FileMood

Download [DesireCourse.Net] Udemy - Master Ethical Hacking with Python!

DesireCourse Net Udemy Master Ethical Hacking with Python

Name

[DesireCourse.Net] Udemy - Master Ethical Hacking with Python!

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

6.8 GB

Total Files

180

Hash

68C3AF538311C1091F2A90A80917E611F05D8F1A

/1. Introduction and Setup/

1. Welcome to Python for ethical hacking!.mp4

13.5 MB

1. Welcome to Python for ethical hacking!.vtt

6.4 KB

2. VirtualBox installation.mp4

80.1 MB

2. VirtualBox installation.vtt

14.7 KB

3. Kali Linux installation.mp4

70.7 MB

3. Kali Linux installation.vtt

21.8 KB

4. Adding Guest Additions.mp4

105.8 MB

4. Adding Guest Additions.vtt

18.5 KB

5. Python in Kali terminal.mp4

54.0 MB

5. Python in Kali terminal.vtt

16.9 KB

/10. Command and Control Center/

1. What is a threaded server.mp4

25.6 MB

1. What is a threaded server.vtt

6.2 KB

2. Accepting connections with a thread.mp4

63.6 MB

2. Accepting connections with a thread.vtt

15.1 KB

3. Managing multiple sessions.mp4

47.9 MB

3. Managing multiple sessions.vtt

9.8 KB

4. Testing threaded server with Windows 10 target.mp4

64.8 MB

4. Testing threaded server with Windows 10 target.vtt

10.2 KB

5. Fixing Q command.mp4

90.3 MB

5. Fixing Q command.vtt

12.4 KB

6. Coding exit function.mp4

88.0 MB

6. Coding exit function.vtt

15.4 KB

7. Attacking multiple targets and gathering botnet.mp4

110.7 MB

7. Attacking multiple targets and gathering botnet.vtt

17.5 KB

/11. Website Penetration Testing/

1. Stealing saved wireless passwords.mp4

111.9 MB

1. Stealing saved wireless passwords.vtt

23.9 KB

10. Starting basic and digest authentication bruteforcer.mp4

48.7 MB

10. Starting basic and digest authentication bruteforcer.vtt

11.9 KB

11. Controlling threads.mp4

48.2 MB

11. Controlling threads.vtt

9.9 KB

12. Coding run function.mp4

63.2 MB

12. Coding run function.vtt

11.3 KB

13. Printing usage and testing our program.mp4

83.0 MB

13. Printing usage and testing our program.vtt

12.4 KB

14. Taking a look at ransomware.mp4

101.8 MB

14. Taking a look at ransomware.vtt

10.3 KB

2. Saving passwords to a file.mp4

16.5 MB

2. Saving passwords to a file.vtt

3.8 KB

3. Bruteforcing Gmail.mp4

43.1 MB

3. Bruteforcing Gmail.vtt

10.4 KB

4. Bruteforcing any login page part 1.mp4

93.7 MB

4. Bruteforcing any login page part 1.vtt

15.3 KB

5. Bruteforcing any login page part 2.mp4

68.8 MB

5. Bruteforcing any login page part 2.vtt

11.7 KB

6. Finding hidden directories part 1.mp4

22.6 MB

6. Finding hidden directories part 1.vtt

5.7 KB

7. Finding hidden directories part 2.mp4

47.5 MB

7. Finding hidden directories part 2.vtt

7.8 KB

8. Discovering subdomains.mp4

62.5 MB

8. Discovering subdomains.vtt

13.0 KB

9. Changing HTTP headers.mp4

79.4 MB

9. Changing HTTP headers.vtt

15.6 KB

/2. Port and Vulnerability Scanning/

1. Coding a simple port scanner.mp4

67.2 MB

1. Coding a simple port scanner.vtt

17.9 KB

10. Coding a vulnerability scanner part 2.mp4

42.8 MB

10. Coding a vulnerability scanner part 2.vtt

8.4 KB

2. Adding raw_input to our port scanner.mp4

46.0 MB

2. Adding raw_input to our port scanner.vtt

10.5 KB

3. Scanning the first 1,000 ports.mp4

30.1 MB

3. Scanning the first 1,000 ports.vtt

5.5 KB

4. Coding an advanced port scanner part 1.mp4

65.2 MB

4. Coding an advanced port scanner part 1.vtt

15.3 KB

5. Coding an advanced port scanner part 2.mp4

65.1 MB

5. Coding an advanced port scanner part 2.vtt

9.9 KB

6. Finishing and testing our scanner.mp4

60.4 MB

6. Finishing and testing our scanner.vtt

9.8 KB

7. Configuring IP address and installing Metasploitable.mp4

59.8 MB

7. Configuring IP address and installing Metasploitable.vtt

10.0 KB

8. Returning banner from open port.mp4

80.3 MB

8. Returning banner from open port.vtt

15.8 KB

9. Coding a vulnerability scanner part 1.mp4

58.0 MB

9. Coding a vulnerability scanner part 1.vtt

12.9 KB

/3. SSH and FTP Attacks/

1. Automating SSH login part 1.mp4

48.2 MB

1. Automating SSH login part 1.vtt

11.4 KB

2. Automating SSH login part 2.mp4

56.8 MB

2. Automating SSH login part 2.vtt

10.1 KB

3. Testing our SSH login program.mp4

56.8 MB

3. Testing our SSH login program.vtt

9.7 KB

4. Coding a SSH brute-forcer.mp4

65.9 MB

4. Coding a SSH brute-forcer.vtt

12.2 KB

5. Executing commands on target after brute-forcing SSH.mp4

63.6 MB

5. Executing commands on target after brute-forcing SSH.vtt

11.9 KB

6. Anonymous FTP login attack.mp4

47.3 MB

6. Anonymous FTP login attack.vtt

10.9 KB

7. Username & password list attack on FTP.mp4

96.2 MB

7. Username & password list attack on FTP.vtt

18.3 KB

/4. Password Cracking/

1. SHA256, SHA512, MD5.mp4

44.1 MB

1. SHA256, SHA512, MD5.vtt

10.0 KB

2. Cracking SHA1 hash with online dictionary.mp4

89.2 MB

2. Cracking SHA1 hash with online dictionary.vtt

18.7 KB

3. Getting password from MD5 hash.mp4

62.9 MB

3. Getting password from MD5 hash.vtt

14.8 KB

4. Cracking crypt passwords with salt.mp4

126.8 MB

4. Cracking crypt passwords with salt.vtt

24.8 KB

/5. Sniffers, Flooders and Spoofers/

1. Changing MAC address manually.mp4

53.4 MB

1. Changing MAC address manually.vtt

10.1 KB

10. Sniffing FTP username and password part 1.mp4

38.8 MB

10. Sniffing FTP username and password part 1.vtt

9.1 KB

11. Sniffing FTP username and password part 2.mp4

84.0 MB

11. Sniffing FTP username and password part 2.vtt

117.4 MB

12. Getting passwords from HTTP websites.mp4

81.5 MB

12. Getting passwords from HTTP websites.vtt

15.3 KB

2. Coding MAC address changer.mp4

97.4 MB

2. Coding MAC address changer.vtt

17.4 KB

3. Theory behind ARP spoofing.mp4.mtd

116.9 MB

3. Theory behind ARP spoofing.vtt

5.9 KB

4. Crafting malicious ARP packet.mp4

151.2 MB

4. Crafting malicious ARP packet.vtt

22.0 KB

5. Coding ARP spoofer.mp4

65.7 MB

5. Coding ARP spoofer.vtt

14.9 KB

6. Forwarding packets and restoring ARP tables.mp4

43.9 MB

6. Forwarding packets and restoring ARP tables.vtt

8.6 KB

7. Spoofing our IP address and sending message with TCP payload.mp4

74.1 MB

7. Spoofing our IP address and sending message with TCP payload.vtt

94.8 MB

8. Running SynFlooder with changed source IP address.mp4

68.9 MB

8. Running SynFlooder with changed source IP address.vtt

11.9 KB

9. Getting source and destination MAC address from received packets.mp4

136.7 MB

9. Getting source and destination MAC address from received packets.vtt

28.8 KB

/6. Coding DNS Spoofer/

1. Cloning any webpage.mp4

63.6 MB

1. Cloning any webpage.vtt

12.2 KB

2. Printing DNS queries.mp4

58.3 MB

2. Printing DNS queries.vtt

11.5 KB

3. Redirecting response to cloned page.mp4

217.3 MB

3. Redirecting response to cloned page.vtt

18.4 KB

4. Setting IP table rules and running DNS spoofer.mp4

137.3 MB

4. Setting IP table rules and running DNS spoofer.vtt

11.9 KB

/7. Network Analysis/

1. Analyzing Ethernet header.mp4

82.8 MB

1. Analyzing Ethernet header.vtt

19.5 KB

2. Analyzing IP header part 1.mp4

76.0 MB

2. Analyzing IP header part 1.vtt

11.6 KB

3. Analyzing IP header part 2.mp4

229.5 MB

3. Analyzing IP header part 2.vtt

28.9 KB

4. Analyzing TCP header.mp4

128.7 MB

4. Analyzing TCP header.vtt

16.3 KB

5. Analyzing UDP header.mp4

104.6 MB

5. Analyzing UDP header.vtt

13.3 KB

/8. Multi-functioning Reverse Shell/

1. Theory behind socket programming.mp4

28.9 MB

1. Theory behind socket programming.vtt

9.5 KB

10. Downloading & uploading files to target PC.mp4

121.4 MB

10. Downloading & uploading files to target PC.vtt

21.5 KB

11. Hiding our backdoor and creating persistence.mp4

82.1 MB

11. Hiding our backdoor and creating persistence.vtt

16.3 KB

12. Trying to connect to server every 20 seconds.mp4

39.9 MB

12. Trying to connect to server every 20 seconds.vtt

9.3 KB

13. Downloading files to target PC.mp4

71.2 MB

13. Downloading files to target PC.vtt

13.1 KB

14. Capturing screenshot on target PC.mp4

147.1 MB

14. Capturing screenshot on target PC.vtt

27.5 KB

15. Administrator privilege check.mp4

47.1 MB

15. Administrator privilege check.vtt

9.0 KB

16. Starting other programs with our shell.mp4

76.3 MB

16. Starting other programs with our shell.vtt

11.7 KB

17. Running our shell as an image, audio, PDF.mp4

143.3 MB

17. Running our shell as an image, audio, PDF.vtt

22.4 KB

2. Wine and Pyinstaller installation.mp4

42.5 MB

2. Wine and Pyinstaller installation.vtt

9.4 KB

3. Setting up listener.mp4

35.7 MB

3. Setting up listener.vtt

9.7 KB

4. Establishing connection between target and server.mp4

33.8 MB

4. Establishing connection between target and server.vtt

7.9 KB

5. Implementing send & receive functions.mp4

69.1 MB

5. Implementing send & receive functions.vtt

12.5 KB

6. Executing commands on target system.mp4

72.4 MB

6. Executing commands on target system.vtt

12.9 KB

7. Importing JSON library to parse data.mp4

55.9 MB

7. Importing JSON library to parse data.vtt

9.7 KB

8. Converting Python backdoor to .exe.mp4

56.7 MB

8. Converting Python backdoor to .exe.vtt

9.6 KB

9. Using OS library to change directory.mp4

61.0 MB

9. Using OS library to change directory.vtt

11.6 KB

/9. Coding a Keylogger/

1. Installing Pynput.mp4

25.1 MB

1. Installing Pynput.vtt

7.6 KB

2. Printing space character.mp4

38.7 MB

2. Printing space character.vtt

10.1 KB

3. Calling timer on our keylogger.mp4

52.8 MB

3. Calling timer on our keylogger.vtt

11.2 KB

4. Adding keylogger to our backdoor.mp4

96.1 MB

4. Adding keylogger to our backdoor.vtt

14.2 KB

/

[CourseClub.Me].url

0.0 KB

[DesireCourse.Net].url

0.1 KB

 

Total files 180


Copyright © 2025 FileMood.com