2019 Updated Python 3 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testing
BESTSELLER
Created by : Hussam Khrais
Last updated : 1/2019
Language : English
Torrent Contains : 106 Files, 8 Folders
Course Source : https://www.udemy.com/python-for-offensive-security-practical-course/
What you'll learn
• Learn how to code your own reverse shell [TCP+HTTP]
• Learn how to exfiltrate data from your target
• Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
• Replicate Metasploit features and and make an advanced shell
• Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking]
• Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
• Privilege escalation on windows with practical example
Requirements
• Basic knowledge in Python or ANY other programming/scripting languages
• Intermediate knowledge in penetration testing and ethical hacking
Description
When other's tools fail, writing your own makes you a true penetration tester!
Before You Enroll !
The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.
There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!
FAQ
Why Python?
• Easy to learn
• Cross platform
• Unlimited third party libraries
• Get your job done with few lines
• Ranked as #1 for the most popular programming languages
• Plenty of open source hacking tools are written in python which can be easily integrated within your script
How To Use This Course?
1. View the course in order, start from module 1 and move on.
2. Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum.
3. Don't skip the exercises, Google is your best friend.
4. Fall in love with Python, go for extra mile and start writing your own weapons!
How to reach me?
• Udemy forums in case you have ANY question or technical problem.
• LinkedIn if you have ANY questions prior taking the course, Ideas and collaboration are welcomed.
Who this course is for :
• Ethical hackers and penetration testers
• Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
• Information security professionals and cyber security consultants
• System and network security administrators
• Programmers who want to get their hands dirty.
For More Udemy Free Courses >>> https://ftuforum.com/ For more Lynda and other Courses >>> https://www.freecoursesonline.me/ Our Forum for discussion >>> https://discuss.ftuforum.com/
|
[FTUForum.com] [UDEMY] Python 3 For Offensive PenTest A Complete Practical Course [FTU]
0. Websites you may like
-
1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url (0.3 KB)
-
2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url (0.3 KB)
-
3. (NulledPremium.com) Download Cracked Website Themes, Plugins, Scripts And Stock Images.url (0.2 KB)
-
4. (FTUApps.com) Download Cracked Developers Applications For Free.url (0.2 KB)
-
5. (Discuss.FTUForum.com) FTU Discussion Forum.url (0.3 KB)
-
How you can help Team-FTU.txt (0.2 KB)
1. Quick Intro
-
1. Course Intro.mp4 (16.2 MB)
-
1. Course Intro.vtt (2.3 KB)
-
2. Preparing Kali 2 linux & Windows 10.html (2.4 KB)
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell
-
10. Coding a HTTP Reverse Shell.mp4 (113.2 MB)
-
10. Coding a HTTP Reverse Shell.vtt (10.1 KB)
-
11. Data Exfiltration.mp4 (96.9 MB)
-
11. Data Exfiltration.vtt (6.9 KB)
-
12. Exercise Switching user-agent value.html (0.4 KB)
-
13. Persistence Outline.mp4 (32.6 MB)
-
13. Persistence Outline.vtt (4.5 KB)
-
14. Making our HTTP Reverse Shell Persistent.mp4 (122.9 MB)
-
14. Making our HTTP Reverse Shell Persistent.vtt (8.8 KB)
-
15. Tuning the connection attempts.mp4 (56.6 MB)
-
15. Tuning the connection attempts.vtt (4.0 KB)
-
16. Final Notes & Countermeasures.html (2.7 KB)
-
1. Download Scripts.html (0.2 KB)
-
2. TCP Reverse Shell Outline.mp4 (36.3 MB)
-
2. TCP Reverse Shell Outline.vtt (4.8 KB)
-
3. Server Side - Coding a TCP Reverse Shell.mp4 (91.9 MB)
-
3. Server Side - Coding a TCP Reverse Shell.vtt (7.0 KB)
-
4. Client Side - Coding a TCP Reverse Shell.mp4 (78.1 MB)
-
4. Client Side - Coding a TCP Reverse Shell.vtt (7.1 KB)
-
5. Exercise Overcome Empty String.html (0.4 KB)
-
6. Coding a Low Level Data Exfiltration.mp4 (86.5 MB)
-
6. Coding a Low Level Data Exfiltration.vtt (6.9 KB)
-
7. Exporting To EXE.mp4 (36.8 MB)
-
7. Exporting To EXE.vtt (2.8 KB)
-
8. Exercise Downloading Tools From Hacker Machine.html (0.7 KB)
-
9. HTTP Reverse Shell Outline.mp4 (18.9 MB)
-
9. HTTP Reverse Shell Outline.vtt (18.9 MB)
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell
-
1. Download Scripts.html (0.2 KB)
-
2. DDNS Aware Shell.mp4 (54.5 MB)
-
3. Interacting with Twitter.mp4 (82.0 MB)
-
3. Interacting with Twitter.vtt (82.0 MB)
-
4. Exercise Twitter as DDNS Tweet your Kali IPport.html (0.6 KB)
-
5. Target Directory Navigation.mp4 (77.6 MB)
-
5. Target Directory Navigation.vtt (6.4 KB)
-
6. Replicating Metasploit Screen Capturing.mp4 (50.8 MB)
-
6. Replicating Metasploit Screen Capturing.vtt (4.9 KB)
-
7. Replicating Metasploit Searching for Content.mp4 (68.2 MB)
-
7. Replicating Metasploit Searching for Content.vtt (5.7 KB)
-
8. Integrating Low Level Port Scanner.mp4 (51.1 MB)
-
8. Integrating Low Level Port Scanner.vtt (5.4 KB)
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!
-
1. Download Scripts.html (0.2 KB)
-
2. Bypassing Host Based Firewall Outline.mp4 (21.6 MB)
-
2. Bypassing Host Based Firewall Outline.vtt (3.5 KB)
-
3. Hijacking Internet Explorer - Shell Over Internet Explorer.mp4 (55.9 MB)
-
3. Hijacking Internet Explorer - Shell Over Internet Explorer.vtt (5.0 KB)
-
4. Bypassing Reputation Filtering in Next Generation Firewalls - Outline.mp4 (20.3 MB)
-
4. Bypassing Reputation Filtering in Next Generation Firewalls - Outline.vtt (3.2 KB)
-
5. Interacting with Source Forge.mp4 (72.5 MB)
-
5. Interacting with Source Forge.vtt (5.9 KB)
-
6. Interacting with Google Forms.mp4 (48.6 MB)
-
6. Interacting with Google Forms.vtt (4.7 KB)
-
7. Exercise Putting All Together - Bypassing Botnet Filtering.html (0.2 KB)
5. Python 3 How Malware Abuse Cryptography Python Answers
-
1. Download Scripts.html (0.2 KB)
-
2. Bypassing IPS with Hand-Made XOR Encryption.mp4 (62.5 MB)
-
2. Bypassing IPS with Hand-Made XOR Encryption.vtt (8.1 KB)
-
3. Quick Introduction To Encryption Algorithms.mp4 (55.3 MB)
-
3. Quick Introduction To Encryption Algorithms.vtt (16.0 MB)
-
4. Protecting Your Tunnel with AES.mp4 (99.4 MB)
-
4. Protecting Your Tunnel with AES.vtt (9.4 KB)
-
5. Protecting Your Tunnel with RSA.mp4 (155.3 MB)
-
5. Protecting Your Tunnel with RSA.vtt (13.4 KB)
-
6. Developing One Time, Hybrid - Encryption Key.mp4 (56.5 MB)
-
6. Developing One Time, Hybrid - Encryption Key.vtt (5.0 KB)
6. Python 3 Windows 10 Kali 2 Passwords Hacking
-
10. Python in Firefox PoC.mp4 (50.6 MB)
-
10. Python in Firefox PoC.vtt (8.1 KB)
-
11. Exercise Python in Firefox EXE.mp4 (35.1 MB)
-
11. Exercise Python in Firefox EXE.vtt (5.0 KB)
-
12. Passwords Phishing - DNS Poisoning.mp4 (48.5 MB)
-
12. Passwords Phishing - DNS Poisoning.vtt (8.5 KB)
-
13. In Action Facebook Password Phishing.mp4 (52.3 MB)
-
13. In Action Facebook Password Phishing.vtt (9.3 KB)
-
14. Don't Skip Me! - Countermeasures.mp4 (17.5 MB)
-
14. Don't Skip Me! - Countermeasures.vtt (6.1 KB)
-
1. Download Scripts.html (0.2 KB)
-
2. Keylogger.mp4 (23.5 MB)
-
2. Keylogger.vtt (2.8 KB)
-
3. Quick note.html (0.5 KB)
-
4. Hijacking KeePass Password Manager.mp4 (26.4 MB)
-
4. Hijacking KeePass Password Manager.vtt (4.9 KB)
-
5. Bonus Dumping Saved Passwords Out of Google Chrome.mp4 (60.9 MB)
-
5. Bonus Dumping Saved Passwords Out of Google Chrome.vtt (12.6 KB)
-
6. Bonus Exercise Dumping Saved Passwords Out of Google Chrome.mp4 (12.3 MB)
-
6. Bonus Exercise Dumping Saved Passwords Out of Google Chrome.vtt (2.6 KB)
-
7. Quick note.html (0.4 KB)
-
8. Man in the Browser Outline.mp4 (23.6 MB)
-
8. Man in the Browser Outline.vtt (5.0 KB)
-
9. FireFox API Hooki
files
|
udp://tracker.iamhansen.xyz:2000/announce udp://tracker.torrent.eu.org:451/announce udp://tracker.cyberia.is:6969/announce udp://tracker.leechers-paradise.org:6969/announce udp://tracker.uw0.xyz:6969/announce udp://exodus.desync.com:6969/announce udp://explodie.org:6969/announce udp://denis.stalker.upeer.me:6969/announce udp://tracker.opentrackr.org:1337/announce udp://9.rarbg.to:2710/announce udp://tracker.tiny-vps.com:6969/announce udp://ipv4.tracker.harry.lu:80/announce udp://tracker.coppersurfer.tk:6969/announce udp://tracker.internetwarriors.net:1337/announce udp://open.demonii.si:1337/announce |