وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Python Hacking | Real Ethical Hacking with Python | PYCEH23+

سرفصل های دوره

Unlock the Real power of Python for hacking. Manipulate MAC addresses, execute MiTM attacks, develop RAT | PYCEH2023++


1. Introduction
  • 1. Why Python is Best Programming Language for Ethical Hacking and Pentest

  • 2. Introduction to Python
  • 1.1 A1+-+Defining+and+Printing+Variables.txt
  • 1. Defining and Printing Variables
  • 2.1 A2 - Finding Error and Reading Traceback in Python.txt
  • 2. Finding Error and Reading Traceback in Python

  • 3. Strings in Python
  • 1. Fully Understand Assignment Operator in 4 Minutes
  • 2.1 A2 - Using Methods with Strings.txt
  • 2. Using Methods with Strings
  • 3.1 A3 - Using F Strings and Methods.txt
  • 3. Using F Strings and Methods
  • 4.1 A4 - Playing With Newlines and Tabs.txt
  • 4. Playing With Newlines and Tabs
  • 5.1 A5 - Manipulation with Strings.txt
  • 5. Manipulation with Strings
  • 6.1 A6 - Single Quote and Double Quote.txt
  • 6. Single Quote and Double Quote

  • 4. Numbers in Python
  • 1.1 A1+-+Defining+and+Printing+Variables.txt
  • 1. Python Mathematics and Floats
  • 2.1 A1+-+Defining+and+Printing+Variables.txt
  • 2. Comments and Underscores in Kotlin

  • 5. Lists in Python
  • 1.1 A1 - Indexes, Lists and Creating Lists in Python.txt
  • 1. Indexes, Lists and Creating Lists in Python
  • 2. Adding and Removing Items from List
  • 3.1 A3 - Popping an Item from List.txt
  • 3. Popping an Item from List
  • 4.1 A4 - Removing an Item from List.txt
  • 4. Removing an Item from List
  • 5.1 A5 - Sorting List.txt
  • 5. Sorting List
  • 6.1 A6 - Len, Indexing Errors and Final of This Section.txt
  • 6. Len, Indexing Errors and Final of This Section

  • 6. Loops in Python
  • 1.1 A1 - Looping with Lists.txt
  • 1. Looping with Lists
  • 2.1 A2 - Playing with Loops.txt
  • 2. Playing with Loops
  • 3.1 A3 - Possible Errors with Loops.txt
  • 3. Possible Errors with Loops
  • 4.1 A4 - Using Range and Loops Together.txt
  • 4. Using Range and Loops Together
  • 5.1 A5 - Slices in with Lists and Loops.txt
  • 5. Slices in with Lists and Loops
  • 6.1 A6 - Using Slices vs Vars for Copying List.txt
  • 6. Using Slices vs Vars for Copying List
  • 7. Tuples vs Lists in Python

  • 7. If, Else, Else If
  • 1.1 A1 - Introduction to Conditions.txt
  • 1. Introduction to Conditions
  • 2.1 A3 - If Else with Example.txt
  • 2. If Else with Example
  • 3.1 A3 - If Else with Example.txt
  • 3. If Statement and Introduction to Expressions

  • 8. Functions in Python
  • 1.1 A1 - Defining simple Function in Python.txt
  • 1.2 A1+-+Defining+and+Printing+Variables.txt
  • 1. Defining simple Function in Python
  • 2.1 A2 - Parameters with Functions in Python.txt
  • 2. Parameters with Functions in Python
  • 3.1 A3 - Functions with Multi Parameters.txt
  • 3. Functions with Multi Parameters
  • 4.1 A4 - Default Values in Python.txt
  • 4. Default Values in Python
  • 5.1 A5 - Returning Variable from Function.txt
  • 5. Returning Variable from Function

  • 9. OOP - Classes in Python
  • 1.1 A1 - Creating Class with Functions and Understanding init method.txt
  • 1. Creating Class with Functions and Understanding init method
  • 2.1 A2 - Creating instances from Class.txt
  • 2. Creating instances from Class
  • 3.1 A3 - Creating more instances with classes.txt
  • 3. Creating more instances with classes

  • 10. OOP - Inheritance in Python
  • 1.1 A1 - Inheritance Application in 16 Minutes.txt
  • 1. Inheritance Application in 16 Minutes

  • 11. Manipulating MAC Address
  • 1. Manipulating MAC Address using Terminal
  • 2.1 A2 - Developing Python MAC Changer Program.txt
  • 2. Developing Python MAC Changer Program

  • 12. ARP Scanner
  • 1. Understanding ARP and ARP Table
  • 2.1 A2 - Creating Network Scanner from ZERO.txt
  • 2. Creating Network Scanner from ZERO

  • 13. Starting Practical with Nmap
  • 1. Nmaps Network Scanning Capabilities
  • 2. Beginning to Using NSE Scripts
  • 3. Port scanning on Servers
  • 4. Port scanning techniques and Interface Selection
  • 5. Nmap Using Target List and Exclude List with CIDR
  • 6. Nmap Operating System Detection
  • 7. Random Port Scanning and Legal Issues

  • 14. Developing MiTM Program with Python
  • 1. How MiTM Attack works in Reality
  • 2. Planning Our Program
  • 3.1 A3 - Creating Fake ARP Request Sender.txt
  • 3. Creating Fake ARP Request Sender
  • 4.1 A4 - Spoofing Router and Target at the same Time and Fixing Problems.txt
  • 4. Spoofing Router and Target at the same Time and Fixing Problems
  • 5. Intercepting Traffic and Hacking Login and Password from same network

  • 15. Creating Pentest RAT Malware - Sending Data or Messages - Server Client Side
  • 1. Understanding Sockets and its functions in Python
  • 2. Remote Access T - Part 1
  • 3. Remote Access T - Part 2
  • 4. Explaining Server side Line by Line
  • 5. Remote Access T - Coding Client Side
  • 6. Executing Client and Server Application on windows and kali

  • 16. Creating Pentest RAT Malware - Adding More Functionality
  • 1. Developing Server Side
  • 2. Developing Client Side and Executing it
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 17204
    حجم: 2933 مگابایت
    مدت زمان: 517 دقیقه
    تاریخ انتشار: ۱۲ مرداد ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید