Udemy

Python 3 For Offensive PenTest: A Complete Practical Course

Enroll Now
  • 18,852 Students
  • Updated 2/2023
4.1
(1,875 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
4 Hour(s) 56 Minute(s)
Language
English
Taught by
Hussam Khrais
Rating
4.1
(1,875 Ratings)

Course Overview

Python 3 For Offensive PenTest: A Complete Practical Course

Updated Python 3.7 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testing

When other's tools fail, writing your own makes you a true penetration tester!
---------------

Before You Enroll !

The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.

There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!

---------------

FAQ

Why Python?

  • Easy to learn

  • Cross platform

  • Unlimited third party libraries

  • Get your job done with few lines

  • Ranked as #1 for the most popular programming languages

  • Plenty of open source hacking tools are written in python which can be easily integrated within your script

How To Use This Course?

  1. View the course in order, start from module 1 and move on.

  2. Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum.

  3. Don't skip the exercises, Google is your best friend.

  4. Fall in love with Python, go for extra mile and start writing your own weapons!

How to reach me?

  • Udemy forums in case you have ANY question or technical problem.

  • LinkedIn if you have ANY questions prior taking the course, Ideas and collaboration are welcomed.

Course Content

  • 7 section(s)
  • 58 lecture(s)
  • Section 1 Quick Intro
  • Section 2 Python 3 / Windows 10 / Kali 2 : Gaining Access - Your First Persistence Shell
  • Section 3 Python 3 / Windows 10 / Kali 2 : Advanced Scriptable Shell
  • Section 4 Python 3 / Windows 10 / Kali 2 : Catch Me If You Can!
  • Section 5 Python 3: How Malware Abuse Cryptography? Python Answers
  • Section 6 Python 3 / Windows 10 / Kali 2 : Passwords Hacking
  • Section 7 Windows 7 & 10 Privilege Escalation - Weak Service Permission

What You’ll Learn

  • Learn how to code your own reverse shell [TCP+HTTP], Learn how to exfiltrate data from your target, Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge], Replicate Metasploit features and and make an advanced shell, Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking], Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell, Privilege escalation on windows with practical example

Reviews

  • R
    Raed Shatheli
    5.0

    nice course

  • L
    Larry Timmins
    5.0

    Sometimes it helps to just increase your familiarity with a programming language by applying it on problems and tool creation in an area you like. Who doesn't like getting into the mind of a offensive pen tester to improve your ideas on faster incident response and challenges. Like the context of this course - 5 stars.

  • F
    Farzad Borzouei
    5.0

    This course is very informative and I learned a lot. Hussam is very responsive and helpful when you have a question. Thanks Hussam for the course.

  • B
    Barakutei Yanaouko Ah Baguanamei
    5.0

    The course was more than expected. The only 2 flaws were the constant slow streaming, with very long intervals and the many zoom outs and in did not allow for clear views.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed