وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Python Hacking | Real Ethical Hacking with Python | PYCEH23+

سرفصل های دوره

Unlock the Real power of Python for hacking. Manipulate MAC addresses, execute MiTM attacks, develop RAT | PYCEH2023++


1. Introduction
  • 1. Why Python is Best Programming Language for Ethical Hacking and Pentest

  • 2. Introduction to Python
  • 1.1 A1+-+Defining+and+Printing+Variables.txt
  • 1. Defining and Printing Variables
  • 2.1 A2 - Finding Error and Reading Traceback in Python.txt
  • 2. Finding Error and Reading Traceback in Python

  • 3. Strings in Python
  • 1. Fully Understand Assignment Operator in 4 Minutes
  • 2.1 A2 - Using Methods with Strings.txt
  • 2. Using Methods with Strings
  • 3.1 A3 - Using F Strings and Methods.txt
  • 3. Using F Strings and Methods
  • 4.1 A4 - Playing With Newlines and Tabs.txt
  • 4. Playing With Newlines and Tabs
  • 5.1 A5 - Manipulation with Strings.txt
  • 5. Manipulation with Strings
  • 6.1 A6 - Single Quote and Double Quote.txt
  • 6. Single Quote and Double Quote

  • 4. Numbers in Python
  • 1.1 A1+-+Defining+and+Printing+Variables.txt
  • 1. Python Mathematics and Floats
  • 2.1 A1+-+Defining+and+Printing+Variables.txt
  • 2. Comments and Underscores in Kotlin

  • 5. Lists in Python
  • 1.1 A1 - Indexes, Lists and Creating Lists in Python.txt
  • 1. Indexes, Lists and Creating Lists in Python
  • 2. Adding and Removing Items from List
  • 3.1 A3 - Popping an Item from List.txt
  • 3. Popping an Item from List
  • 4.1 A4 - Removing an Item from List.txt
  • 4. Removing an Item from List
  • 5.1 A5 - Sorting List.txt
  • 5. Sorting List
  • 6.1 A6 - Len, Indexing Errors and Final of This Section.txt
  • 6. Len, Indexing Errors and Final of This Section

  • 6. Loops in Python
  • 1.1 A1 - Looping with Lists.txt
  • 1. Looping with Lists
  • 2.1 A2 - Playing with Loops.txt
  • 2. Playing with Loops
  • 3.1 A3 - Possible Errors with Loops.txt
  • 3. Possible Errors with Loops
  • 4.1 A4 - Using Range and Loops Together.txt
  • 4. Using Range and Loops Together
  • 5.1 A5 - Slices in with Lists and Loops.txt
  • 5. Slices in with Lists and Loops
  • 6.1 A6 - Using Slices vs Vars for Copying List.txt
  • 6. Using Slices vs Vars for Copying List
  • 7. Tuples vs Lists in Python

  • 7. If, Else, Else If
  • 1.1 A1 - Introduction to Conditions.txt
  • 1. Introduction to Conditions
  • 2.1 A3 - If Else with Example.txt
  • 2. If Else with Example
  • 3.1 A3 - If Else with Example.txt
  • 3. If Statement and Introduction to Expressions

  • 8. Functions in Python
  • 1.1 A1 - Defining simple Function in Python.txt
  • 1.2 A1+-+Defining+and+Printing+Variables.txt
  • 1. Defining simple Function in Python
  • 2.1 A2 - Parameters with Functions in Python.txt
  • 2. Parameters with Functions in Python
  • 3.1 A3 - Functions with Multi Parameters.txt
  • 3. Functions with Multi Parameters
  • 4.1 A4 - Default Values in Python.txt
  • 4. Default Values in Python
  • 5.1 A5 - Returning Variable from Function.txt
  • 5. Returning Variable from Function

  • 9. OOP - Classes in Python
  • 1.1 A1 - Creating Class with Functions and Understanding init method.txt
  • 1. Creating Class with Functions and Understanding init method
  • 2.1 A2 - Creating instances from Class.txt
  • 2. Creating instances from Class
  • 3.1 A3 - Creating more instances with classes.txt
  • 3. Creating more instances with classes

  • 10. OOP - Inheritance in Python
  • 1.1 A1 - Inheritance Application in 16 Minutes.txt
  • 1. Inheritance Application in 16 Minutes

  • 11. Manipulating MAC Address
  • 1. Manipulating MAC Address using Terminal
  • 2.1 A2 - Developing Python MAC Changer Program.txt
  • 2. Developing Python MAC Changer Program

  • 12. ARP Scanner
  • 1. Understanding ARP and ARP Table
  • 2.1 A2 - Creating Network Scanner from ZERO.txt
  • 2. Creating Network Scanner from ZERO

  • 13. Starting Practical with Nmap
  • 1. Nmaps Network Scanning Capabilities
  • 2. Beginning to Using NSE Scripts
  • 3. Port scanning on Servers
  • 4. Port scanning techniques and Interface Selection
  • 5. Nmap Using Target List and Exclude List with CIDR
  • 6. Nmap Operating System Detection
  • 7. Random Port Scanning and Legal Issues

  • 14. Developing MiTM Program with Python
  • 1. How MiTM Attack works in Reality
  • 2. Planning Our Program
  • 3.1 A3 - Creating Fake ARP Request Sender.txt
  • 3. Creating Fake ARP Request Sender
  • 4.1 A4 - Spoofing Router and Target at the same Time and Fixing Problems.txt
  • 4. Spoofing Router and Target at the same Time and Fixing Problems
  • 5. Intercepting Traffic and Hacking Login and Password from same network

  • 15. Creating Pentest RAT Malware - Sending Data or Messages - Server Client Side
  • 1. Understanding Sockets and its functions in Python
  • 2. Remote Access T - Part 1
  • 3. Remote Access T - Part 2
  • 4. Explaining Server side Line by Line
  • 5. Remote Access T - Coding Client Side
  • 6. Executing Client and Server Application on windows and kali

  • 16. Creating Pentest RAT Malware - Adding More Functionality
  • 1. Developing Server Side
  • 2. Developing Client Side and Executing it
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 17204
    حجم: 2933 مگابایت
    مدت زمان: 517 دقیقه
    تاریخ انتشار: 12 مرداد 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید