Udemy | Offensive Python | Mastering Ethical Hacking Using Python [FTU]

seeders: 21
leechers: 7
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 428
  • Language: English

Files

[FTUForum.com] [UDEMY] Offensive Python Mastering Ethical Hacking Using Python [FTU] 1. Warming Up
  • 1. What is this course about .mp4 (12.7 MB)
  • 1. What is this course about .vtt (2.7 KB)
  • 2. Labs setup (network settings and python installation).mp4 (20.6 MB)
  • 2. Labs setup (network settings and python installation).vtt (3.2 KB)
2. Network security with python
  • 1. Introduction to netcat (nc & ncat).mp4 (29.1 MB)
  • 1. Introduction to netcat (nc & ncat).vtt (9.3 KB)
  • 2.1 example1.py.py (0.3 KB)
  • 2. Introduction to python sockets.mp4 (25.1 MB)
  • 2. Introduction to python sockets.vtt (10.0 KB)
  • 3.1 example2.py.py (0.4 KB)
  • 3. Write customized port scanner in python.mp4 (33.4 MB)
  • 3. Write customized port scanner in python.vtt (9.5 KB)
  • 4. Perform banner grabbing on open ports using netcat.mp4 (2.8 MB)
  • 4. Perform banner grabbing on open ports using netcat.vtt (1.5 KB)
  • 5.1 Understanding and Implementing Socks Server - A Guide TO set up a socks environment.html (0.2 KB)
  • 5. Write python script to bypass traffic using SOCKS - TOR network (part 1).mp4 (3.4 MB)
  • 5. Write python script to bypass traffic using SOCKS - TOR network (part 1).vtt (1.6 KB)
  • 6.1 example3.py.py (0.4 KB)
  • 6.2 Beginner’s Guide to Tor on Ubuntu.html (0.1 KB)
  • 6. Write python script to bypass traffic using SOCKS - TOR network (part 2).mp4 (15.5 MB)
  • 6. Write python script to bypass traffic using SOCKS - TOR network (part 2).vtt (5.9 KB)
  • 7. Teaser video User our wifi jammer to jam on wifi networks.mp4 (3.0 MB)
  • 7. Teaser video User our wifi jammer to jam on wifi networks.vtt (1.6 KB)
  • 8. Write python Jammer to jam wifi networks - Part1 (find all wifi networks).mp4 (15.3 MB)
  • 8. Write python Jammer to jam wifi networks - Part1 (find all wifi networks).vtt (6.6 KB)
  • 9.1 example4.py.py (0.9 KB)
  • 9. Write python Jammer to jam wifi networks - Part2 (build the jamming function).mp4 (17.9 MB)
  • 9. Write python Jammer to jam wifi networks - Part2 (build the jamming function).vtt (7.4 KB)
3. Web application security with python
  • 1. Handling URLs using python - Part1 (Introduction to URL handling).mp4 (17.2 MB)
  • 1. Handling URLs using python - Part1 (Introduction to URL handling).vtt (5.3 KB)
  • 2.1 example5.py.py (0.3 KB)
  • 2. Handling URLs using python - Part2 (Write a script to test php authentication).mp4 (13.6 MB)
  • 2. Handling URLs using python - Part2 (Write a script to test php authentication).vtt (5.9 KB)
  • 3.1 example6.py.py (0.3 KB)
  • 3. Write python script to control a web shell.mp4 (19.8 MB)
  • 3. Write python script to control a web shell.vtt (8.7 KB)
  • 4.1 example7.py.py (0.4 KB)
  • 4. Write python script to perform dictionary attack on web servers.mp4 (18.6 MB)
  • 4. Write python script to perform dictionary attack on web servers.vtt (8.3 KB)
4. Endpoint security with python
  • 10. Bypass Anti­Virus using Pyinstaller and py2exe (demo).mp4 (17.9 MB)
  • 10. Bypass Anti­Virus using Pyinstaller and py2exe (demo).vtt (5.4 KB)
  • 11. Write python script to execute commands without saving the commands.mp4 (10.2 MB)
  • 11. Write python script to execute commands without saving the commands.vtt (4.7 KB)
  • 1. Introduction to python shells.mp4 (4.3 MB)
  • 1. Introduction to python shells.vtt (2.1 KB)
  • 2.1 example8_2.py.py (0.2 KB)
  • 2.2 example8.py.py (0.4 KB)
  • 2. Write python reverse shell (Linux platform).mp4 (19.1 MB)
  • 2. Write python reverse shell (Linux platform).vtt (6.8 KB)
  • 3.1 rootkit.py.py (0.9 KB)
  • 3. Write python rootkit for Linux to invoke hidden reverse shell.mp4 (57.3 MB)
  • 3. Write python rootkit for Linux to invoke hidden reverse shell.vtt (15.3 KB)
  • 4.1 example8_2.py.py (0.2 KB)
  • 4. Write python reverse shell (Windows platform).mp4 (8.9 MB)
  • 4. Write python reverse shell (Windows platform).vtt (3.8 KB)
  • 5. Write python bind shell.mp4 (21.9 MB)
  • 5. Write python bind shell.vtt (9.0 KB)
  • 6.1 example9.py.py (0.5 KB)
  • 6. Protect your shell with password.mp4 (14.1 MB)
  • 6. Protect your shell with password.vtt (5.5 KB)
  • 7. Using pyinstaller to create win32 executable file.mp4 (46.9 MB)
  • 7. Using pyinstaller to create win32 executable file.vtt (12.7 KB)
  • 8. Using pyinstaller to create ELF executable file (Linux).mp4 (16.3 MB)
  • 8. Using pyinstaller to create ELF executable file (Linux).vtt (5.2 KB)
  • 9. Using py2exe to create win32 executable file.mp4 (19.7 MB)
  • 9. Using py2exe to create win32 executable file.vtt (5.7 KB)
5. Encryption basics with python
  • 1. Write python script to generate rainbow tables - Part 1 (Dealing with hashes).mp4 (13.6 MB)
  • 1. Write python script to generate rainbow tables - Part 1 (Dealing with hashes).vtt (5.7 KB)
  • 2. Write python script to generate rainbow tables - Part 2 (write the script).mp4 (14.1 MB)
  • 2. Write python script to generate rainbow tables - Part 2 (write the script).vtt (5.8 KB)
  • 3. Write python script to generate rainbow tables - Part 3 (save the results).mp4 (7.1 MB)
  • 3. Write python script to generate rainbow tables - Part 3 (save the results).vtt (2.5 KB)
  • 4.1 CheckSum.py.py (0.5 KB)
  • 4. Write python script to calculate checksum.mp4 (15.9 MB)
  • 4. Write python script to calculate checksum.vtt (6.6 KB)
  • 5. Write secure python reverse shell with ssl.mp4 (13.6 MB)
  • 5. Write secure python reverse shell with ssl.vtt (5.8 KB)
6. Buffer overflow basics with python
  • 1. Introduction to buffer overflow.mp4 (15.7 MB)
  • 1. Introduction to buffer overflow.vtt (8.1 KB)
  • 2.1 Basic reverse engineering with Immunity debugger.html (0.2 KB)
  • 2. Introduction to Immunity debugger.mp4 (10.7 MB)
  • 2. Introduction to Immunity debugger.vtt (4.3 KB)
  • 3. Introduction to fuzzing.mp4 (16.7 MB)
  • 3. Introduction to fuzzing.vtt (3.3 KB)
  • 4.1 FileFuzzer.py.py (0.4 KB)
  • 4. Write python file fuzzer.mp4 (64.8 MB)
  • 4. Write python file fuzzer.vtt (9.4 KB)
  • Discuss.FTUForum.com.html (31.9 KB)
  • FreeCoursesOnline.Me.html

Description



Learn how to write your own python Security scripts during any ethical hacking operation to get the job done like a PRO

Created by : Mohammad Askar
Last updated : 10/2017
Language : English
Caption (CC) : Included
Torrent Contains : 94 Files, 6 Folders
Course Source : https://www.udemy.com/offensive-python-mastering-ethical-hacking-using-python/

What you'll learn

• Build python backdoors to perform security test on your endpoints
• Build an ethical hacking tools with python to perform security test on wireless networks
• Dealing with exploits written in python
• Writing real world python scripts for penetration testing
• Growing your skills in penetration testing and python programming
• Simulate real world attacks on your network
• Creating executable python files for windows (exe files)
• Scarping web pages using python
• Customize your own penetration testing labs
• Creating executable python files for linux (elf files)
• Build your own tools to perform web penetration testing

Requirements

• Simple python skills
• General knowledge in IT
• Basics of ethical hacking
• Basics of linux operating system

Description

NOTE : I update this course monthly , so maybe you can see some sections with few lectures , especially for buffer overflow section , so don't worry about that :)

This course will teach you how to use python programming language during any penetration testing or ethical hacking operation , it will teach you how to write your own ethical hacking scripts on various information security fields like network security , web application security , and endpoint security.

Also this course will teach you how to deal with buffer overflow vulnerabilities on windows machines and how you can write fully customized fuzzers to help you in exploitation stage.

Each section of this course will be a wonderful journey , I will talk about a lot of interesting topics about each section , I will teach you how to think in a practical way to solve a lot of programmatic problems that you could face during any penetration testing operation.

First , we will talk about how you can build your own lab with simple network configuration , then we will talk about Netcat and how we can use it , because you need to know how we can send and receive data between the attacker machine and the target machine , Then we will talk about Python sockets , sockets type and where we can use each type , and also we will learn how we can use sockets to build a simple port scanner

Then we will talk about TOR network , and how we can build python scripts to perform anonymous penetration testing through TOR network using SOCKS , I will teach you multiple techniques to build the same scripts , because it's really important to train the student how he can use this techniques during penetration testing.

Also in this course , I talked about very interesting topic which is how we can write a Python wifi jammer , to jam on wifi networks , I talked about the theory that I will use , then we will write the code.

For web application security , I talked about some great topics about how we can handle a http requests in python and how we can use some libraries such as urllib2 , urllib to communicate with web servers without any problem , We will write a lot of interesting tools such as Web shell controller , authentication system cracker , and a lot of other interesting topics.

In the endpoint security section , I will focused on how you can build your own command line shells that works on linux and windows without any problems , and the types of this shells , we talked about reverse shell and bind shell , and how we can build a protected bind shell , and how you can use multiple techniques to execute commands on systems and bypass some security restrictions , I also talked about how we can convert python scripts to exe files on windows OS and ELF files on Linux OS and we will talk about how we can build python rootkit for linux that with hidden process.

In encryption basics section , I talked about a lot of useful things that you can use using python , such as hashing , creating rainbow tables , finally I will teach you how we can build a encrypted reverse shell with ssl.

Finally , the buffer overflow section , I will teach you how you can exploit a simple stack buffer overflow vulnerabilities on windows OS using python scripts , I will talk about just the basics of buffer overflow , and I will talk about the general topics only.

Who this course is for :

• Anyone who works in IT industry
• Anyone who works in information security industry
• Anyone who wants to learn some ethical hacking techniques with python
• Anyone who interested in information security.

For More Udemy Free Courses >>> https://ftuforum.com/
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.ftuforum.com/






Download torrent
657.4 MB
seeders:21
leechers:7
Udemy | Offensive Python | Mastering Ethical Hacking Using Python [FTU]


Trackers

tracker name
https://t.quic.ws:443/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://open.stealth.si:80/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://denis.stalker.upeer.me:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://tracker.tiny-vps.com:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://open.demonii.si:1337/announce
µTorrent compatible trackers list

Download torrent
657.4 MB
seeders:21
leechers:7
Udemy | Offensive Python | Mastering Ethical Hacking Using Python [FTU]


Torrent hash: 05812DA5C8BAAF82D99B617DC5E4F7DFB0039B79