main function
Lecture 114 String obfuscation and advanced techniques on client side code
Lecture 115 Testing our Advanced Botnet
Lecture 116 Homework
This course is for people who are ready for new challenges