Цена: 175 РУБ
Организатор: Robot
В списке нет видимых участников.
Robot
Robot
Складчик
  • #1

[Udemy] Learn Python & Ethical Hacking From Scratch [Zaid Sabih]

Ссылка на картинку
Изучите Python и этичный взлом с нуля

What you'll learn


- 170+ videos on Python programming & ethical hacking
- Install hacking lab & needed software (on Windows, OS X and Linux)
- Learn 2 topics at the same time - Python programming & Ethical Hacking
- Start from 0 up to a high-intermediate level
- Write over 20 ethical hacking and security programs
- Learn by example, by writing exciting programs
- Model problems, design solutions & implement them using Python
- Write programs in Python 2 and 3
- Write cross platform programs that work on Windows, OS X & Linux
- Have a deep understanding on how computer systems work
- Have a strong base & use the skills learned to write any program even if its not related to hacking
- Understand what is Hacking, what is Programming, and why are they related
- Design a testing lab to practice hacking & programming safely
- Interact & use Linux terminal
- Understand what MAC address is & how to change it
- Write a python program to change MAC address
- Use Python modules and libraries
- Understand Object Oriented Programming
- Write object oriented programs
- Model & design extendable programs
- Write a program to discover devices connected to the same network
- Read, analyse & manipulate network packets
- Understand & interact with different network layers such as ARP, DNS, HTTP ....etc
- Write a program to redirect the flow of packets in a network (arp spoofer)
- Write a packet sniffer to filter interesting data such as usernames and passwords
- Write a program to redirect DNS requests (DNS Spoofer)
- Intercept and modify network packets on the fly
- Write a program to replace downloads requested by any computer on the network
- Analyse & modify HTTP requests and responses
- Inject code in HTML pages loaded by any computer on the same network
- Downgrade HTTPS to HTTP
- Write a program to detect ARP Spoofing attacks
- Write payloads to download a file, execute command, download & execute, download execute & report .....etc
- Use sockets to send data over TCP
- Send data reliably over TCP
- Write client-server programs
- Write a backdoor that works on Windows, OS X and Linux
- Implement cool features in the backdoor such as file system access, upload and download files and persistence
- Write a remote keylogger that can register all keystrikes and send them by Email
- Interact with files using python (read, write & modify)
- Convert python programs to binary executables that work on Windows, OS X and Linux
- Convert malware to torjans that work and function like other file types like an image or a PDF
- Bypass Anti-Virus Programs
- Understand how websites work, the technologies used and how to test them for weaknesses
- Send requests towebsites and analyse responses
- Write a program that can discover hidden paths in a website
- Write a program that can map a website and discover all links, subdomains, files and directories
- Extract and submit forms from python
- Run dictionary attacks and guess login information on login pages
- Analyse HTML using Python
- Interact with websites using Python
- Write a program that can discover vulnerabilities in websites

Requirements

- Basic IT knowledge
- No Linux, programming or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory
- Operating System: Windows / OS X / Linux

Description

Welcome to my comprehensive course on python programming and ethical hacking. The course assumes you have NO prior knowledge in any of these topics, and by the end of it you'll be at a high intermediate level being able to combine both of these skills to write python programs to hack into computer systems exactly the same way that black hat hackers do. That's not all, you'll also be able to use the programming skills you learn to write any program even if it has nothing to do with hacking.
This course is highly practical but it won't neglect the theory, we'll start with basics of ethical hacking and python programming and installing the needed software. Then we'll dive and start programming straight away. You'll learn everything by example, by writing useful hacking programs, no boring dry programming lectures.
The course is divided into a number of sections, each aims to achieve a specific goal, the goal is usually to hack into a certain system! We'll start by learning how this system work and its weaknesses, then you'll lean how to write a python program to exploit these weaknesses and hack the system. As we write the program I will teach you python programming from scratch covering one topic at a time. By the end of the course you're going to have a number of ethical hacking programs written by yourself (see below) from backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools and the list goes on. You'll also have a deep understanding on how computer systems work, how to model problems, design an algorithm to solve problems and implement the solution using python.
As mentioned in this course you will learn both ethical hacking and programming at the same time, here are some of the topics that will be covered in the course:

Programming topics:

- Writing programs for python 2 and 3.
- Using modules and libraries.
- Variables, types ...etc.
- Handling user input.
- Reading and writing files.
- Functions.
- Loops.
- Data structures.
- Regex.
- Decision making.
- Recursion.
- Threading.
- Object oriented programming.
- Packet manipulation using scapy.
- Netfilterqueue.
- Socket programming.
- String manipulation.
- Exceptions.
- Serialisation.
- Compiling programs to binary executables.
- Sending & receiving HTTP requests.
- Parsing HTML.
- + more!

Hacking topics:

- Basics of network hacking / penetration testing.
- Changing MAC address & bypassing filtering.
- Network mapping.
- ARP Spoofing - redirect the flow of packets in a network.
- DNS Spoofing - redirect requests from one website to another.
- Spying on any client connected to the network - see usernames, passwords, visited urls ....etc.
- Inject code in pages loaded by any computer connected to the same network.
- Replace files on the fly as they get downloaded by any computer on the same network.
- Detect ARP spoofing attacks.
- Bypass HTTPS.
- Create malware for Windows, OS X and Linux.
- Create trojans for Windows, OS X and Linux.
- Hack Windows, OS X and Linux using custom backdoor.
- Bypass Anti-Virus programs.
- Use fake login prompt to steal credentials.
- Display fake updates.
- Use own keylogger to spy on everything typed on a Windows & Linux.
- Learn the basics of website hacking / penetration testing.
- Discover subdomains.
- Discover hidden files and directories in a website.
- Run wordlist attacks to guess login information.
- Discover and exploit XSS vulnerabilities.
- Discover weaknesses in websites using own vulnerability scanner.
:)

Programs you'll build in this course:

You'll learn all the above by implementing the following hacking programs
- mac_changer - changes MAC Address to anything we want.
- network_scanner - scans network and discovers the IP and MAC address of all connected clients.
- arp_spoofer - runs an arp spoofing attack to redirect the flow of packets in the network allowing us to intercept data.
- packet_sniffer - filters intercepted data and shows usernames, passwords, visited links ....etc
- dns_spoofer - redirects DNS requests, eg: redirects requests to from one domain to another.
- file_interceptor - replaces intercepted files with any file we want.
- code_injector - injects code in intercepted HTML pages.
- arpspoof_detector - detects ARP spoofing attacks.
- execute_command payload - executes a system command on the computer it gets executed on.
- execute_and_report payload - executes a system command and reports result via email.
- download_and_execute payload - downloads a file and executes it on target system.
- download_execute_and_report payload - downloads a file, executes it, and reports result by email.
- reverse_backdoor - gives remote control over the system it gets executed on, allows us to
- - Access file system.
- - Execute system commands.
- - Download & upload files
- keylogger - records key-strikes and sends them to us by email.
- crawler - discovers hidden paths on a target website.
- discover_subdomains - discovers subdomains on target website.
- spider - maps the whole target website and discovers all files, directories and links.
- guess_login - runs a wordlist attack to guess login information.
- vulnerability_scanner - scans a target website for weaknesses and produces a report with all findings.

As you build the above you'll learn:

- Setting up a penetration testing lab to practice hacking safely.
- Installing Kali Linux and Windows as virtual machines inside ANY operating system.
- Linux Basics.
- Linux terminal basics.
- How networks work.
- How clients communicate in a network.
- Address Resolution Protocol - ARP.
- Network layers.
- Domain Name System - DNS.
- Hypertext Transfer Protocol - HTTP.
- HTTPS.
- How anti-virus programs work.
- Sockets.
- Connecting devices over TCP.
- Transferring data over TCP.
- How website work.
- GET & POST requests.
- And more!
By the end of the course you're going to have programming skills to write any program even if it has nothing to do with hacking, but you'll learn programming by programming hacking tools!
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.

Notes:

- This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
- This course is totally a product of Zaid Sabih & zSecurity, no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANISATION IS INVOLVED.

Who this course is for:

- Anybody interested in learning Python programming
- Anybody interested in learning ethical hacking / penetration testing

Содержание:

01 Introduction
001 Teaser.mp4 [89m 139k 294]
001 Teaser_en.srt [9k 404]
002 Course Introduction.mp4 [75m 497k 579]
002 Course Introduction_en.srt [8k 233]
003 Introduction to Python Programming & Ethical Hacking.mp4 [114m 444k 694]
003 Introduction to Python Programming & Ethical Hacking_en.srt [8k 833]
004 Lab Overview.mp4 [16m 638k 232]
004 Lab Overview_en.srt [7k 800]
005 Initial Preparation.mp4 [84m 418k 296]
005 Initial Preparation_en.srt [12k 103]
006 Installing Kali Linux as a VM on Windows.mp4 [45m 460k 13]
006 Installing Kali Linux as a VM on Windows_en.srt [12k 509]
007 Installing Kali Linux as a VM on Apple Mac OS.mp4 [36m 506k 656]
007 Installing Kali Linux as a VM on Apple Mac OS_en.srt [13k 181]
008 Installing Kali Linux as a VM on M1 Apple Computers.mp4 [36m 596k 607]
008 Installing Kali Linux as a VM on M1 Apple Computers_en.srt [13k 425]
009 Installing Kali Linux as a VM on Linux.mp4 [57m 410k 881]
009 Installing Kali Linux as a VM on Linux_en.srt [14k 414]
010 Basic Overview of Kali Linux.mp4 [16m 421k 993]
010 Basic Overview of Kali Linux_en.srt [6k 996]
011 The Terminal & Linux Commands.mp4 [158m 689k 410]
011 The Terminal & Linux Commands_en.srt [17k 364]
012 Python 2 VS Python 3 & Writing Our First Program.mp4 [29m 216k 322]
012 Python 2 VS Python 3 & Writing Our First Program_en.srt [12k 291]
013 Installing & Using a Python IDE.mp4 [30m 254k 741]
013 Installing & Using a Python IDE_en.srt [11k 985]
014 external-assets-links.txt [1k 99]
02 Writing a MAC Address Changer - Python Basics
015 mac-changer.pdf [1m 4k 72]
016 What is MAC Address & How To Change it.mp4 [95m 393k 820]
016 What is MAC Address & How To Change it_en.srt [9k 843]
017 Using Python Modules & Executing System Commands.mp4 [63m 390k 934]
017 Using Python Modules & Executing System Commands_en.srt [12k 835]
018 Implementing a Very Basic MAC Changer.mp4 [10m 466k 477]
018 Implementing a Very Basic MAC Changer_en.srt [7k 22]
019 Variables & Strings.mp4 [22m 177k 28]
019 Variables & Strings_en.srt [13k 132]
020 Using Variables in MAC Changer.mp4 [15m 375k 179]
020 Using Variables in MAC Changer_en.srt [5k 864]
021 Getting Input From The User.mp4 [28m 392k 892]
021 Getting Input From The User_en.srt [8k 274]
022 Handling User Input.mp4 [55m 191k 183]
022 Handling User Input_en.srt [12k 562]
023 Handling Command-line Arguments.mp4 [40m 903k 472]
023 Handling Command-line Arguments_en.srt [12k 228]
024 Initialising Variables Based on Command-line Arguments.mp4 [40m 574k 10]
024 Initialising Variables Based on Command-line Arguments_en.srt [9k 524]
025 Python Functions.mp4 [82m 748k 881]
025 Python Functions_en.srt [13k 133]
026 Returning Values From Functions.mp4 [23m 7k 711]
026 Returning Values From Functions_en.srt [8k 926]
027 Decision Making in Python.mp4 [27m 928k 333]
027 Decision Making in Python_en.srt [9k 440]
028 Using Conditional Statements in MAC Changer.mp4 [55m 833k 966]
028 Using Conditional Statements in MAC Changer_en.srt [11k 728]
029 external-assets-links.txt [689]
03 MAC Changer - Algorithm Design
030 Introduction to Algorithms.mp4 [32m 11k 650]
030 Introduction to Algorithms_en.srt [4k 668]
031 Reading Output Returned By System Commands.mp4 [33m 906k 765]
031 Reading Output Returned By System Commands_en.srt [8k 957]
032 Introduction to Regular Expressions (Regex).mp4 [18m 822k 26]
032 Introduction to Regular Expressions (Regex)_en.srt [11k 22]
033 Extracting a Substring Using Regex.mp4 [35m 336k 461]
033 Extracting a Substring Using Regex_en.srt [8k 907]
034 Refactoring & Housekeeping.mp4 [38m 698k 130]
034 Refactoring & Housekeeping_en.srt [16k 71]
035 Implementing The Validation Algorithm.mp4 [41m 579k 269]
035 Implementing The Validation Algorithm_en.srt [8k 766]
036 Python 3 Compatibility.mp4 [17m 262k 180]
036 Python 3 Compatibility_en.srt [8k 635]
037 external-assets-links.txt [299]
04 Programming a Network Scanner
038 Installing Windows as a Virtual Machine.mp4 [24m 164k 338]
038 Installing Windows as a Virtual Machine_en.srt [8k 352]
039 Introduction to ARP.mp4 [31m 514k 161]
039 Introduction to ARP_en.srt [12k 545]
040 Designing an Algorithm To Discover Clients on The Same Network.mp4 [16m 66k 696]
040 Designing an Algorithm To Discover Clients on The Same Network_en.srt [5k 106]
041 Using Scapy To Create an ARP Request.mp4 [18m 403k 178]
041 Using Scapy To Create an ARP Request_en.srt [8k 862]
042 Combining Frames To Broadcast Packets.mp4 [26m 459k 263]
042 Combining Frames To Broadcast Packets_en.srt [12k 246]
043 Sending & Receiving Packets.mp4 [23m 790k 824]
043 Sending & Receiving Packets_en.srt [9k 444]
044 Introduction Lists in Python.mp4 [28m 9k 227]
044 Introduction Lists in Python_en.srt [11k 524]
045 Iterating Over Lists & Analysing Packet.mp4 [76m 956k 225]
045 Iterating Over Lists & Analysing Packet_en.srt [13k 260]
046 Using Escape Characters To Improve Program Output.mp4 [21m 917k 474]
046 Using Escape Characters To Improve Program Output_en.srt [8k 840]
047 Introduction to Dictionaries in Python.mp4 [35m 244k 838]
047 Introduction to Dictionaries in Python_en.srt [13k 861]
048 Improving the Program Using a List of Dictionaries.mp4 [24m 93k 746]
048 Improving the Program Using a List of Dictionaries_en.srt [11k 987]
049 Iterating Over Nested Data Structures.mp4 [48m 499k 778]
049 Iterating Over Nested Data Structures_en.srt [9k 964]
050 Testing The Network Scanner With Python 3.mp4 [19m 399k 688]
051 Testing The Network Scanner With Python 3_en.srt [9k 929]
052 Introduction & Teaser.mp4 [79m 926k 640]
053 Introduction & Teaser_en.srt [13k 0]
054 network-scanner.pdf [736k 351]
055 external-assets-links.txt [1k 26]
05 Writing an ARP Spoofer
056 arp-spoof.pdf [726k 208]
057 What is ARP Spoofing.mp4 [25m 678k 894]
057 What is ARP Spoofing_en.srt [7k 185]
058 Intercepting Data in a Network Using arpspoof.mp4 [19m 322k 252]
058 Intercepting Data in a Network Using arpspoof_en.srt [6k 274]
059 Creating an ARP Response.mp4 [20m 999k 801]
059 Creating an ARP Response_en.srt [9k 409]
060 Sending ARP Responses.mp4 [31m 417k 652]
060 Sending ARP Responses_en.srt [7k 255]
061 Extracting MAC Address From Responses.mp4 [47m 441k 872]
061 Extracting MAC Address From Responses_en.srt [8k 860]
062 Introduction to Loops in Python.mp4 [71m 429k 201]
062 Introduction to Loops in Python_en.srt [11k 702]
063 More on Loops & Counters.mp4 [21m 606k 383]
063 More on Loops & Counters_en.srt [11k 460]
064 Dynamic Printing.mp4 [18m 557k 460]
064 Dynamic Printing_en.srt [9k 217]
065 Exception Handling in Python.mp4 [28m 469k 652]
065 Exception Handling in Python_en.srt [7k 237]
066 Implementing a Restore Function.mp4 [41m 390k 944]
066 Implementing a Restore Function_en.srt [15k 362]
067 Restoring ARP Tables on Exception.mp4 [22m 840k 728]
067 Restoring ARP Tables on Exception_en.srt [6k 843]
068 external-assets-links.txt [187]
06 Writing a Packet Sniffer
069 Introduction & Teaser.mp4 [79m 146k 616]
069 Introduction & Teaser_en.srt [6k 399]
070 Sniffer.pdf [569k 690]
071 Sniffing Packets Using Scapy.mp4 [34m 158k 424]
071 Sniffing Packets Using Scapy_en.srt [10k 290]
072 Extracting data From a Specific Layer.mp4 [52m 644k 848]
072 Extracting data From a Specific Layer_en.srt [8k 605]
073 Analysing Sniffed Packets & Extracting Fields From Layers.mp4 [95m 388k 532]
073 Analysing Sniffed Packets & Extracting Fields From Layers_en.srt [15k 696]
074 Analysing Fields & Extracting Passwords.mp4 [76m 974k 265]
074 Analysing Fields & Extracting Passwords_en.srt [15k 57]
075 Extracting URLs.mp4 [80m 942k 452]
075 Extracting URLs_en.srt [9k 891]
076 Capturing Passwords From Any Computer Connected to the Same Network.mp4 [20m 496k 664]
076 Capturing Passwords From Any Computer Connected to the Same Network_en.srt [10k 392]
077 Strings & Bytes in Python 3.mp4 [52m 991k 373]
077 Strings & Bytes in Python 3_en.srt [9k 744]
078 external-assets-links.txt [397]
07 Writing a DNS Spoofer
079 Intercepting Packets - Creating a Proxy.mp4 [44m 284k 426]
079 Intercepting Packets - Creating a Proxy_en.srt [16k 674]
080 interceptor.pdf [1m 902k 195]
081 Converting Packets to Scapy Packets.mp4 [36m 89k 148]
081 Converting Packets to Scapy Packets_en.srt [11k 266]
082 Introduction to DNS Spoofing.mp4 [72m 511k 247]
082 Introduction to DNS Spoofing_en.srt [9k 92]
083 Filtering DNS Responses.mp4 [22m 697k 881]
083 Filtering DNS Responses_en.srt [8k 234]
084 Analysing & Creating a Custom DNS Response.mp4 [24m 444k 11]
084 Analysing & Creating a Custom DNS Response_en.srt [10k 67]
085 Modifying Packets On The Fly.mp4 [25m 126k 909]
085 Modifying Packets On The Fly_en.srt [9k 952]
086 Redirecting DNS Responses.mp4 [53m 56k 648]
086 Redirecting DNS Responses_en.srt [7k 328]
08 Writing a File Interceptor
087 Introduction & Teaser.mp4 [68m 263k 633]
087 Introduction & Teaser_en.srt [5k 676]
088 Filtering Traffic Based on the Port Used.mp4 [81m 754k 792]
088 Filtering Traffic Based on the Port Used_en.srt [11k 290]
089 Analysing HTTP Requests.mp4 [42m 621k 36]
089 Analysing HTTP Requests_en.srt [6k 917]
090 Intercepting HTTP Requests.mp4 [76m 608k 674]
090 Intercepting HTTP Requests_en.srt [12k 417]
091 Modifying HTTP Responses on The Fly.mp4 [92m 767k 129]
091 Modifying HTTP Responses on The Fly_en.srt [13k 334]
092 Intercepting & Replacing Downloads on The Network.mp4 [26m 13k 204]
092 Intercepting & Replacing Downloads on The Network_en.srt [13k 193]
093 external-assets-links.txt [87]
09 Writing a Code Injector
094 Introduction & Teaser.mp4 [29m 635k 717]
094 Introduction & Teaser_en.srt [1k 696]
095 Analysing HTTP Responses.mp4 [64m 73k 466]
095 Analysing HTTP Responses_en.srt [8k 460]
096 Replacing a Substring Using Regex.mp4 [42m 241k 814]
096 Replacing a Substring Using Regex_en.srt [8k 569]
097 Decoding HTTP Responses.mp4 [94m 640k 277]
097 Decoding HTTP Responses_en.srt [12k 481]
098 Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp4 [70m 976k 789]
098 Modifying HTTP Responses & Injecting Javascript Code in HTML Pages_en.srt [10k 835]
099 Refactoring & Housekeeping.mp4 [52m 919k 543]
099 Refactoring & Housekeeping_en.srt [11k 166]
100 Debugging Issues in Python.mp4 [71m 741k 547]
100 Debugging Issues in Python_en.srt [7k 855]
101 Using Groups & None-capturing Regex.mp4 [74m 631k 439]
101 Using Groups & None-capturing Regex_en.srt [11k 333]
102 Recalculating Content Length.mp4 [79m 930k 456]
102 Recalculating Content Length_en.srt [14k 45]
103 BeEF Overview & Basic Hook Method.mp4 [155m 568k 772]
103 BeEF Overview & Basic Hook Method_en.srt [15k 20]
104 Hooking Computers Using code_injector.mp4 [33m 646k 231]
104 Hooking Computers Using code_injector_en.srt [7k 223]
105 Basic BeEF Commands.mp4 [11m 786k 782]
105 Basic BeEF Commands_en.srt [6k 339]
106 Delivering Malware Using BeEF.mp4 [21m 428k 926]
106 Delivering Malware Using BeEF_en.srt [7k 997]
10 Bypassing HTTPS
107 Bypassing HTTPS & Sniffing Login Credentials.mp4 [45m 902k 218]
107 Bypassing HTTPS & Sniffing Login Credentials_en.srt [7k 816]
108 How to Bypass HTTPS.mp4 [152m 586k 650]
108 How to Bypass HTTPS_en.srt [13k 129]
109 Injecting Code in HTTPS Pages.mp4 [60m 182k 187]
109 Injecting Code in HTTPS Pages_en.srt [10k 799]
110 Replacing Downloads on HTTPS Pages.mp4 [55m 189k 529]
110 Replacing Downloads on HTTPS Pages_en.srt [10k 431]
111 external-assets-links.txt [96]
11 Writing an ARP Spoof Detector
112 Running Python Programs on Windows.mp4 [37m 813k 116]
112 Running Python Programs on Windows_en.srt [12k 927]
113 Capturing & Analysing ARP Responses.mp4 [19m 104k 191]
113 Capturing & Analysing ARP Responses_en.srt [8k 722]
114 Detecting ARP Spoofing Attacks Using Python.mp4 [45m 354k 354]
114 Detecting ARP Spoofing Attacks Using Python_en.srt [9k 408]
12 Writing Malware
115 Evil-Files.pdf [1m 409k 574]
116 Introduction & Teaser.mp4 [45m 490k 194]
116 Introduction & Teaser_en.srt [2k 504]
117 Execute System Command Payload.mp4 [28m 136k 983]
117 Execute System Command Payload_en.srt [12k 913]
118 Sending Emails Using Python.mp4 [35m 343k 577]
118 Sending Emails Using Python_en.srt [16k 414]
119 Filtering Command Output Using Regex.mp4 [25m 370k 332]
119 Filtering Command Output Using Regex_en.srt [13k 439]
120 Stealing WiFi Passwords Saved on a Computer.mp4 [43m 814k 860]
120 Stealing WiFi Passwords Saved on a Computer_en.srt [13k 107]
121 Downloading Files Using Python.mp4 [58m 58k 465]
121 Downloading Files Using Python_en.srt [10k 532]
122 Writing Files on Disk.mp4 [54m 308k 426]
122 Writing Files on Disk_en.srt [14k 875]
123 Password Recovery Basics.mp4 [73m 76k 207]
123 Password Recovery Basics_en.srt [11k 113]
124 Stealing Saved Passwords From Remote Computers.mp4 [40m 92k 184]
124 Stealing Saved Passwords From Remote Computers_en.srt [10k 618]
125 Interacting With The File System Using Python.mp4 [29m 578k 624]
125 Interacting With The File System Using Python_en.srt [12k 716]
126 external-assets-links.txt [301]
13 Writing Malware - Keylogger
127 Introduction & Teaser.mp4 [58m 158k 374]
127 Introduction & Teaser_en.srt [4k 884]
128 Writing a Basic Local Keylogger Using Python.mp4 [26m 697k 472]
128 Writing a Basic Local Keylogger Using Python_en.srt [13k 856]
129 Introduction to Global Variables.mp4 [44m 510k 627]
129 Introduction to Global Variables_en.srt [10k 489]
130 Logging Special Keys.mp4 [21m 869k 783]
130 Logging Special Keys_en.srt [8k 972]
131 Introduction to Threading & Recursion in Python.mp4 [31m 506k 0]
131 Introduction to Threading & Recursion in Python_en.srt [14k 507]
132 Introduction Object Oriented Programming.mp4 [45m 242k 312]
132 Introduction Object Oriented Programming_en.srt [20k 33]
133 Constructor Methods & Instance Variables.mp4 [25m 556k 118]
133 Constructor Methods & Instance Variables_en.srt [10k 93]
134 Logging Key-strikes and Reporting Them By Email.mp4 [35m 106k 299]
134 Logging Key-strikes and Reporting Them By Email_en.srt [15k 25]
135 external-assets-links.txt [250]
14 Writing Malware - Backdoors
136 Introduction & Teaser.mp4 [66m 566k 333]
136 Introduction & Teaser_en.srt [7k 600]
137 Client - Server Communication & Connection Types.mp4 [22m 559k 12]
137 Client - Server Communication & Connection Types_en.srt [10k 338]
138 Connecting Two Remote Computers Using Sockets.mp4 [17m 487k 846]
138 Connecting Two Remote Computers Using Sockets_en.srt [13k 781]
139 Sending & Receiving Data Over TCP.mp4 [10m 45k 722]
139 Sending & Receiving Data Over TCP_en.srt [6k 613]
140 Executing System Commands Remotely.mp4 [28m 370k 369]
140 Executing System Commands Remotely_en.srt [13k 152]
141 Implementing a Server.mp4 [16m 69k 993]
141 Implementing a Server_en.srt [11k 528]
142 Implementing Skeleton For Server - Client Communication.mp4 [15m 739k 741]
142 Implementing Skeleton For Server - Client Communication_en.srt [9k 65]
143 Refactoring - Creating a Listener Class.mp4 [26m 82k 54]
143 Refactoring - Creating a Listener Class_en.srt [9k 994]
144 Refactoring - Creating a Backdoor Class.mp4 [16m 777k 813]
144 Refactoring - Creating a Backdoor Class_en.srt [7k 687]
145 Serialisation - Theory.mp4 [100m 910k 278]
145 Serialisation - Theory_en.srt [14k 265]
146 Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4 [26m 918k 781]
146 Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP_en.srt [9k 716]
147 Serialisation - Reliably Sending & Receiving Data.mp4 [25m 439k 863]
147 Serialisation - Reliably Sending & Receiving Data_en.srt [7k 619]
148 Sending Commands as List & Implementing Exit Command.mp4 [25m 926k 265]
148 Sending Commands as List & Implementing Exit Command_en.srt [10k 814]
149 Interacting With the File System - Implementing cd Command.mp4 [33m 617k 449]
149 Interacting With the File System - Implementing cd Command_en.srt [11k 380]
150 Reading Files Using Python.mp4 [48m 260k 744]
150 Reading Files Using Python_en.srt [9k 299]
151 Writing Files Using Python.mp4 [26m 874k 564]
151 Writing Files Using Python_en.srt [8k 611]
152 Downloading Files From Hacked Computer.mp4 [62m 22k 276]
152 Downloading Files From Hacked Computer_en.srt [9k 117]
153 Implementing Upload Functionality in Listener.mp4 [30m 254k 361]
153 Implementing Upload Functionality in Listener_en.srt [9k 514]
154 Implementing Upload Functionality in Backdoor.mp4 [39m 732k 370]
154 Implementing Upload Functionality in Backdoor_en.srt [7k 676]
155 Handling Unknown Exceptions.mp4 [77m 384k 459]
155 Handling Unknown Exceptions_en.srt [12k 527]
156 Using the Backdoor to Hack Windows, Linux & OS X.mp4 [111m 978k 884]
156 Using the Backdoor to Hack Windows, Linux & OS X_en.srt [15k 669]
157 Testing The Backdoor With Python 3.mp4 [95m 196k 651]
157 Testing The Backdoor With Python 3_en.srt [20k 468]
158 external-assets-links.txt [261]
15 Writing Malware - Packaging
159 Introduction & Teaser.mp4 [69m 177k 885]
159 Introduction & Teaser_en.srt [4k 267]
160 Converting Python Programs To Windows Binary Executables.mp4 [50m 296k 477]
160 Converting Python Programs To Windows Binary Executables_en.srt [8k 634]
161 Running Executables Silentely.mp4 [43m 625k 203]
161 Running Executables Silentely_en.srt [8k 998]
162 Installing Windows Pyinstaller on Linux.mp4 [28m 669k 8]
162 Installing Windows Pyinstaller on Linux_en.srt [9k 617]
163 Packaging Programs For Windows From Linux.mp4 [26m 413k 861]
163 Packaging Programs For Windows From Linux_en.srt [10k 521]
164 Introduction to Persistence.mp4 [32m 369k 904]
164 Introduction to Persistence_en.srt [10k 65]
165 Running Programs on Startup.mp4 [102m 352k 623]
165 Running Programs on Startup_en.srt [17k 716]
166 Creating a Basic Trojan Using Download & Execute Payload.mp4 [33m 86k 959]
166 Creating a Basic Trojan Using Download & Execute Payload_en.srt [13k 507]
167 Creating a Trojan By Embedding Files In Program Code.mp4 [27m 73k 79]
167 Creating a Trojan By Embedding Files In Program Code_en.srt [10k 480]
168 BypassAVDynamics.pdf [1m 69k 686]
169 Bypassing Anti-Virus Programs - Theory.mp4 [15m 706k 837]
169 Bypassing Anti-Virus Programs - Theory_en.srt [6k 849]
170 Evading-AV.pdf [835k 232]
171 Bypassing Anti-Virus Programs - Practical.mp4 [51m 564k 19]
171 Bypassing Anti-Virus Programs - Practical_en.srt [11k 95]
172 Adding an Icon to Generated Executables.mp4 [11m 855k 163]
172 Adding an Icon to Generated Executables_en.srt [6k 408]
173 Spoofing File Extension.mp4 [36m 855k 166]
173 Spoofing File Extension_en.srt [11k 265]
174 Converting Python Programs To OS X Executables.mp4 [79m 896k 799]
174 Converting Python Programs To OS X Executables_en.srt [11k 339]
175 Converting Python Programs to Linux Executables.mp4 [26m 40k 151]
175 Converting Python Programs to Linux Executables_en.srt [9k 997]
176 external-assets-links.txt [842]
16 Website Web Application Hacking
177 Introduction & Teaser.mp4 [120m 332k 596]
177 Introduction & Teaser_en.srt [9k 516]
178 Website-Hacking.pdf [354k 614]
179 What is a Website.mp4 [53m 921k 612]
179 What is a Website_en.srt [5k 716]
180 How to Hack a Website.mp4 [23m 325k 337]
180 How to Hack a Website_en.srt [8k 222]
17 Website Hacking - Writing a Crawler
181 Sending GET Requests To Web Servers.mp4 [24m 455k 291]
181 Sending GET Requests To Web Servers_en.srt [11k 853]
182 Discovering Website Subdomains Using Python.mp4 [34m 921k 932]
182 Discovering Website Subdomains Using Python_en.srt [13k 481]
183 subdomains-wodlist.txt [6m 861k 626]
184 Discovering Hidden Paths in Websites.mp4 [71m 271k 709]
184 Discovering Hidden Paths in Websites_en.srt [13k 246]
185 files-and-dirs-wordlist.txt [35k 849]
186 Reading Response Content.mp4 [72m 390k 402]
186 Reading Response Content_en.srt [7k 974]
187 Extracting Useful Data From Response.mp4 [88m 839k 191]
187 Extracting Useful Data From Response_en.srt [8k 794]
188 Filtering Results.mp4 [38m 954k 559]
188 Filtering Results_en.srt [8k 756]
189 Extracting Unique Links & Storing Them In a List.mp4 [64m 386k 281]
189 Extracting Unique Links & Storing Them In a List_en.srt [8k 90]
190 Recursively Discovering All Paths On a Target Website.mp4 [59m 664k 103]
190 Recursively Discovering All Paths On a Target Website_en.srt [12k 539]
191 Testing The Crawler With Python 3.mp4 [34m 280k 250]
191 Testing The Crawler With Python 3_en.srt [9k 61]
192 external-assets-links.txt [81]
18 Writing a Program To Guess Login Information
193 Sending Post Requests to Websites.mp4 [76m 131k 350]
193 Sending Post Requests to Websites_en.srt [14k 581]
194 Guessing Login Information on Login Pages.mp4 [65m 206k 512]
194 Guessing Login Information on Login Pages_en.srt [11k 301]
195 passwords.txt [537]
19 Writing a Vulnerability Scanner
196 Introduction & Teaser.mp4 [10m 598k 767]
196 Introduction & Teaser_en.srt [3k 427]
197 HTTP Requests - POST VS GET.mp4 [26m 358k 942]
197 HTTP Requests - POST VS GET_en.srt [8k 357]
198 Parsing HTML Code Using Python.mp4 [52m 898k 419]
198 Parsing HTML Code Using Python_en.srt [9k 511]
199 Extracting HTML Attributes.mp4 [101m 813k 268]
199 Extracting HTML Attributes_en.srt [12k 239]
200 Posting Forms.mp4 [41m 686k 352]
200 Posting Forms_en.srt [11k 528]
201 Building Basic Structure For a Vulnerability Scanner.mp4 [43m 804k 65]
201 Building Basic Structure For a Vulnerability Scanner_en.srt [14k 486]
202 Using Default Parameters.mp4 [25m 322k 982]
202 Using Default Parameters_en.srt [6k 212]
203 Sending Requests in a Session.mp4 [60m 890k 632]
203 Sending Requests in a Session_en.srt [11k 117]
204 Extracting & Submitting Forms Automatically.mp4 [93m 854k 360]
204 Extracting & Submitting Forms Automatically_en.srt [12k 56]
205 Implementing a Method To Run The Scanner.mp4 [20m 505k 122]
205 Implementing a Method To Run The Scanner_en.srt [7k 406]
206 Discovering XSS Vulnerabilities.mp4 [36m 136k 686]
206 Discovering XSS Vulnerabilities_en.srt [12k 190]
207 Exploiting XSS Vulnerabilities.mp4 [22m 755k 963]
207 Exploiting XSS Vulnerabilities_en.srt [6k 821]
208 Implementing Code To Discover XSS in Forms.mp4 [29m 69k 145]
208 Implementing Code To Discover XSS in Forms_en.srt [9k 303]
209 Implementing Code To Discover XSS in Parameters.mp4 [42m 841k 898]
209 Implementing Code To Discover XSS in Parameters_en.srt [9k 11]
210 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4 [36m 323k 571]
210 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner_en.srt [10k 714]
211 external-assets-links.txt [92]
20 Bonus Section
212 Bonus Lecture - Discounts.html [7k 689]

Материал на английском языке
Объем:
7,95 Гб.
 
Зарегистрируйтесь , чтобы посмотреть скрытый авторский контент.
Похожие складчины
  • в разделе: Программирование
  • в разделе: Программирование
  • в разделе: Программирование
  • в разделе: Программирование
  • в разделе: Программирование

Войдите или зарегистрируйтесь, чтобы комментировать и скачивать складчины!

Учетная запись позволит вам участвовать в складчинах и оставлять комментарии

Регистрация

Создайте аккаунт на форуме. Это не сложно!

Вход

Вы уже зарегистрированы? Войдите.

Сверху