Udemy - Complete Python 3 for Ethical Hacking: Beginner To Advanced!

seeders: 31
leechers: 19
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 258
  • Language: English

Files

Complete Python 3 for Ethical Hacking Beginner To Advanced! [TutsNode.com] - Complete Python 3 for Ethical Hacking Beginner To Advanced! 14. Scanning with Nmap & Python
  • 3. NMAP Scanner using NMAP3 module.mp4 (319.5 MB)
  • 1. Port Scanner using SOCKET.mp4 (35.0 MB)
  • 1. Port Scanner using SOCKET.srt (6.0 KB)
  • 1.1 1_portscanner.py (0.6 KB)
  • 2. NMAP Scanner on OS.mp4 (210.6 MB)
  • 2. NMAP Scanner on OS.srt (27.7 KB)
  • 2.1 2_nmap_os.py (1.6 KB)
  • 3. NMAP Scanner using NMAP3 module.srt (40.4 KB)
  • 3.1 3_nmap_module.py (2.8 KB)
1. Introduction
  • 1. Introduction.mp4 (18.0 MB)
  • 1. Introduction.srt (2.3 KB)
2. Enviroment Installation
  • 1. Python on Windows.mp4 (24.4 MB)
  • 1. Python on Windows.srt (2.6 KB)
  • 1.1 Download Python.html (0.1 KB)
  • 2. Sublime Text on Windows.mp4 (9.3 MB)
  • 2. Sublime Text on Windows.srt (1.0 KB)
  • 2.1 Download Sublime.html (0.1 KB)
  • 3. Sublime Text configure.mp4 (22.0 MB)
  • 3. Sublime Text configure.srt (4.8 KB)
3. Basic Elements
  • 1. Hello World.mp4 (10.1 MB)
  • 1. Hello World.srt (2.2 KB)
  • 2. Data Types - String, Int, Float, Boolean.mp4 (33.6 MB)
  • 2. Data Types - String, Int, Float, Boolean.srt (6.6 KB)
  • 3. Arithmetic Operators.mp4 (20.7 MB)
  • 3. Arithmetic Operators.srt (4.2 KB)
  • 4. Logical Operators.mp4 (11.3 MB)
  • 4. Logical Operators.srt (2.5 KB)
  • 5. Data Entry using INPUTS.mp4 (5.7 MB)
  • 5. Data Entry using INPUTS.srt (1.4 KB)
4. Conditions
  • 1. If - Else.mp4 (13.2 MB)
  • 1. If - Else.srt (3.0 KB)
  • 2. Elif.mp4 (15.4 MB)
  • 2. Elif.srt (3.8 KB)
5. Loops
  • 1. While.mp4 (18.8 MB)
  • 1. While.srt (4.4 KB)
  • 2. For.mp4 (13.6 MB)
  • 2. For.srt (3.9 KB)
6. Collections
  • 1. Lists.mp4 (9.7 MB)
  • 1. Lists.srt (2.5 KB)
  • 2. Dictionaries.mp4 (14.9 MB)
  • 2. Dictionaries.srt (3.2 KB)
  • 3. Tuple.mp4 (3.6 MB)
  • 3. Tuple.srt (0.9 KB)
7. File Managment
  • 1. Reading Files.mp4 (10.7 MB)
  • 1. Reading Files.srt (2.6 KB)
  • 2. Writing Files.mp4 (4.5 MB)
  • 2. Writing Files.srt (1.3 KB)
  • 3. Adding information in Files.mp4 (7.3 MB)
  • 3. Adding information in Files.srt (2.1 KB)
8. Functions
  • 1. Functions and Arguments.mp4 (14.9 MB)
  • 1. Functions and Arguments.srt (3.4 KB)
  • 2. First Function.mp4 (27.9 MB)
  • 2. First Function.srt (5.1 KB)
9. Treatment of Exceptions
  • 1. Try - Except - Finally.mp4 (19.7 MB)
  • 1. Try - Except - Finally.srt (4.5 KB)
10. Modules
  • 1. Using Modules.mp4 (4.6 MB)
  • 1. Using Modules.srt (1.1 KB)
11. Laboratory Installation
  • 1. VMWare Installation.mp4 (34.2 MB)
  • 1. VMWare Installation.srt (2.4 KB)
  • 1.1 Download VMWare.html (0.1 KB)
  • 2. Installing Metasploitable2.mp4 (26.0 MB)
  • 2. Installing Metasploitable2.srt (2.8 KB)
  • 2.1 Download Metasploitable2.html (0.1 KB)
  • 3. Installing Kali Linux.mp4 (52.6 MB)
  • 3. Installing Kali Linux.srt (8.0 KB)
  • 3.1 Donwload Kali Linux.html (0.1 KB)
12. Information Collection - Recognize
  • 1. Findings Subdomains.mp4 (82.3 MB)
  • 1. Findings Subdomains.srt (11.0 KB)
  • 1.1 subdomains.txt (17.6 KB)
  • 1.2 1_subdomain.py (0.9 KB)
  • 2. Reading Services Banners.mp4 (19.1 MB)
  • 2. Reading Services Banners.srt (3.7 KB)
  • 2.1 2_bannergrabing.py (0.3 KB)
  • 3. Technologies Detections.mp4 (107.7 MB)
  • 3. Technologies Detections.srt (14.5 KB)
  • 3.1 3_technology_detector.py (0.8 KB)
  • 4. CloudFlare Validation.mp4 (22.1 MB)
  • 4. CloudFlare Validation.srt (4.2 KB)
  • 4.1 4_cloudflare.py (0.4 KB)
13. Wordpress Recognize
  • 1. Getting Website VERSION.mp4 (76.1 MB)
  • 1. Getting Website VERSION.srt (9.0 KB)
  • 1.1 1_version_detection.py (0.4 KB)
  • 2. Getting Website THEMES.mp4 (73.5 MB)
  • 2. Getting Website THEMES.srt (8.6 KB)
  • 2.1 2_themes_detection.py (0.7 KB)
  • 3. Getting Website PLUGINS.mp4 (38.1 MB)
  • 3. Getting Website PLUGINS.srt (5.7 KB)
  • 3.1 3_plugin_detection.py (0.7 KB)
  • 4. Getting Website USERS.mp4 (42.8 MB)
  • 4. Getting Website USERS.srt (6.3 KB)
  • 4.1 4_user_enum.py (0.4 KB)
15. Exploitation of Vulnerabilities
  • 1. Brute Force over FTP service.mp4 (48.7 MB)
  • 1. Brute Force over FTP service.srt (8.6 KB)
  • 1.1 user.txt (0.0 KB)
  • 1.2 password.txt (0.0 KB)
  • 1.3 1_bruteforce_ftp.py (0.6 KB)
  • 2. Exploitation of Local File Inclusion.mp4 (74.1 MB)
  • 2. Exploitation of Local File Inclusion.srt (12.8 KB)
  • 2.1 2_lfi.py (0.7 KB)
  • 2.2 payload_lfi.txt (497.6 KB)
  • 3. Password encryption and Hashing with Hashlib.mp4 (62.8 MB)
  • 3. Password encryption and Hashing with Hashlib.srt (13.4 KB)
  • 3.1 3_hashlib.py (0.8 KB)
  • 3.2 3_hashlib.py (0.8 KB)
  • 4. Password Guessing Attacks by Hashes Comparison.mp4 (112.6 MB)
  • 4. Password Guessing Attacks by Hashes Comparison.srt (15.6 KB)
  • 4.1 4_passwordguessing.py (1.5 KB)
16. Maintain Access
  • <

Description


Description

WELCOME TO THE MASTER IN ETHICAL HACKING AND PENTESTING WITH PYTHON 3!

Many thanks to all the students who put their trust in this course.

Why learn to program in Python 3?

It is one of the best languages ​​to start programming
Its syntax is simple and very neat, which allows for very clean code.
The learning curve allows students to get lower results.
It is a multiplatform language, used for Web Development, Desktop Application Development, Scripting and Process Automation.
It has a large number of modules and functionalities that will allow you to create your own programs and make implementations with many technologies.

How will knowing Python 3 contribute to our Ethical Hackers career?

Automate processes within the different phases of an Ethical Hacking
Exploit vulnerabilities
Find possible attack vectors
Exploit vulnerabilities in websites.
Scan websites for information.
Create backdoors
Create Scripts for Elevation of Privilege
Create Malware such as Ransomeware, Keyloggers and Trojans.

What exactly will we learn?

Programming from scratch
Hacking Tool Automation with Python 3
Develop Web Scanners
Creation of Malwares such as Ransomware, Keyloggers
Fundamentals of Ethical Hacking and Penetration Testing that every Hacker should have
Creation of tools for hacking and pentesting
Creation of tools to exploit Web vulnerabilities
Backdoor creation
Convert .py files to .EXE
Make inquiries to websites
Python 3 programming
Brute Force Attacks
Using Nmap and its implementation with Python
Process automation with Python 3
Install Python 3 and Sublime Text 3 on Windows & Linux
Developing desktop applications with Python 3
The most basic elements of Python
Using Conditions in Python: If – Elif – Else
Using Loops in Python: While & For
Using Collections in Python: Lists & Tuples & Dictionaries
File Management in Python: Create, Edit, Read and Delete Files
Use functions in Python to structure optimize and better structure your code
A robust foundation for programming in any other programming language

What if the course does not meet my expectations?

This course will address all your needs so that you can work as a Python Programmer oriented to Ethical Hacking, you can ask your questions in the question section of the course in case you need help or some concept explained is not clear. But in case the course for any reason does not meet your expectations, there is no need to worry, since Udemy offers you up to a month of guarantee, this means that you can request a TOTAL refund of your money.

* AT THE END YOU WILL OBTAIN A CERTIFICATE WITH THE TOTAL HOURS OF THE COURSE.

* All classes are available in Full HD 1080p with high definition.

* This is a complete course in which I will teach you from the most basic concepts to creating your own Python programs.

* No previous knowledge is required.
Who this course is for:

Any student or professional who wants to learn Python 3 from scratch
Any student or professional of Ethical Hacking who wants to take a next step in their career
Anyone who wants to venture into the world of Cybersecurity and Offensive Hacking Testing
Software developers, Ethical Hackers, IT Security Specialists, Entrepreneurs.
Anyone interested in learning ethical hacking / penetration testing

Requirements

You have to want to learn

Last Updated 12/2020



Download torrent
2.2 GB
seeders:31
leechers:19
Udemy - Complete Python 3 for Ethical Hacking: Beginner To Advanced!


Trackers

tracker name
udp://inferno.demonoid.pw:3391/announce
udp://tracker.openbittorrent.com:80/announce
udp://tracker.opentrackr.org:1337/announce
udp://torrent.gresille.org:80/announce
udp://glotorrents.pw:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.pirateparty.gr:6969/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://9.rarbg.to:2710/announce
udp://shadowshq.yi.org:6969/announce
udp://tracker.zer0day.to:1337/announce
µTorrent compatible trackers list

Download torrent
2.2 GB
seeders:31
leechers:19
Udemy - Complete Python 3 for Ethical Hacking: Beginner To Advanced!


Torrent hash: DF4534CC96342B9B3B5992BCC19E2FC90209CDCB