وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Learn Python & Ethical Hacking From Scratch

سرفصل های دوره

Write 20+ hacking programs to learn hacking and programming at the same time | No prior knowledge required


01-Training-Overview
  • 01-Description-of-Training.html
  • 02-Video-Overview-(3-00-)

  • 02-Section-1--Introduction
  • 01-Teaser-(7-29-)
  • 02-Course-Introduction-(6-31-)
  • 03-Introduction-to-Python-Programming-&-Ethical-Hacking-(6-13-)
  • 04-Lab-Overview-(5-54-)
  • 05-Initial-Preparation-(9-12-)
  • 06-Installing-Kali-Linux-as-a-VM-on-Windows-(9-16-)
  • 07-Installing-Kali-Linux-as-a-VM-on-Apple-Mac-OS-(Intel-&-Apple-Silicone)-(9-24-)
  • 08-Installing-Kali-Linux-as-a-VM-on-Linux-(10-41-)
  • 09-Basic-Overview-of-Kali-Linux-(5-22-)
  • 10-The-Terminal-&-Linux-Commands-(13-06-)
  • 11-Python-2-VS-Python-3-&-Writing-Our-First-Program-(9-08-)
  • 12-Installing-&-Using-a-Python-IDE-(9-32-)

  • 03-Section-2--Writing-a-MAC-Address-Changer---Python-Basics
  • 01-What-is-MAC-Address-&-How-To-Change-it-(7-41-)
  • 02-Using-Python-Modules-&-Executing-System-Commands-(9-18-)
  • 03-Implementing-a-Very-Basic-MAC-Changer-(5-16-)
  • 04-Variables-&-Strings-(10-12-)
  • 05-Using-Variables-in-MAC-Changer-(4-36-)
  • 06-Getting-Input-From-The-User-(6-18-)
  • 07-Handling-User-Input-(9-40-)
  • 08-Handling-Command-line-Arguments-(9-44-)
  • 09-Initialising-Variables-Based-on-Command-line-Arguments-(7-51-)
  • 10-Python-Functions-(9-40-)
  • 11-Returning-Values-From-Functions-(6-55-)
  • 12-Decision-Making-in-Python-(6-53-)
  • 13-Using-Conditional-Statements-in-MAC-Changer-(9-05-)

  • 04-Section-3--MAC-Changer---Algorithm-Design
  • 01-Introduction-to-Algorithms-(3-15-)
  • 02-Reading-Output-Returned-By-System-Commands-(6-24-)
  • 03-Regular-Expressions-(Regex)-(8-14-)
  • 04-Extracting-a-Substring-Using-Regex-(6-39-)
  • 05-Refactoring-&-Housekeeping-(10-59-)
  • 06-Implementing-The-Algorithm-to-Check-The-Mac-Did-Change-(6-11-)
  • 07-Python-3-Compatibility-(6-22-)

  • 05-Section-4--Programming-a-Network-Scanner
  • 01-Introduction-&-Teaser-(10-11-)
  • 02-Installing-Windows-as-a-Virtual-Machine-(5-44-)
  • 03-Installing-Windows-as-a-Virtual-Machine-on-Apple-Silicon-Computers-(4-53-)
  • 04-What-is-ARP-&-What-its-Used-For-(9-43-)
  • 05-Designing-an-Algorithm-To-Discover-Clients-Connected-To-The-Same-Network-(4-00-)
  • 06-Using-Scapy-To-Create-an-ARP-Request-(6-48-)
  • 07-Combining-Frames-To-Broadcast-Packets-(9-37-)
  • 08-Sending-&-Receiving-Packets-(6-57-)
  • 09-Introduction-Lists-in-Python-(8-20-)
  • 10-Iterating-Over-Lists-&-Analysing-Packet-(10-09-)
  • 11-Using-Escape-Characters-To-Enhance-Program-Output-(6-29-)
  • 12-Dictionaries-(9-37-)
  • 13-Improving-the-Program-Using-a-List-of-Dictionaries-(8-55-)
  • 14-Iterating-Over-Nested-Data-Structures-(7-18-)
  • 15-Assignment-1--Get-IP-Range-Using-Command-Line-Arguments.html
  • 16-Testing-The-Network-Scanner-With-Python-3-(4-38-)
      02-Installing-Windows-as-a-Virtual-Machine-(5-44-)
    • MSEdge-Win10-VMware.7z
    • win10-vm.zip
      03-Installing-Windows-as-a-Virtual-Machine-on-Apple-Silicon-Computers-(4-53-)
    • Windows 11 64-bit Arm.vmwarevm.7z
    • windows+11+64-bit+silicon.zip

  • 06-Section-5--Writing-an-ARP-Spoofer
  • 01-What-is-ARP-Spoofing-(6-20-)
  • 02-Redirecting-the-Flow-of-Packets-in-a-Network-Using-arpspoof-(5-08-)
  • 03-Creating-an-ARP-Response-(7-11-)
  • 04-Sending-ARP-Responses-(5-34-)
  • 05-Extracting-MAC-Address-From-Responses-(6-59-)
  • 06-Loops-(8-53-)
  • 07-More-on-Loops-&-Counters-(7-56-)
  • 08-Dynamic-Printing-(6-54-)
  • 09-Handling-Exceptions-(5-16-)
  • 10-Implementing-a-Restore-Function-(11-55-)
  • 11-Restoring-ARP-Tables-When-an-Exception-Occures-(5-33-)
  • 12-Assignment-2--Fix-Dynamic-Printing.html

  • 07-Section-6--Writing-a-Packet-Sniffer
  • 01-Introduction-&-Teaser-(4-39-)
  • 02-Sniffing-Packets-Using-Scapy-(7-20-)
  • 03-Extracting-data-From-a-Specific-Layer-(6-50-)
  • 04-Analysing-Sniffed-Packets-&-Extracting-Fields-From-Layers-(12-21-)
  • 05-Analysing-Fields-&-Extracting-Passwords-(11-05-)
  • 06-Extracting-URLs-(8-00-)
  • 07-Capturing-Passwords-From-Any-Computer-Connected-to-the-Same-Network-(8-03-)
  • 08-Strings-&-Bytes-in-Python-3-(7-19-)

  • 08-Section-7--Writing-a-DNS-Spoofer
  • 01-Intercepting-Packets---Creating-a-Proxy-(13-00-)
  • 02-Converting-Packets-to-Scapy-Packets-(9-21-)
  • 03-What-is-DNS-Spoofing-(7-20-)
  • 04-Filtering-DNS-Responses-(6-26-)
  • 05-Analysing-&-Creating-a-Custom-DNS-Response-(7-56-)
  • 06-Modifying-Packets-On-The-Fly-(7-57-)
  • 07-Redirecting-DNS-Responses-(5-45-)
  • 08-Assignment-3--Conversion-Between-Strings-&-Bytes.html

  • 09-Section-8--Writing-a-File-Interceptor
  • 01-Introduction-&-Teaser-(4-27-)
  • 02-Filtering-Traffic-Based-on-the-Port-Used-(9-22-)
  • 03-Analysing-HTTP-Requests-(5-54-)
  • 04-Intercepting-HTTP-Requests-(10-19-)
  • 05-Modifying-HTTP-Responses-on-The-Fly-(10-47-)
  • 06-Intercepting-&-Replacing-Downloads-on-The-Network-(10-13-)
  • 07-Assignment-4--Testing-The-File-Interceptor-With-Python-3.html

  • 10-Section-9--Writing-a-Code-Injector
  • 01-Introduction-&-Teaser-(1-20-)
  • 02-Analysing-HTTP-Responses-(6-49-)
  • 03-Replacing-a-Substring-Using-Regex-(7-15-)
  • 04-Decoding-HTTP-Responses-(9-48-)
  • 05-Modifying-HTTP-Responses-&-Injecting-Javascript-Code-in-HTML-Pages-(8-50-)
  • 06-Refactoring-&-Housekeeping-(8-29-)
  • 07-Debugging-Issues-(6-01-)
  • 08-Using-Groups-&-None-capturing-Regex-(8-57-)
  • 09-Recalculating-Content-Length-(11-38-)
  • 10-Assignment-5--Test-The-Code-Injector-With-Python-3.html
  • 11-BeEF-Overview-&-Basic-Hook-Method-(11-41-)
  • 12-Hooking-Computers-Using-code injector-(5-37-)
  • 13-Basic-BeEF-Commands-(4-24-)
  • 14-Delivering-Malware-Using-BeEF-(5-41-)

  • 11-Section-10--Bypassing-HTTPS
  • 01-How-to-Bypass-HTTPS-(10-49-)
  • 02-Bypassing-HTTPS-&-Sniffing-Login-Credentials-(5-40-)
  • 03-Replacing-Downloads-on-HTTPS-Pages-(7-57-)
  • 04-Injecting-Code-in-HTTPS-Pages-(8-16-)

  • 12-Section-11--Writing-an-ARP-Spoof-Detector
  • 01-Running-Python-Programs-on-Windows-(9-45-)
  • 02-Capturing-&-Analysing-ARP-Responses-(6-43-)
  • 03-Detecting-ARP-Spoofing-Attacks-(7-49-)

  • 13-Section-12--Writing-Malware
  • 01-Introduction-&-Teaser-(1-57-)
  • 02-Execute-System-Command-Payload-(9-40-)
  • 03-Sending-Emails-Using-Python-(12-43-)
  • 04-Filtering-Command-Output-Using-Regex-(10-07-)
  • 05-Stealing-WiFi-Passwords-Saved-on-a-Computer-(9-34-)
  • 06-Downloading-Files-From-Program-(7-49-)
  • 07-Writing-Files-on-Disk-(11-24-)
  • 08-Password-Recovery-Basics-(8-19-)
  • 09-Using-all-the-Above-to-Steal-Saved-Passwords-Remotely-(8-03-)
  • 10-Interacting-With-The-File-System-(9-43-)
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 43307
    حجم: 12910 مگابایت
    مدت زمان: 865 دقیقه
    تاریخ انتشار: ۶ بهمن ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید