Python For Ethical Hacking And Penetration Testing

Posted By: ELK1nG

Python For Ethical Hacking And Penetration Testing
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.09 GB | Duration: 17h 33m

Master Python from scratch and build 15+ hands-on cybersecurity tools for ethical hacking and penetration testing.

What you'll learn

Set up an ethical hacking lab with Kali Linux and Python.

Learn Python basics through cybersecurity-focused examples.

Develop your own socket communication tools.

Create and decrypt encrypted files with Python.

Build malware-like tools: keyloggers, backdoors, and trojans.

Sniff packets and analyze network traffic with Scapy.

Detect ARP spoofing attacks in your network.

Remotely control machines using Telnet and SSH in Python.

Crack passwords and hashes using Python scripting.

Package Python programs into Windows executables.

Automate website blocking and create background-running services.

Requirements

Basic computer knowledge.

A computer with at least 4GB RAM (for virtual machines).

No prior programming knowledge required — Python is taught from scratch.

Curiosity to explore cybersecurity ethically.

Description

Are you ready to take your ethical hacking and cybersecurity skills to the next level using Python?“Python for Ethical Hacking and Penetration Testing” is a complete hands-on course that teaches you how to use Python — one of the most powerful programming languages — to create your own hacking tools, automate tasks, and perform real-world cyberattacks in a safe, controlled environment.You’ll begin by setting up a professional virtual lab with Kali Linux and Windows. Whether you're a beginner with no coding experience or an IT professional looking to expand your skills, this course is designed to guide you step-by-step from the very basics of Python to advanced malware development and network exploitation.With each section, you'll build real, usable tools such as keyloggers, ARP spoofers, backdoors, packet sniffers, and more. You’ll also learn how hackers evade detection, make their programs persistent, and package scripts as executable trojans — all in Python. What You'll LearnSet up an ethical hacking lab using VirtualBox, Kali Linux, and WindowsMaster Python basics with cybersecurity-focused examplesAutomate tasks using loops, functions, and control flowBuild secure file encryption and decryption toolsDevelop advanced socket programs: client-server chat, file sharing, command executionSniff network packets and extract data using ScapyCreate powerful ARP spoofing tools and detection systemsBuild a full-featured keylogger and send logs via emailWrite a remote access backdoor and command execution systemConvert Python scripts into Windows executables (.exe)Create malware with persistence that runs on system startupBuild and automate a website blocker for Linux and WindowsCrack hashed passwords, ZIP files, and even Windows login passwordsUse Telnet and SSH protocols to control machines remotelyBy the end of this course, you'll not only understand the tools hackers use — you’ll know how to build them yourself using Python.Whether you want to launch a career in cybersecurity, prepare for a certification, or simply understand how attackers think, this course gives you the knowledge and skills to stand out. Why This Course?100% project-based learning with real-world toolsSuitable for both beginners and professionalsLearn ethical hacking in a legal and safe environmentTaught by an experienced instructor with real field knowledge Enroll today and start building your own Python hacking tools — take control of your cybersecurity journey!

Overview

Section 1: Course Overview

Lecture 1 Introduction to the Course

Lecture 2 Course Overview

Lecture 3 why Python

Section 2: Setting Up Your Ethical Hacking Lab

Lecture 4 Lab Overview Needed Software

Lecture 5 Installing Windows and Kali Linux on Virtual Box

Lecture 6 3. installing vs code in kali linux

Lecture 7 4. some basic commond of kali linux

Section 3: Installing and Configuring Python

Lecture 8 1_working with commonline

Lecture 9 2. lab overview needed software

Lecture 10 3. installing windows and kali linux on virtual box

Lecture 11 4. installing vs code in kali linux

Lecture 12 5. Running Python Code

Lecture 13 6. some basic commond of kali linux

Section 4: Python Basics for Security Experts

Lecture 14 1.Introduction to python datat types

Lecture 15 2_python Numbers

Lecture 16 3_variable Assignments

Lecture 17 4_introdcution to stirng

Lecture 18 5_string slicing and escape sequences

Lecture 19 6_string methods and manipulation

Lecture 20 7_length and string cantination and repitation

Lecture 21 8_Print formating with strings

Lecture 22 9_list In python

Lecture 23 10_Dictionary in python

Lecture 24 11_Tuple in python

Lecture 25 12_Sets in python

Lecture 26 13_Boolean In python

Lecture 27 14_IO with Basic Files in python

Lecture 28 15. Data Structure assessments Overview

Lecture 29 16. Assesment solution part one

Lecture 30 17. Assessment solution part two

Lecture 31 18. assessment solution part three

Section 5: Control Flows in Python

Lecture 32 1_for loops in python

Lecture 33 2_while loop in python

Lecture 34 3_Built-in function and operator keyword

Lecture 35 4_list comprehensions

Lecture 36 5_Comperason Operatores in python

Lecture 37 6_Logical Operators in python

Section 6: Functions and Methods in Python

Lecture 38 1_Methods in python part one

Lecture 39 2_function in python part two

Lecture 40 3_Logic with python function

Lecture 41 4_Function and Tuple unpacking in python

Lecture 42 5_argument and keyword argument in python

Lecture 43 6_Variable scope in python

Section 7: Advanced Socket Programming in Python

Lecture 44 1_socket programming create server

Lecture 45 2_socket programming create client and start chat

Lecture 46 3_HTTP client get methods

Lecture 47 4_HTTP client post methods

Lecture 48 5_http server and share file in the network

Lecture 49 6_Downloading file from a remote computer

Lecture 50 7_send command to the server

Section 8: Encrypting and Decrypting Files in Python

Lecture 51 1_file encryptions

Lecture 52 2_file_decryptions

Section 9: Mini Projects for Practice

Lecture 53 1. introduction to hash

Lecture 54 2. cracking zip file password with password list

Lecture 55 3. seprating password and hashed from one file in to two files

Lecture 56 4. generating Hash of a password list

Lecture 57 5. dycripting Hashed passwords

Lecture 58 6.cracking windows 11,10,8,7 passwords

Lecture 59 7. Execute Windows Command With Python

Lecture 60 12. Tracking Phone Location with python using API

Lecture 61 14. NetWork Scanner

Section 10: Remote Access Project: Controlling a PC

Lecture 62 1.How Networks work

Lecture 63 1_introduction to telnet and accessing machine remotly

Lecture 64 2_user telnet within python to control a pc remotley

Lecture 65 3_using ssh to get access remote to a computer

Lecture 66 4_execute command remotely with ssh

Section 11: Building an ARP Spoofer

Lecture 67 1. what is arp spoofing program and how does it work

Lecture 68 2. using arpspoof program

Lecture 69 3. creating and sending ARP response

Lecture 70 4. Extracting mac address from response

Lecture 71 5. using loops in arp spoofing

Lecture 72 6. improving the program by using counter

Lecture 73 7. Dynamic Printing

Lecture 74 8. Handling Exceptions

Lecture 75 9. restoring arp table when an exception occures

Section 12: Creating a Packet Sniffer

Lecture 76 1. sniffing packets using scapy

Lecture 77 2. extracting data from a specific layer

Lecture 78 3. Analysing Sniffed Packets _ Extracting Fields From Layers

Lecture 79 4. Analysing Fields _ Extracting Passwords

Lecture 80 5. Extracting URL

Lecture 81 6. Extracting data from windows

Section 13: ARP Spoofing Detection Tool

Lecture 82 1. Running Python Programs on Windows

Lecture 83 2. capturing and analyzing arp responses

Lecture 84 3. detecting arp spoofing attacks

Section 14: Writing a Keylogger in Python

Lecture 85 1. writing a basic keylogger

Lecture 86 2. global variables in keylogger

Lecture 87 3. logging special keys

Lecture 88 4. threading and recursion

Lecture 89 5. OOP, object oriented programming

Lecture 90 6. constructor methods and instance variables

Lecture 91 7. logging key-strikes and reporting by emails

Section 15: Creating Backdoors with Python

Lecture 92 1. client - server communication and connection types

Lecture 93 2. Connecting two remote computer using socket

Lecture 94 3. sending and receiving data over tcp

Lecture 95 4. execute system commond remotly

Lecture 96 5. implementing a server

Lecture 97 6. implementing skeleton for server - client communication

Lecture 98 7. Refactoring - Creating Listener Class

Lecture 99 8. Refactoring - Creating Backdoor class

Lecture 100 9. sending commands as list and implementing exit command

Lecture 101 10. changing directory in file systems

Lecture 102 11. downloading files from victim computers

Lecture 103 12. download any kind of file from hacked computer

Section 16: Packaging Python Malware

Lecture 104 1. Converting Python Programs To Windows Binary Executables

Lecture 105 2. Running Executables Silentely

Lecture 106 3. Persistencey

Lecture 107 4. running programs on startup

Lecture 108 5. Creating a Basic Trojan Using Download _ Execute Payload

Lecture 109 6. Creating a Trojan By Embedding Files In Program Code

Lecture 110 7. Adding an Icon to Generated Executables.mp4

Section 17: Website Blocker Project

Lecture 111 1. application archticature

Lecture 112 2. creating working houres

Lecture 113 3. adding website to host file

Lecture 114 4. deleting websites if exist

Lecture 115 5. website blocker in kali linux

Lecture 116 6. run the program in background in kali linux

Lecture 117 7. run the program in background in windows

Aspiring penetration testers and ethical hackers.,Python developers interested in security applications.,Security enthusiasts wanting to build real-world tools.,Anyone preparing for a cybersecurity career or certification.