Python For Ethical Hacking And Penetration Testing
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.09 GB | Duration: 17h 33m
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.09 GB | Duration: 17h 33m
Master Python from scratch and build 15+ hands-on cybersecurity tools for ethical hacking and penetration testing.
What you'll learn
Set up an ethical hacking lab with Kali Linux and Python.
Learn Python basics through cybersecurity-focused examples.
Develop your own socket communication tools.
Create and decrypt encrypted files with Python.
Build malware-like tools: keyloggers, backdoors, and trojans.
Sniff packets and analyze network traffic with Scapy.
Detect ARP spoofing attacks in your network.
Remotely control machines using Telnet and SSH in Python.
Crack passwords and hashes using Python scripting.
Package Python programs into Windows executables.
Automate website blocking and create background-running services.
Requirements
Basic computer knowledge.
A computer with at least 4GB RAM (for virtual machines).
No prior programming knowledge required — Python is taught from scratch.
Curiosity to explore cybersecurity ethically.
Description
Are you ready to take your ethical hacking and cybersecurity skills to the next level using Python?“Python for Ethical Hacking and Penetration Testing” is a complete hands-on course that teaches you how to use Python — one of the most powerful programming languages — to create your own hacking tools, automate tasks, and perform real-world cyberattacks in a safe, controlled environment.You’ll begin by setting up a professional virtual lab with Kali Linux and Windows. Whether you're a beginner with no coding experience or an IT professional looking to expand your skills, this course is designed to guide you step-by-step from the very basics of Python to advanced malware development and network exploitation.With each section, you'll build real, usable tools such as keyloggers, ARP spoofers, backdoors, packet sniffers, and more. You’ll also learn how hackers evade detection, make their programs persistent, and package scripts as executable trojans — all in Python. What You'll LearnSet up an ethical hacking lab using VirtualBox, Kali Linux, and WindowsMaster Python basics with cybersecurity-focused examplesAutomate tasks using loops, functions, and control flowBuild secure file encryption and decryption toolsDevelop advanced socket programs: client-server chat, file sharing, command executionSniff network packets and extract data using ScapyCreate powerful ARP spoofing tools and detection systemsBuild a full-featured keylogger and send logs via emailWrite a remote access backdoor and command execution systemConvert Python scripts into Windows executables (.exe)Create malware with persistence that runs on system startupBuild and automate a website blocker for Linux and WindowsCrack hashed passwords, ZIP files, and even Windows login passwordsUse Telnet and SSH protocols to control machines remotelyBy the end of this course, you'll not only understand the tools hackers use — you’ll know how to build them yourself using Python.Whether you want to launch a career in cybersecurity, prepare for a certification, or simply understand how attackers think, this course gives you the knowledge and skills to stand out. Why This Course?100% project-based learning with real-world toolsSuitable for both beginners and professionalsLearn ethical hacking in a legal and safe environmentTaught by an experienced instructor with real field knowledge Enroll today and start building your own Python hacking tools — take control of your cybersecurity journey!
Overview
Section 1: Course Overview
Lecture 1 Introduction to the Course
Lecture 2 Course Overview
Lecture 3 why Python
Section 2: Setting Up Your Ethical Hacking Lab
Lecture 4 Lab Overview Needed Software
Lecture 5 Installing Windows and Kali Linux on Virtual Box
Lecture 6 3. installing vs code in kali linux
Lecture 7 4. some basic commond of kali linux
Section 3: Installing and Configuring Python
Lecture 8 1_working with commonline
Lecture 9 2. lab overview needed software
Lecture 10 3. installing windows and kali linux on virtual box
Lecture 11 4. installing vs code in kali linux
Lecture 12 5. Running Python Code
Lecture 13 6. some basic commond of kali linux
Section 4: Python Basics for Security Experts
Lecture 14 1.Introduction to python datat types
Lecture 15 2_python Numbers
Lecture 16 3_variable Assignments
Lecture 17 4_introdcution to stirng
Lecture 18 5_string slicing and escape sequences
Lecture 19 6_string methods and manipulation
Lecture 20 7_length and string cantination and repitation
Lecture 21 8_Print formating with strings
Lecture 22 9_list In python
Lecture 23 10_Dictionary in python
Lecture 24 11_Tuple in python
Lecture 25 12_Sets in python
Lecture 26 13_Boolean In python
Lecture 27 14_IO with Basic Files in python
Lecture 28 15. Data Structure assessments Overview
Lecture 29 16. Assesment solution part one
Lecture 30 17. Assessment solution part two
Lecture 31 18. assessment solution part three
Section 5: Control Flows in Python
Lecture 32 1_for loops in python
Lecture 33 2_while loop in python
Lecture 34 3_Built-in function and operator keyword
Lecture 35 4_list comprehensions
Lecture 36 5_Comperason Operatores in python
Lecture 37 6_Logical Operators in python
Section 6: Functions and Methods in Python
Lecture 38 1_Methods in python part one
Lecture 39 2_function in python part two
Lecture 40 3_Logic with python function
Lecture 41 4_Function and Tuple unpacking in python
Lecture 42 5_argument and keyword argument in python
Lecture 43 6_Variable scope in python
Section 7: Advanced Socket Programming in Python
Lecture 44 1_socket programming create server
Lecture 45 2_socket programming create client and start chat
Lecture 46 3_HTTP client get methods
Lecture 47 4_HTTP client post methods
Lecture 48 5_http server and share file in the network
Lecture 49 6_Downloading file from a remote computer
Lecture 50 7_send command to the server
Section 8: Encrypting and Decrypting Files in Python
Lecture 51 1_file encryptions
Lecture 52 2_file_decryptions
Section 9: Mini Projects for Practice
Lecture 53 1. introduction to hash
Lecture 54 2. cracking zip file password with password list
Lecture 55 3. seprating password and hashed from one file in to two files
Lecture 56 4. generating Hash of a password list
Lecture 57 5. dycripting Hashed passwords
Lecture 58 6.cracking windows 11,10,8,7 passwords
Lecture 59 7. Execute Windows Command With Python
Lecture 60 12. Tracking Phone Location with python using API
Lecture 61 14. NetWork Scanner
Section 10: Remote Access Project: Controlling a PC
Lecture 62 1.How Networks work
Lecture 63 1_introduction to telnet and accessing machine remotly
Lecture 64 2_user telnet within python to control a pc remotley
Lecture 65 3_using ssh to get access remote to a computer
Lecture 66 4_execute command remotely with ssh
Section 11: Building an ARP Spoofer
Lecture 67 1. what is arp spoofing program and how does it work
Lecture 68 2. using arpspoof program
Lecture 69 3. creating and sending ARP response
Lecture 70 4. Extracting mac address from response
Lecture 71 5. using loops in arp spoofing
Lecture 72 6. improving the program by using counter
Lecture 73 7. Dynamic Printing
Lecture 74 8. Handling Exceptions
Lecture 75 9. restoring arp table when an exception occures
Section 12: Creating a Packet Sniffer
Lecture 76 1. sniffing packets using scapy
Lecture 77 2. extracting data from a specific layer
Lecture 78 3. Analysing Sniffed Packets _ Extracting Fields From Layers
Lecture 79 4. Analysing Fields _ Extracting Passwords
Lecture 80 5. Extracting URL
Lecture 81 6. Extracting data from windows
Section 13: ARP Spoofing Detection Tool
Lecture 82 1. Running Python Programs on Windows
Lecture 83 2. capturing and analyzing arp responses
Lecture 84 3. detecting arp spoofing attacks
Section 14: Writing a Keylogger in Python
Lecture 85 1. writing a basic keylogger
Lecture 86 2. global variables in keylogger
Lecture 87 3. logging special keys
Lecture 88 4. threading and recursion
Lecture 89 5. OOP, object oriented programming
Lecture 90 6. constructor methods and instance variables
Lecture 91 7. logging key-strikes and reporting by emails
Section 15: Creating Backdoors with Python
Lecture 92 1. client - server communication and connection types
Lecture 93 2. Connecting two remote computer using socket
Lecture 94 3. sending and receiving data over tcp
Lecture 95 4. execute system commond remotly
Lecture 96 5. implementing a server
Lecture 97 6. implementing skeleton for server - client communication
Lecture 98 7. Refactoring - Creating Listener Class
Lecture 99 8. Refactoring - Creating Backdoor class
Lecture 100 9. sending commands as list and implementing exit command
Lecture 101 10. changing directory in file systems
Lecture 102 11. downloading files from victim computers
Lecture 103 12. download any kind of file from hacked computer
Section 16: Packaging Python Malware
Lecture 104 1. Converting Python Programs To Windows Binary Executables
Lecture 105 2. Running Executables Silentely
Lecture 106 3. Persistencey
Lecture 107 4. running programs on startup
Lecture 108 5. Creating a Basic Trojan Using Download _ Execute Payload
Lecture 109 6. Creating a Trojan By Embedding Files In Program Code
Lecture 110 7. Adding an Icon to Generated Executables.mp4
Section 17: Website Blocker Project
Lecture 111 1. application archticature
Lecture 112 2. creating working houres
Lecture 113 3. adding website to host file
Lecture 114 4. deleting websites if exist
Lecture 115 5. website blocker in kali linux
Lecture 116 6. run the program in background in kali linux
Lecture 117 7. run the program in background in windows
Aspiring penetration testers and ethical hackers.,Python developers interested in security applications.,Security enthusiasts wanting to build real-world tools.,Anyone preparing for a cybersecurity career or certification.