• 1
  • 0
  • 44
  • done
Sponsored Download

Description

[UDEMY] LEARN PYTHON & ETHICAL HACKING FROM SCRATCH [FTU]

Start from 0 & learn both topics simultaneously from scratch by writing 20+ hacking programs

Created by Zaid Sabih

Last updated 7/2018

English

What Will I Learn?

175 detailed videos about Python programming & ethical hacking

Learn 2 topics at the same time – Python programming & Ethical Hacking

Start from scratch up to a high-intermediate level

Write over 20 ethical hacking and security programs

Learn by example, by writing exciting programs

Model problems, design solutions & implement them using Python

Write programs in Python 2 and 3

Write cross platform programs that work on Windows, OS X and Linux

Have a deep understanding on how computer systems work

Have a strong base and be able to use the skills learned to write any program even if its not related to hacking

Understand what is Hacking, what is Programming, and why are they related

Design a testing lab to practice hacking & programming safely

Interact & use Linux terminal

Understand what MAC address is & how to change it

Write a python program to change MAC address

Use Python modules and libraries

Understand what Object Oriented Programming is

Write object oriented programs

Model & design extendable programs

Write a program that can discover all clients connected to the same network

Read, analyse & manipulate network packets

Understand & interact with different network layers in packets such as ARP, DNS, HTTP ….etc

Write a program that can redirect the flow of packets in a network (arp spoofer)

Write a packet sniffer to filter interesting data such as usernames and passwords

Write a program to redirect DNS requests (DNS Spoofer)

Intercept and modify network packets on the fly

Write a program to replace downloads requested by any computer on the network

Analyse & modify HTTP requests and responses

Inject code in HTML pages loaded by any computer on the same network

Downgrade HTTPS to HTTP

Write a program that can detect ARP Spoofing attacks

Write custom made payloads to download a file, execute command, download & execute, download execute & report …..etc

Use sockets to send data over TCP

Send data reliably over TCP

Write client-server programs

Write a backdoor that works on Windows, OS X and Linux

Implement cool features in the backdoor such as file system access, upload and download files and persistence

Write a remote keylogger that can register all keystrikes and send them by Email

Interact with files using python (read, write & modify)

Convert python programs to binary executables that work on Windows, OS X and Linux

Convert evil files into torjans that work and function just like any other file type like an image or a PDF

Bypass Anti-Virus Programs

Understand how websites work, the technologies used and how to test them for weaknesses

Write a program that can discover hidden paths in a website

Send requests towebsites and analyse responses

Write a program that can map a website and discover all links, subdomains, files and directories

Extract and submit forms from python

Run dictionary attacks and guess login information on login pages

Write a program that can discover weaknesses in websites

For More Udemy Free Courses >>> http://www.freetutorials.us
For more PHLEARN Courses >>> https://www.freecoursesonline.me/


More at ibit.to
And ibit.uno
And ibit.ws

Comments

Files

1. Introduction/7. The Terminal & Linux Commands.mp4 224 MB
1. Introduction/8. Python 2 VS Python 3 & Writing Our First Program.mp4 194 MB
14. Writing Malware - Backdoors/10. Serialisation - Theory.mp4 164 MB
10. Bypassing HTTPS/1. How to Bypass HTTPS.mp4 164 MB
7. Writing a DNS Spoofer/1. Intercepting Packets - Creating a Proxy.mp4 155 MB
19. Writing a Vulnerability Scanner/11. Discovering XSS Vulnerabilities.mp4 148 MB
15. Writing Malware - Packaging/13. Spoofing File Extension.mp4 146 MB
1. Introduction/1. Introduction.mp4 142 MB
1. Introduction/3. What is Programming, What is Hacking & Why Learn Them.mp4 140 MB
19. Writing a Vulnerability Scanner/4. Extracting HTML Attributes.mp4 138 MB
17. Website Hacking - Writing a Crawler/3. Discovering Hidden Paths in Websites.mp4 137 MB
16. Website Web Application Hacking/1. Introduction & Teaser.mp4 136 MB
19. Writing a Vulnerability Scanner/5. Posting Forms.mp4 136 MB
14. Writing Malware - Backdoors/21. Using the Backdoor to Hack Windows, Linux & OS X.mp4 127 MB
19. Writing a Vulnerability Scanner/9. Extracting & Submitting Forms Automatically.mp4 125 MB
9. Writing a Code Injector/9. Recalculating Content Length.mp4 124 MB
7. Writing a DNS Spoofer/3. What is DNS Spoofing.mp4 124 MB
14. Writing Malware - Backdoors/2. Client - Server Communication & Connection Types.mp4 120 MB
15. Writing Malware - Packaging/7. Running Programs on Startup.mp4 119 MB
19. Writing a Vulnerability Scanner/6. Building Basic Structure For Vulnerability Scanner.mp4 119 MB
12. Writing Malware/5. Stealing WiFi Passwords Saved on a Computer.mp4 118 MB
13. Writing Malware - Keylogger/6. OOP - Object Oriented Programming Basics.mp4 116 MB
10. Bypassing HTTPS/3. Replacing Downloads on HTTPS Pages.mp4 116 MB
1. Introduction/9. Installing & Using a Python IDE.mp4 116 MB
9. Writing a Code Injector/5. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp4 113 MB
17. Website Hacking - Writing a Crawler/5. Extracting Useful Data From Response.mp4 113 MB
5. Writing an ARP Spoofer/1. What is ARP Spoofing.mp4 112 MB
17. Website Hacking - Writing a Crawler/6. Filtering Rsults.mp4 112 MB
4. Programming a Network Scanner/1. Introduction & Teaser.mp4 110 MB
1. Introduction/6. Basic Overview of Kali Linux.mp4 108 MB
9. Writing a Code Injector/10. BeEF Overview & Basic Hook Method.mp4 107 MB
11. Writing an ARP Spoof Detector/1. Running Python Programs on Windows.mp4 107 MB
18. Writing a Program To Guess Login Information/1. Sending Post Requests to Websites.mp4 106 MB
17. Website Hacking - Writing a Crawler/8. Recursively Discovering All Paths On a Target Website.mp4 106 MB
2. Writing a MAC Address Changer - Python Basics/1. What is MAC Address & How To Change it.mp4 105 MB
15. Writing Malware - Packaging/6. Persistence Idea.mp4 104 MB
9. Writing a Code Injector/4. Decoding HTTP Responses.mp4 104 MB
8. Writing a File Interceptor/4. Intercepting HTTP Requests.mp4 104 MB
1. Introduction/5. Installing Kali as a virtual Machine.mp4 104 MB
15. Writing Malware - Packaging/14. Converting Python Programs To OS X Executables.mp4 104 MB
16. Website Web Application Hacking/3. How to Hack a Website.mp4 103 MB
8. Writing a File Interceptor/5. Modifying HTTP Responses on The Fly.mp4 103 MB
1. Introduction/2. Teaser.mp4 102 MB
17. Website Hacking - Writing a Crawler/2. Discovering Subdomains.mp4 101 MB
8. Writing a File Interceptor/6. Intercepting & Replacing Downloads on The Network.mp4 100 MB
10. Bypassing HTTPS/4. Injecting Code in HTTPS Pages.mp4 100 MB
14. Writing Malware - Backdoors/18. Implementing Upload Functionality in Listener.mp4 98 MB
14. Writing Malware - Backdoors/20. Handling Unknown Exceptions.mp4 98 MB
17. Website Hacking - Writing a Crawler/7. Extracting Unique Links & Storing Them In a List.mp4 96 MB
19. Writing a Vulnerability Scanner/12. Exploiting XSS Vulnerabilities.mp4 96 MB
19. Writing a Vulnerability Scanner/3. Parsing HTML Code.mp4 95 MB
19. Writing a Vulnerability Scanner/13. Implementing Code To Discover XSS in Forms.mp4 95 MB
15. Writing Malware - Packaging/8. Creating a Basic Trojan Using Download & Execute Payload.mp4 94 MB
17. Website Hacking - Writing a Crawler/1. Sending GET Requests To Web Servers.mp4 94 MB
12. Writing Malware/8. Password Recovery Basics.mp4 94 MB
8. Writing a File Interceptor/2. Filtering Traffic Based on the Port Used.mp4 93 MB
9. Writing a Code Injector/8. Using Groups & None-capturing Regex.mp4 93 MB
18. Writing a Program To Guess Login Information/2. Guessing Login Information on Login Pages.mp4 92 MB
17. Website Hacking - Writing a Crawler/4. Reading Response Content.mp4 91 MB
12. Writing Malware/2. Execute System Command Payload.mp4 91 MB
12. Writing Malware/4. Filtering Command Output Using Regex.mp4 91 MB
12. Writing Malware/3. Sending Reports By Email.mp4 90 MB
19. Writing a Vulnerability Scanner/15. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4 90 MB
12. Writing Malware/6. Downloading Files From Program.mp4 90 MB
19. Writing a Vulnerability Scanner/2. HTTP Requests - POST VS GET.mp4 89 MB
7. Writing a DNS Spoofer/6. Modifying Packets On The Fly.mp4 87 MB
16. Website Web Application Hacking/2. What is a Website.mp4 86 MB
6. Writing a Packet Sniffer/1. Introduction & Teaser.mp4 86 MB
13. Writing Malware - Keylogger/5. Threading & Recursion.mp4 84 MB
7. Writing a DNS Spoofer/2. Converting Packets to Scapy Packets.mp4 84 MB
13. Writing Malware - Keylogger/8. Logging Key-strikes and Reporting Them By Email.mp4 84 MB
19. Writing a Vulnerability Scanner/8. Sending Requests in a Session.mp4 83 MB
15. Writing Malware - Packaging/2. Converting Python Programs To Windows Binary Executables.mp4 82 MB
14. Writing Malware - Backdoors/11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4 82 MB
15. Writing Malware - Packaging/11. Bypassing Anti-Virus Programs - Practical.mp4 81 MB
15. Writing Malware - Packaging/10. Bypassing Anti-Virus Programs - Theory.mp4 81 MB
7. Writing a DNS Spoofer/5. Analysing & Creating a Custom DNS Response.mp4 80 MB
9. Writing a Code Injector/6. Refactoring & Housekeeping.mp4 79 MB
13. Writing Malware - Keylogger/2. Writing a Basic Local Keylogger.mp4 78 MB
9. Writing a Code Injector/2. Analysing HTTP Responses.mp4 78 MB
14. Writing Malware - Backdoors/14. Interacting With the File System - Implementing cd Command.mp4 78 MB
14. Writing Malware - Backdoors/17. Downloading Files From Hacked Computer.mp4 77 MB
12. Writing Malware/10. Interacting With The File System.mp4 77 MB
14. Writing Malware - Backdoors/1. Introduction & Teaser.mp4 77 MB
9. Writing a Code Injector/7. Debugging Issues.mp4 75 MB
14. Writing Malware - Backdoors/15. Reading Files.mp4 74 MB
14. Writing Malware - Backdoors/5. Executing System Commands Remotely.mp4 73 MB
14. Writing Malware - Backdoors/13. Sending Commands as List & Implementing Exit Command.mp4 73 MB
8. Writing a File Interceptor/1. Introduction & Teaser.mp4 73 MB
14. Writing Malware - Backdoors/8. Refactoring - Creating a Listener Class.mp4 72 MB
19. Writing a Vulnerability Scanner/14. Implementing Code To Discover XSS in Parameters.mp4 72 MB
7. Writing a DNS Spoofer/4. Filtering DNS Responses.mp4 71 MB
9. Writing a Code Injector/13. Delivering Malware Using BeEF.mp4 70 MB
12. Writing Malware/7. Writing Files on Disk.mp4 69 MB
15. Writing Malware - Packaging/1. Introduction & Teaser.mp4 68 MB
11. Writing an ARP Spoof Detector/3. Detecting ARP Spoofing Attacks.mp4 68 MB
10. Bypassing HTTPS/2. Bypassing HTTPS & Sniffing Login Credentials.mp4 68 MB
15. Writing Malware - Packaging/4. Installing Windows Pyinstaller on Linux.mp4 67 MB
14. Writing Malware - Backdoors/3. Connecting Two Remote Computers Using Sockets.mp4 67 MB
15. Writing Malware - Packaging/3. Running Executables Silentely.mp4 66 MB
13. Writing Malware - Keylogger/7. Constructor Methods & Instance Variables.mp4 66 MB
9. Writing a Code Injector/3. Replacing a Substring Using Regex.mp4 65 MB
13. Writing Malware - Keylogger/1. Introduction & Teaser.mp4 63 MB
12. Writing Malware/9. Using all the Above to Steal Saved Passwords Remotely.mp4 63 MB
15. Writing Malware - Packaging/15. Converting Python Programs to Linux Executables.mp4 62 MB
14. Writing Malware - Backdoors/19. Implementing Upload Functionality in Backdoor.mp4 62 MB
15. Writing Malware - Packaging/9. Creating a Trojan By Embedding Files In Program Code.mp4 62 MB
7. Writing a DNS Spoofer/7. Redirecting DNS Responses.mp4 61 MB
4. Programming a Network Scanner/2. Installing Windows as a Virtual Machine.mp4 61 MB
14. Writing Malware - Backdoors/12. Serialisation - Reliably Sending & Receiving Data.mp4 59 MB
19. Writing a Vulnerability Scanner/10. Implementing a Method To Run The Scanner.mp4 59 MB
15. Writing Malware - Packaging/5. Packaging Programs For Windows From Linux.mp4 58 MB
1. Introduction/4. Lab Overview & Needed Software.mp4 57 MB
5. Writing an ARP Spoofer/2. Redirecting the Flow of Packets in a Network Using arpspoof.mp4 57 MB
14. Writing Malware - Backdoors/16. Writing Files.mp4 57 MB
8. Writing a File Interceptor/3. Analysing HTTP Requests.mp4 56 MB
11. Writing an ARP Spoof Detector/2. Capturing & Analysing ARP Responses.mp4 56 MB
13. Writing Malware - Keylogger/4. Logging Special Keys.mp4 55 MB
13. Writing Malware - Keylogger/3. Global Variables.mp4 55 MB
14. Writing Malware - Backdoors/7. Implementing Skeleton For Server - Client Communication.mp4 55 MB
9. Writing a Code Injector/12. Basic BeEF Commands.mp4 53 MB
14. Writing Malware - Backdoors/6. Implementing a Server.mp4 52 MB
9. Writing a Code Injector/11. Hooking Computers Using code_injector.mp4 48 MB
19. Writing a Vulnerability Scanner/1. Introduction & Teaser.mp4 44 MB
15. Writing Malware - Packaging/12. Adding an Icon to Generated Executables.mp4 44 MB
12. Writing Malware/1. Introduction & Teaser.mp4 44 MB
14. Writing Malware - Backdoors/9. Refactoring - Creating a Backdoor Class.mp4 43 MB
19. Writing a Vulnerability Scanner/7. Using Default Parameters.mp4 41 MB
14. Writing Malware - Backdoors/4. Sending & Receiving Data Over TCP.mp4 32 MB
9. Writing a Code Injector/1. Introduction & Teaser.mp4 30 MB
6. Writing a Packet Sniffer/4. Analysing Sniffed Packets & Extracting Fields From Layers.mp4 29 MB
2. Writing a MAC Address Changer - Python Basics/10. Functions.mp4 22 MB
2. Writing a MAC Address Changer - Python Basics/2. Using Python Modules & Executing System Commands.mp4 22 MB
4. Programming a Network Scanner/6. Combining Frames To Broadcast Packets.mp4 21 MB
6. Writing a Packet Sniffer/5. Analysing Fields & Extracting Passwords.mp4 21 MB
5. Writing an ARP Spoofer/10. Implementing a Restore Function.mp4 20 MB
6. Writing a Packet Sniffer/6. Extracting URLs.mp4 20 MB
2. Writing a MAC Address Changer - Python Basics/13. Using Conditional Statements in MAC Changer.mp4 20 MB
2. Writing a MAC Address Changer - Python Basics/4. Variables & Strings.mp4 20 MB
4. Programming a Network Scanner/8. Lists.mp4 19 MB
4. Programming a Network Scanner/9. Iterating Over Lists & Analysing Packet.mp4 18 MB
3. MAC Changer - Algorithm Design/3. Regular Expressions (Regex).mp4 18 MB
2. Writing a MAC Address Changer - Python Basics/8. Handling Command-line Arguments.mp4 18 MB
3. MAC Changer - Algorithm Design/5. Refactoring & Housekeeping.mp4 18 MB
5. Writing an ARP Spoofer/6. Loops.mp4 17 MB
2. Writing a MAC Address Changer - Python Basics/12. Decision Making - Theory.mp4 17 MB
4. Programming a Network Scanner/3. What is ARP & What its Used For.mp4 17 MB
6. Writing a Packet Sniffer/3. Extracting data From a Specific Layer.mp4 16 MB
3. MAC Changer - Algorithm Design/4. Extracting a Substring Using Regex.mp4 16 MB
4. Programming a Network Scanner/11. Dictionaries.mp4 15 MB
2. Writing a MAC Address Changer - Python Basics/7. Handling User Input.mp4 15 MB
6. Writing a Packet Sniffer/7. Capturing Passwords From Any Computer Connected to the Same Network.mp4 15 MB
4. Programming a Network Scanner/12. Improving the Program Using a List of Dictionaries.mp4 15 MB
3. MAC Changer - Algorithm Design/2. Reading Output Returned By System Commands.mp4 14 MB
3. MAC Changer - Algorithm Design/6. Implementing The Algorithm to Check The Mac Did Change.mp4 13 MB
4. Programming a Network Scanner/15. Python 3 Compatibility.mp4 13 MB
4. Programming a Network Scanner/13. Iterating Over Nested Data Structures.mp4 13 MB
2. Writing a MAC Address Changer - Python Basics/6. Getting Input From The User.mp4 12 MB
2. Writing a MAC Address Changer - Python Basics/9. Initialising Variables Based on Command-line Arguments.mp4 12 MB
4. Programming a Network Scanner/4. Designing an Algorithm To Discover Clients Connected To The Same Network.mp4 12 MB
6. Writing a Packet Sniffer/2. Sniffing Packets Using Scapy.mp4 12 MB
5. Writing an ARP Spoofer/7. More on Loops & Counters.mp4 12 MB
4. Programming a Network Scanner/5. Using Scapy To Create an ARP Request.mp4 12 MB
4. Programming a Network Scanner/10. Using Escape Characters To Enhance Program Output.mp4 11 MB
5. Writing an ARP Spoofer/5. Extracting MAC Address From Responses.mp4 11 MB
4. Programming a Network Scanner/7. Sending & Receiving Packets.mp4 11 MB
2. Writing a MAC Address Changer - Python Basics/11. Returning Values From Functions.mp4 11 MB
5. Writing an ARP Spoofer/3. Creating an ARP Response.mp4 11 MB
5. Writing an ARP Spoofer/8. Dynamic Printing.mp4 10 MB
2. Writing a MAC Address Changer - Python Basics/3. Implementing a Very Basic MAC Changer.mp4 9.4 MB
5. Writing an ARP Spoofer/11. Restoring ARP Tables When an Exception Occures.mp4 9.3 MB
2. Writing a MAC Address Changer - Python Basics/5. Using Variables in MAC Changer.mp4 9.1 MB
5. Writing an ARP Spoofer/4. Sending ARP Responses.mp4 9.0 MB
5. Writing an ARP Spoofer/9. Handling Exceptions.mp4 7.8 MB
3. MAC Changer - Algorithm Design/1. What is an Algorithm.mp4 7.0 MB
17. Website Hacking - Writing a Crawler/2.1 subdomains-wodlist.txt.txt 6.6 MB
7. Writing a DNS Spoofer/1.1 interceptor.pdf.pdf 1.8 MB
12. Writing Malware/1.1 Evil Files.pdf.pdf 1.3 MB
2. Writing a MAC Address Changer - Python Basics/1.1 mac_changer.pdf.pdf 980 kB
4. Programming a Network Scanner/1.1 network_scanner.pdf.pdf 719 kB
5. Writing an ARP Spoofer/1.1 arp_spoof.pdf.pdf 709 kB
6. Writing a Packet Sniffer/1.1 Sniffer.pdf.pdf 556 kB
16. Website Web Application Hacking/1.1 Website Hacking.pdf.pdf 346 kB
17. Website Hacking - Writing a Crawler/3.1 files-and-dirs-wordlist.txt.txt 35 kB
13. Writing Malware - Keylogger/6. OOP - Object Oriented Programming Basics.srt 19 kB
15. Writing Malware - Packaging/7. Running Programs on Startup.srt 17 kB
13. Writing Malware - Keylogger/6. OOP - Object Oriented Programming Basics.vtt 17 kB
7. Writing a DNS Spoofer/1. Intercepting Packets - Creating a Proxy.srt 16 kB
3. MAC Changer - Algorithm Design/5. Refactoring & Housekeeping.srt 15 kB
14. Writing Malware - Backdoors/21. Using the Backdoor to Hack Windows, Linux & OS X.srt 15 kB
15. Writing Malware - Packaging/7. Running Programs on Startup.vtt 15 kB
5. Writing an ARP Spoofer/10. Implementing a Restore Function.srt 15 kB
13. Writing Malware - Keylogger/8. Logging Key-strikes and Reporting Them By Email.srt 15 kB
12. Writing Malware/7. Writing Files on Disk.srt 14 kB
7. Writing a DNS Spoofer/1. Intercepting Packets - Creating a Proxy.vtt 14 kB
18. Writing a Program To Guess Login Information/1. Sending Post Requests to Websites.srt 14 kB
1. Introduction/7. The Terminal & Linux Commands.srt 14 kB
19. Writing a Vulnerability Scanner/6. Building Basic Structure For Vulnerability Scanner.srt 14 kB
6. Writing a Packet Sniffer/4. Analysing Sniffed Packets & Extracting Fields From Layers.srt 14 kB
6. Writing a Packet Sniffer/5. Analysing Fields & Extracting Passwords.srt 14 kB
14. Writing Malware - Backdoors/10. Serialisation - Theory.srt 14 kB
12. Writing Malware/3. Sending Reports By Email.srt 14 kB
13. Writing Malware - Keylogger/5. Threading & Recursion.srt 14 kB
3. MAC Changer - Algorithm Design/5. Refactoring & Housekeeping.vtt 13 kB
15. Writing Malware - Packaging/8. Creating a Basic Trojan Using Download & Execute Payload.srt 13 kB
9. Writing a Code Injector/9. Recalculating Content Length.srt 13 kB
13. Writing Malware - Keylogger/2. Writing a Basic Local Keylogger.srt 13 kB
14. Writing Malware - Backdoors/21. Using the Backdoor to Hack Windows, Linux & OS X.vtt 13 kB
10. Bypassing HTTPS/3. Replacing Downloads on HTTPS Pages.srt 13 kB
5. Writing an ARP Spoofer/10. Implementing a Restore Function.vtt 13 kB
14. Writing Malware - Backdoors/3. Connecting Two Remote Computers Using Sockets.srt 13 kB
10. Bypassing HTTPS/1. How to Bypass HTTPS.srt 13 kB
4. Programming a Network Scanner/11. Dictionaries.srt 13 kB
13. Writing Malware - Keylogger/8. Logging Key-strikes and Reporting Them By Email.vtt 13 kB
17. Website Hacking - Writing a Crawler/3. Discovering Hidden Paths in Websites.srt 13 kB
4. Programming a Network Scanner/9. Iterating Over Lists & Analysing Packet.srt 13 kB
12. Writing Malware/4. Filtering Command Output Using Regex.srt 13 kB
17. Website Hacking - Writing a Crawler/2. Discovering Subdomains.srt 13 kB
8. Writing a File Interceptor/5. Modifying HTTP Responses on The Fly.srt 13 kB
11. Writing an ARP Spoof Detector/1. Running Python Programs on Windows.srt 12 kB
4. Programming a Network Scanner/1. Introduction & Teaser.srt 12 kB
12. Writing Malware/7. Writing Files on Disk.vtt 12 kB
2. Writing a MAC Address Changer - Python Basics/4. Variables & Strings.srt 12 kB
2. Writing a MAC Address Changer - Python Basics/2. Using Python Modules & Executing System Commands.srt 12 kB
1. Introduction/7. The Terminal & Linux Commands.vtt 12 kB
18. Writing a Program To Guess Login Information/1. Sending Post Requests to Websites.vtt 12 kB
14. Writing Malware - Backdoors/5. Executing System Commands Remotely.srt 12 kB
12. Writing Malware/10. Interacting With The File System.srt 12 kB
2. Writing a MAC Address Changer - Python Basics/10. Functions.srt 12 kB
12. Writing Malware/5. Stealing WiFi Passwords Saved on a Computer.srt 12 kB
19. Writing a Vulnerability Scanner/6. Building Basic Structure For Vulnerability Scanner.vtt 12 kB
6. Writing a Packet Sniffer/4. Analysing Sniffed Packets & Extracting Fields From Layers.vtt 12 kB
6. Writing a Packet Sniffer/5. Analysing Fields & Extracting Passwords.vtt 12 kB
14. Writing Malware - Backdoors/10. Serialisation - Theory.vtt 12 kB
12. Writing Malware/3. Sending Reports By Email.vtt 12 kB
12. Writing Malware/2. Execute System Command Payload.srt 12 kB
4. Programming a Network Scanner/3. What is ARP & What its Used For.srt 12 kB
13. Writing Malware - Keylogger/5. Threading & Recursion.vtt 12 kB
17. Website Hacking - Writing a Crawler/8. Recursively Discovering All Paths On a Target Website.srt 12 kB
8. Writing a File Interceptor/4. Intercepting HTTP Requests.srt 12 kB
9. Writing a Code Injector/4. Decoding HTTP Responses.srt 12 kB
2. Writing a MAC Address Changer - Python Basics/7. Handling User Input.srt 12 kB
19. Writing a Vulnerability Scanner/4. Extracting HTML Attributes.srt 12 kB
9. Writing a Code Injector/9. Recalculating Content Length.vtt 12 kB
13. Writing Malware - Keylogger/2. Writing a Basic Local Keylogger.vtt 12 kB
14. Writing Malware - Backdoors/20. Handling Unknown Exceptions.srt 12 kB
15. Writing Malware - Packaging/8. Creating a Basic Trojan Using Download & Execute Payload.vtt 12 kB
1. Introduction/8. Python 2 VS Python 3 & Writing Our First Program.srt 12 kB
19. Writing a Vulnerability Scanner/11. Discovering XSS Vulnerabilities.srt 12 kB
2. Writing a MAC Address Changer - Python Basics/8. Handling Command-line Arguments.srt 12 kB
17. Website Hacking - Writing a Crawler/1. Sending GET Requests To Web Servers.srt 12 kB
4. Programming a Network Scanner/12. Improving the Program Using a List of Dictionaries.srt 11 kB
10. Bypassing HTTPS/1. How to Bypass HTTPS.vtt 11 kB
8. Writing a File Interceptor/6. Intercepting & Replacing Downloads on The Network.srt 11 kB
10. Bypassing HTTPS/3. Replacing Downloads on HTTPS Pages.vtt 11 kB
1. Introduction/9. Installing & Using a Python IDE.srt 11 kB
14. Writing Malware - Backdoors/3. Connecting Two Remote Computers Using Sockets.vtt 11 kB
4. Programming a Network Scanner/11. Dictionaries.vtt 11 kB
1. Introduction/5. Installing Kali as a virtual Machine.srt 11 kB
19. Writing a Vulnerability Scanner/9. Extracting & Submitting Forms Automatically.srt 11 kB
17. Website Hacking - Writing a Crawler/3. Discovering Hidden Paths in Websites.vtt 11 kB
4. Programming a Network Scanner/6. Combining Frames To Broadcast Packets.srt 11 kB
12. Writing Malware/4. Filtering Command Output Using Regex.vtt 11 kB
4. Programming a Network Scanner/9. Iterating Over Lists & Analysing Packet.vtt 11 kB
5. Writing an ARP Spoofer/6. Loops.srt 11 kB
8. Writing a File Interceptor/5. Modifying HTTP Responses on The Fly.vtt 11 kB
17. Website Hacking - Writing a Crawler/2. Discovering Subdomains.vtt 11 kB
2. Writing a MAC Address Changer - Python Basics/13. Using Conditional Statements in MAC Changer.srt 11 kB
4. Programming a Network Scanner/1. Introduction & Teaser.vtt 11 kB
2. Writing a MAC Address Changer - Python Basics/4. Variables & Strings.vtt 11 kB
9. Writing a Code Injector/8. Using Groups & None-capturing Regex.srt 11 kB
11. Writing an ARP Spoof Detector/1. Running Python Programs on Windows.vtt 11 kB
2. Writing a MAC Address Changer - Python Basics/2. Using Python Modules & Executing System Commands.vtt 11 kB
14. Writing Malware - Backdoors/5. Executing System Commands Remotely.vtt 11 kB
15. Writing Malware - Packaging/13. Spoofing File Extension.srt 11 kB
12. Writing Malware/8. Password Recovery Basics.srt 11 kB
9. Writing a Code Injector/6. Refactoring & Housekeeping.srt 11 kB
8. Writing a File Interceptor/2. Filtering Traffic Based on the Port Used.srt 11 kB
5. Writing an ARP Spoofer/7. More on Loops & Counters.srt 11 kB
4. Programming a Network Scanner/8. Lists.srt 11 kB
15. Writing Malware - Packaging/14. Converting Python Programs To OS X Executables.srt 11 kB
18. Writing a Program To Guess Login Information/2. Guessing Login Information on Login Pages.srt 11 kB
12. Writing Malware/5. Stealing WiFi Passwords Saved on a Computer.vtt 11 kB
19. Writing a Vulnerability Scanner/5. Posting Forms.srt 11 kB
14. Writing Malware - Backdoors/14. Interacting With the File System - Implementing cd Command.srt 11 kB
12. Writing Malware/10. Interacting With The File System.vtt 11 kB
2. Writing a MAC Address Changer - Python Basics/10. Functions.vtt 11 kB
7. Writing a DNS Spoofer/2. Converting Packets to Scapy Packets.srt 11 kB
12. Writing Malware/2. Execute System Command Payload.vtt 11 kB
14. Writing Malware - Backdoors/6. Implementing a Server.srt 10 kB
15. Writing Malware - Packaging/11. Bypassing Anti-Virus Programs - Practical.srt 10 kB
17. Website Hacking - Writing a Crawler/8. Recursively Discovering All Paths On a Target Website.vtt 10 kB
3. MAC Changer - Algorithm Design/3. Regular Expressions (Regex).srt 10 kB
4. Programming a Network Scanner/3. What is ARP & What its Used For.vtt 10 kB
8. Writing a File Interceptor/4. Intercepting HTTP Requests.vtt 10 kB
9. Writing a Code Injector/4. Decoding HTTP Responses.vtt 10 kB
2. Writing a MAC Address Changer - Python Basics/7. Handling User Input.vtt 10 kB
19. Writing a Vulnerability Scanner/4. Extracting HTML Attributes.vtt 10 kB
19. Writing a Vulnerability Scanner/8. Sending Requests in a Session.srt 10 kB
19. Writing a Vulnerability Scanner/15. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.srt 10 kB
13. Writing Malware - Keylogger/3. Global Variables.srt 10 kB
9. Writing a Code Injector/5. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.srt 10 kB
14. Writing Malware - Backdoors/20. Handling Unknown Exceptions.vtt 10 kB
1. Introduction/8. Python 2 VS Python 3 & Writing Our First Program.vtt 10 kB
17. Website Hacking - Writing a Crawler/1. Sending GET Requests To Web Servers.vtt 10 kB
12. Writing Malware/9. Using all the Above to Steal Saved Passwords Remotely.srt 10 kB
2. Writing a MAC Address Changer - Python Basics/8. Handling Command-line Arguments.vtt 10 kB
19. Writing a Vulnerability Scanner/11. Discovering XSS Vulnerabilities.vtt 10 kB
15. Writing Malware - Packaging/5. Packaging Programs For Windows From Linux.srt 10 kB
14. Writing Malware - Backdoors/13. Sending Commands as List & Implementing Exit Command.srt 10 kB
4. Programming a Network Scanner/12. Improving the Program Using a List of Dictionaries.vtt 10 kB
12. Writing Malware/6. Downloading Files From Program.srt 10 kB
6. Writing a Packet Sniffer/2. Sniffing Packets Using Scapy.srt 10 kB
15. Writing Malware - Packaging/9. Creating a Trojan By Embedding Files In Program Code.srt 10 kB
1. Introduction/9. Installing & Using a Python IDE.vtt 10 kB
14. Writing Malware - Backdoors/2. Client - Server Communication & Connection Types.srt 9.9 kB
1. Introduction/5. Installing Kali as a virtual Machine.vtt 9.9 kB
8. Writing a File Interceptor/6. Intercepting & Replacing Downloads on The Network.vtt 9.9 kB
4. Programming a Network Scanner/6. Combining Frames To Broadcast Packets.vtt 9.9 kB
19. Writing a Vulnerability Scanner/9. Extracting & Submitting Forms Automatically.vtt 9.9 kB
10. Bypassing HTTPS/4. Injecting Code in HTTPS Pages.srt 9.8 kB
7. Writing a DNS Spoofer/5. Analysing & Creating a Custom DNS Response.srt 9.8 kB
5. Writing an ARP Spoofer/6. Loops.vtt 9.8 kB
15. Writing Malware - Packaging/6. Persistence Idea.srt 9.8 kB
10. Bypassing HTTPS/2. Bypassing HTTPS & Sniffing Login Credentials.srt 9.7 kB
15. Writing Malware - Packaging/15. Converting Python Programs to Linux Executables.srt 9.7 kB
2. Writing a MAC Address Changer - Python Basics/13. Using Conditional Statements in MAC Changer.vtt 9.6 kB
9. Writing a Code Injector/8. Using Groups & None-capturing Regex.vtt 9.6 kB
14. Writing Malware - Backdoors/8. Refactoring - Creating a Listener Class.srt 9.5 kB
9. Writing a Code Injector/6. Refactoring & Housekeeping.vtt 9.5 kB
8. Writing a File Interceptor/2. Filtering Traffic Based on the Port Used.vtt 9.5 kB
12. Writing Malware/8. Password Recovery Basics.vtt 9.5 kB
6. Writing a Packet Sniffer/7. Capturing Passwords From Any Computer Connected to the Same Network.srt 9.5 kB
4. Programming a Network Scanner/8. Lists.vtt 9.5 kB
18. Writing a Program To Guess Login Information/2. Guessing Login Information on Login Pages.vtt 9.5 kB
19. Writing a Vulnerability Scanner/5. Posting Forms.vtt 9.4 kB
7. Writing a DNS Spoofer/6. Modifying Packets On The Fly.srt 9.4 kB
14. Writing Malware - Backdoors/14. Interacting With the File System - Implementing cd Command.vtt 9.4 kB
15. Writing Malware - Packaging/14. Converting Python Programs To OS X Executables.vtt 9.4 kB
13. Writing Malware - Keylogger/7. Constructor Methods & Instance Variables.srt 9.4 kB
15. Writing Malware - Packaging/13. Spoofing File Extension.vtt 9.4 kB
7. Writing a DNS Spoofer/2. Converting Packets to Scapy Packets.vtt 9.4 kB
14. Writing Malware - Backdoors/11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.srt 9.4 kB
5. Writing an ARP Spoofer/7. More on Loops & Counters.vtt 9.4 kB
4. Programming a Network Scanner/15. Python 3 Compatibility.srt 9.3 kB
14. Writing Malware - Backdoors/6. Implementing a Server.vtt 9.3 kB
2. Writing a MAC Address Changer - Python Basics/1. What is MAC Address & How To Change it.srt 9.3 kB
4. Programming a Network Scanner/13. Iterating Over Nested Data Structures.srt 9.3 kB
15. Writing Malware - Packaging/11. Bypassing Anti-Virus Programs - Practical.vtt 9.3 kB
3. MAC Changer - Algorithm Design/3. Regular Expressions (Regex).vtt 9.2 kB
6. Writing a Packet Sniffer/6. Extracting URLs.srt 9.1 kB
19. Writing a Vulnerability Scanner/8. Sending Requests in a Session.vtt 9.1 kB
19. Writing a Vulnerability Scanner/15. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.vtt 9.1 kB
15. Writing Malware - Packaging/4. Installing Windows Pyinstaller on Linux.srt 9.1 kB
4. Programming a Network Scanner/7. Sending & Receiving Packets.srt 9.1 kB
2. Writing a MAC Address Changer - Python Basics/9. Initialising Variables Based on Command-line Arguments.srt 9.1 kB
9. Writing a Code Injector/5. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.vtt 9.0 kB
1. Introduction/2. Teaser.srt 9.0 kB
2. Writing a MAC Address Changer - Python Basics/12. Decision Making - Theory.srt 9.0 kB
11. Writing an ARP Spoof Detector/3. Detecting ARP Spoofing Attacks.srt 9.0 kB
13. Writing Malware - Keylogger/3. Global Variables.vtt 9.0 kB
16. Website Web Application Hacking/1. Introduction & Teaser.srt 9.0 kB
14. Writing Malware - Backdoors/18. Implementing Upload Functionality in Listener.srt 8.9 kB
14. Writing Malware - Backdoors/15. Reading Files.srt 8.9 kB
12. Writing Malware/9. Using all the Above to Steal Saved Passwords Remotely.vtt 8.9 kB
15. Writing Malware - Packaging/5. Packaging Programs For Windows From Linux.vtt 8.8 kB
15. Writing Malware - Packaging/9. Creating a Trojan By Embedding Files In Program Code.vtt 8.8 kB
12. Writing Malware/6. Downloading Files From Program.vtt 8.8 kB
6. Writing a Packet Sniffer/2. Sniffing Packets Using Scapy.vtt 8.8 kB
14. Writing Malware - Backdoors/2. Client - Server Communication & Connection Types.vtt 8.8 kB
19. Writing a Vulnerability Scanner/3. Parsing HTML Code.srt 8.8 kB
14. Writing Malware - Backdoors/13. Sending Commands as List & Implementing Exit Command.vtt 8.8 kB
5. Writing an ARP Spoofer/3. Creating an ARP Response.srt 8.8 kB
5. Writing an ARP Spoofer/8. Dynamic Printing.srt 8.7 kB
19. Writing a Vulnerability Scanner/13. Implementing Code To Discover XSS in Forms.srt 8.6 kB
7. Writing a DNS Spoofer/5. Analysing & Creating a Custom DNS Response.vtt 8.6 kB
10. Bypassing HTTPS/4. Injecting Code in HTTPS Pages.vtt 8.6 kB
10. Bypassing HTTPS/2. Bypassing HTTPS & Sniffing Login Credentials.vtt 8.6 kB
15. Writing Malware - Packaging/6. Persistence Idea.vtt 8.6 kB
14. Writing Malware - Backdoors/7. Implementing Skeleton For Server - Client Communication.srt 8.6 kB
2. Writing a MAC Address Changer - Python Basics/11. Returning Values From Functions.srt 8.5 kB
7. Writing a DNS Spoofer/3. What is DNS Spoofing.srt 8.5 kB
15. Writing Malware - Packaging/15. Converting Python Programs to Linux Executables.vtt 8.5 kB
17. Website Hacking - Writing a Crawler/6. Filtering Rsults.srt 8.5 kB
19. Writing a Vulnerability Scanner/14. Implementing Code To Discover XSS in Parameters.srt 8.4 kB
3. MAC Changer - Algorithm Design/2. Reading Output Returned By System Commands.srt 8.4 kB
4. Programming a Network Scanner/5. Using Scapy To Create an ARP Request.srt 8.4 kB
6. Writing a Packet Sniffer/7. Capturing Passwords From Any Computer Connected to the Same Network.vtt 8.4 kB
14. Writing Malware - Backdoors/8. Refactoring - Creating a Listener Class.vtt 8.4 kB
17. Website Hacking - Writing a Crawler/5. Extracting Useful Data From Response.srt 8.3 kB
7. Writing a DNS Spoofer/6. Modifying Packets On The Fly.vtt 8.3 kB
5. Writing an ARP Spoofer/5. Extracting MAC Address From Responses.srt 8.3 kB
15. Writing Malware - Packaging/3. Running Executables Silentely.srt 8.3 kB
13. Writing Malware - Keylogger/7. Constructor Methods & Instance Variables.vtt 8.3 kB
14. Writing Malware - Backdoors/17. Downloading Files From Hacked Computer.srt 8.3 kB
9. Writing a Code Injector/2. Analysing HTTP Responses.srt 8.2 kB
14. Writing Malware - Backdoors/11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.vtt 8.2 kB
15. Writing Malware - Packaging/2. Converting Python Programs To Windows Binary Executables.srt 8.2 kB
3. MAC Changer - Algorithm Design/6. Implementing The Algorithm to Check The Mac Did Change.srt 8.2 kB
1. Introduction/3. What is Programming, What is Hacking & Why Learn Them.srt 8.2 kB
13. Writing Malware - Keylogger/4. Logging Special Keys.srt 8.2 kB
9. Writing a Code Injector/3. Replacing a Substring Using Regex.srt 8.2 kB
6. Writing a Packet Sniffer/3. Extracting data From a Specific Layer.srt 8.2 kB
4. Programming a Network Scanner/15. Python 3 Compatibility.vtt 8.2 kB
4. Programming a Network Scanner/13. Iterating Over Nested Data Structures.vtt 8.2 kB
2. Writing a MAC Address Changer - Python Basics/1. What is MAC Address & How To Change it.vtt 8.2 kB
3. MAC Changer - Algorithm Design/4. Extracting a Substring Using Regex.srt 8.1 kB
9. Writing a Code Injector/10. BeEF Overview & Basic Hook Method.srt 8.1 kB
4. Programming a Network Scanner/10. Using Escape Characters To Enhance Program Output.srt 8.1 kB
14. Writing Malware - Backdoors/16. Writing Files.srt 8.1 kB
19. Writing a Vulnerability Scanner/2. HTTP Requests - POST VS GET.srt 8.0 kB
6. Writing a Packet Sniffer/6. Extracting URLs.vtt 8.0 kB
15. Writing Malware - Packaging/4. Installing Windows Pyinstaller on Linux.vtt 8.0 kB
11. Writing an ARP Spoof Detector/2. Capturing & Analysing ARP Responses.srt 8.0 kB
1. Introduction/2. Teaser.vtt 8.0 kB
4. Programming a Network Scanner/7. Sending & Receiving Packets.vtt 7.9 kB
7. Writing a DNS Spoofer/4. Filtering DNS Responses.srt 7.9 kB
11. Writing an ARP Spoof Detector/3. Detecting ARP Spoofing Attacks.vtt 7.9 kB
2. Writing a MAC Address Changer - Python Basics/12. Decision Making - Theory.vtt 7.9 kB
14. Writing Malware - Backdoors/18. Implementing Upload Functionality in Listener.vtt 7.9 kB
2. Writing a MAC Address Changer - Python Basics/9. Initialising Variables Based on Command-line Arguments.vtt 7.9 kB
16. Website Web Application Hacking/3. How to Hack a Website.srt 7.9 kB
1. Introduction/1. Introduction.srt 7.9 kB
14. Writing Malware - Backdoors/15. Reading Files.vtt 7.8 kB
16. Website Web Application Hacking/1. Introduction & Teaser.vtt 7.8 kB
19. Writing a Vulnerability Scanner/3. Parsing HTML Code.vtt 7.8 kB
5. Writing an ARP Spoofer/3. Creating an ARP Response.vtt 7.8 kB
17. Website Hacking - Writing a Crawler/7. Extracting Unique Links & Storing Them In a List.srt 7.7 kB
2. Writing a MAC Address Changer - Python Basics/6. Getting Input From The User.srt 7.7 kB
5. Writing an ARP Spoofer/8. Dynamic Printing.vtt 7.7 kB
19. Writing a Vulnerability Scanner/13. Implementing Code To Discover XSS in Forms.vtt 7.7 kB
17. Website Hacking - Writing a Crawler/4. Reading Response Content.srt 7.6 kB
7. Writing a DNS Spoofer/3. What is DNS Spoofing.vtt 7.6 kB
9. Writing a Code Injector/7. Debugging Issues.srt 7.6 kB
14. Writing Malware - Backdoors/7. Implementing Skeleton For Server - Client Communication.vtt 7.5 kB
9. Writing a Code Injector/13. Delivering Malware Using BeEF.srt 7.5 kB
2. Writing a MAC Address Changer - Python Basics/11. Returning Values From Functions.vtt 7.5 kB
17. Website Hacking - Writing a Crawler/6. Filtering Rsults.vtt 7.5 kB
19. Writing a Vulnerability Scanner/14. Implementing Code To Discover XSS in Parameters.vtt 7.4 kB
3. MAC Changer - Algorithm Design/2. Reading Output Returned By System Commands.vtt 7.4 kB
17. Website Hacking - Writing a Crawler/5. Extracting Useful Data From Response.vtt 7.4 kB
15. Writing Malware - Packaging/3. Running Executables Silentely.vtt 7.4 kB
4. Programming a Network Scanner/5. Using Scapy To Create an ARP Request.vtt 7.4 kB
5. Writing an ARP Spoofer/5. Extracting MAC Address From Responses.vtt 7.3 kB
9. Writing a Code Injector/3. Replacing a Substring Using Regex.vtt 7.3 kB
14. Writing Malware - Backdoors/17. Downloading Files From Hacked Computer.vtt 7.3 kB
14. Writing Malware - Backdoors/1. Introduction & Teaser.srt 7.3 kB
9. Writing a Code Injector/2. Analysing HTTP Responses.vtt 7.3 kB
15. Writing Malware - Packaging/2. Converting Python Programs To Windows Binary Executables.vtt 7.3 kB
1. Introduction/3. What is Programming, What is Hacking & Why Learn Them.vtt 7.3 kB
6. Writing a Packet Sniffer/3. Extracting data From a Specific Layer.vtt 7.2 kB
3. MAC Changer - Algorithm Design/6. Implementing The Algorithm to Check The Mac Did Change.vtt 7.2 kB
14. Writing Malware - Backdoors/12. Serialisation - Reliably Sending & Receiving Data.srt 7.2 kB
13. Writing Malware - Keylogger/4. Logging Special Keys.vtt 7.2 kB
3. MAC Changer - Algorithm Design/4. Extracting a Substring Using Regex.vtt 7.2 kB
9. Writing a Code Injector/10. BeEF Overview & Basic Hook Method.vtt 7.2 kB
19. Writing a Vulnerability Scanner/2. HTTP Requests - POST VS GET.vtt 7.1 kB
4. Programming a Network Scanner/10. Using Escape Characters To Enhance Program Output.vtt 7.1 kB
14. Writing Malware - Backdoors/19. Implementing Upload Functionality in Backdoor.srt 7.1 kB
14. Writing Malware - Backdoors/16. Writing Files.vtt 7.1 kB
11. Writing an ARP Spoof Detector/2. Capturing & Analysing ARP Responses.vtt 7.1 kB
9. Writing a Code Injector/11. Hooking Computers Using code_injector.srt 7.0 kB
19. Writing a Vulnerability Scanner/10. Implementing a Method To Run The Scanner.srt 7.0 kB
16. Website Web Application Hacking/3. How to Hack a Website.vtt 7.0 kB
5. Writing an ARP Spoofer/4. Sending ARP Responses.srt 7.0 kB
7. Writing a DNS Spoofer/4. Filtering DNS Responses.vtt 7.0 kB
1. Introduction/1. Introduction.vtt 7.0 kB
5. Writing an ARP Spoofer/1. What is ARP Spoofing.srt 7.0 kB
5. Writing an ARP Spoofer/9. Handling Exceptions.srt 6.8 kB
14. Writing Malware - Backdoors/9. Refactoring - Creating a Backdoor Class.srt 6.8 kB
17. Website Hacking - Writing a Crawler/7. Extracting Unique Links & Storing Them In a List.vtt 6.8 kB
8. Writing a File Interceptor/3. Analysing HTTP Requests.srt 6.8 kB
17. Website Hacking - Writing a Crawler/4. Reading Response Content.vtt 6.8 kB
2. Writing a MAC Address Changer - Python Basics/6. Getting Input From The User.vtt 6.7 kB
7. Writing a DNS Spoofer/7. Redirecting DNS Responses.srt 6.7 kB
9. Writing a Code Injector/7. Debugging Issues.vtt 6.7 kB
2. Writing a MAC Address Changer - Python Basics/3. Implementing a Very Basic MAC Changer.srt 6.7 kB
9. Writing a Code Injector/13. Delivering Malware Using BeEF.vtt 6.6 kB
15. Writing Malware - Packaging/10. Bypassing Anti-Virus Programs - Theory.srt 6.6 kB
1. Introduction/6. Basic Overview of Kali Linux.srt 6.5 kB
14. Writing Malware - Backdoors/4. Sending & Receiving Data Over TCP.srt 6.4 kB
14. Writing Malware - Backdoors/1. Introduction & Teaser.vtt 6.4 kB
14. Writing Malware - Backdoors/12. Serialisation - Reliably Sending & Receiving Data.vtt 6.3 kB
5. Writing an ARP Spoofer/11. Restoring ARP Tables When an Exception Occures.srt 6.3 kB
14. Writing Malware - Backdoors/19. Implementing Upload Functionality in Backdoor.vtt 6.3 kB
9. Writing a Code Injector/11. Hooking Computers Using code_injector.vtt 6.2 kB
19. Writing a Vulnerability Scanner/10. Implementing a Method To Run The Scanner.vtt 6.2 kB
5. Writing an ARP Spoofer/4. Sending ARP Responses.vtt 6.2 kB
5. Writing an ARP Spoofer/1. What is ARP Spoofing.vtt 6.1 kB
19. Writing a Vulnerability Scanner/12. Exploiting XSS Vulnerabilities.srt 6.1 kB
6. Writing a Packet Sniffer/1. Introduction & Teaser.srt 6.1 kB
5. Writing an ARP Spoofer/2. Redirecting the Flow of Packets in a Network Using arpspoof.srt 6.1 kB
5. Writing an ARP Spoofer/9. Handling Exceptions.vtt 6.0 kB
14. Writing Malware - Backdoors/9. Refactoring - Creating a Backdoor Class.vtt 6.0 kB
9. Writing a Code Injector/12. Basic BeEF Commands.srt 6.0 kB
15. Writing Malware - Packaging/12. Adding an Icon to Generated Executables.srt 6.0 kB
19. Writing a Vulnerability Scanner/7. Using Default Parameters.srt 6.0 kB
8. Writing a File Interceptor/3. Analysing HTTP Requests.vtt 6.0 kB
7. Writing a DNS Spoofer/7. Redirecting DNS Responses.vtt 6.0 kB
2. Writing a MAC Address Changer - Python Basics/3. Implementing a Very Basic MAC Changer.vtt 5.9 kB
15. Writing Malware - Packaging/10. Bypassing Anti-Virus Programs - Theory.vtt 5.8 kB
1. Introduction/6. Basic Overview of Kali Linux.vtt 5.8 kB
2. Writing a MAC Address Changer - Python Basics/5. Using Variables in MAC Changer.srt 5.7 kB
14. Writing Malware - Backdoors/4. Sending & Receiving Data Over TCP.vtt 5.6 kB
5. Writing an ARP Spoofer/11. Restoring ARP Tables When an Exception Occures.vtt 5.6 kB
8. Writing a File Interceptor/1. Introduction & Teaser.srt 5.5 kB
16. Website Web Application Hacking/2. What is a Website.srt 5.4 kB
19. Writing a Vulnerability Scanner/12. Exploiting XSS Vulnerabilities.vtt 5.4 kB
6. Writing a Packet Sniffer/1. Introduction & Teaser.vtt 5.4 kB
5. Writing an ARP Spoofer/2. Redirecting the Flow of Packets in a Network Using arpspoof.vtt 5.3 kB
19. Writing a Vulnerability Scanner/7. Using Default Parameters.vtt 5.3 kB
15. Writing Malware - Packaging/12. Adding an Icon to Generated Executables.vtt 5.3 kB
9. Writing a Code Injector/12. Basic BeEF Commands.vtt 5.2 kB
2. Writing a MAC Address Changer - Python Basics/5. Using Variables in MAC Changer.vtt 5.0 kB
4. Programming a Network Scanner/4. Designing an Algorithm To Discover Clients Connected To The Same Network.srt 5.0 kB
1. Introduction/4. Lab Overview & Needed Software.srt 4.9 kB
8. Writing a File Interceptor/1. Introduction & Teaser.vtt 4.8 kB
16. Website Web Application Hacking/2. What is a Website.vtt 4.8 kB
4. Programming a Network Scanner/2. Installing Windows as a Virtual Machine.srt 4.8 kB
13. Writing Malware - Keylogger/1. Introduction & Teaser.srt 4.6 kB
3. MAC Changer - Algorithm Design/1. What is an Algorithm.srt 4.5 kB
4. Programming a Network Scanner/4. Designing an Algorithm To Discover Clients Connected To The Same Network.vtt 4.4 kB
1. Introduction/4. Lab Overview & Needed Software.vtt 4.3 kB
4. Programming a Network Scanner/2. Installing Windows as a Virtual Machine.vtt 4.2 kB
15. Writing Malware - Packaging/1. Introduction & Teaser.srt 4.1 kB
13. Writing Malware - Keylogger/1. Introduction & Teaser.vtt 4.0 kB
3. MAC Changer - Algorithm Design/1. What is an Algorithm.vtt 4.0 kB
20. Bonus Section/1. Bonus Lecture - What's Next.html 3.7 kB
15. Writing Malware - Packaging/1. Introduction & Teaser.vtt 3.6 kB
19. Writing a Vulnerability Scanner/1. Introduction & Teaser.srt 3.3 kB
19. Writing a Vulnerability Scanner/1. Introduction & Teaser.vtt 2.9 kB
12. Writing Malware/1. Introduction & Teaser.srt 2.4 kB
12. Writing Malware/1. Introduction & Teaser.vtt 2.1 kB
9. Writing a Code Injector/1. Introduction & Teaser.srt 1.7 kB
9. Writing a Code Injector/1. Introduction & Teaser.vtt 1.5 kB
[FTU Forum].url 252 B
1. Introduction/5.3 How to Fix Blank Screen After Starting Kali.html 158 B
4. Programming a Network Scanner/14. Get IP Range Using Command Line Arguments.html 156 B
1. Introduction/5.2 Kali Linux Download Page.html 150 B
4. Programming a Network Scanner/7.1 More info about the sr() function.html 138 B
13. Writing Malware - Keylogger/6.1 More info About Objects in Python.html 125 B
2. Writing a MAC Address Changer - Python Basics/12.1 More info on Decision Making.html 125 B
3. MAC Changer - Algorithm Design/3.1 More info on Regular Expressions.html 125 B
2. Writing a MAC Address Changer - Python Basics/4.1 More info About Variables in Python.html 124 B
4. Programming a Network Scanner/2.1 Windows Virtual Image Download Link.html 124 B
[FreeCoursesOnline.Me].url 123 B
1. Introduction/7.1 List of Linux Commands.html 122 B
14. Writing Malware - Backdoors/3.2 Tutorials Point Socket Documentation.html 120 B
15. Writing Malware - Packaging/9.1 Pyinstaller Documentation.html 120 B
4. Programming a Network Scanner/11.1 More info about Python dictionaries.html 120 B
4. Programming a Network Scanner/12.1 More info about python dictionaries.html 120 B
5. Writing an ARP Spoofer/9.1 More info About Exceptions.html 120 B
2. Writing a MAC Address Changer - Python Basics/10.1 More info on Python Functions.html 119 B
2. Writing a MAC Address Changer - Python Basics/6.1 More info about Python Built-in Functions.html 119 B
4. Programming a Network Scanner/3.2 More info about Scapy ARP Ping.html 119 B
[FreeTutorials.Us].url 119 B
12. Writing Malware/7.1 File Modes In Python.html 118 B
1. Introduction/9.1 Pycharm Download Link.html 118 B
2. Writing a MAC Address Changer - Python Basics/4.2 More info About Strings in Python.html 117 B
8. Writing a File Interceptor/5.1 List of HTTP Responses.html 116 B
19. Writing a Vulnerability Scanner/3.1 Beautiful Soup Documentation.html 115 B
4. Programming a Network Scanner/8.1 More info about python lists.html 115 B
5. Writing an ARP Spoofer/6.1 More info about Python Loops.html 115 B
15. Writing Malware - Packaging/4.1 Python 2.7.14 Download Page.html 114 B
6. Writing a Packet Sniffer/2.1 More info About the Sniff Function.html 114 B
10. Bypassing HTTPS/1.1 Moxie explaining how SSLstrip works.html 112 B
2. Writing a MAC Address Changer - Python Basics/2.1 Subprocess Module Documentation.html 110 B
3. MAC Changer - Algorithm Design/2.1 Check_call() Manuall Page.html 110 B
4. Programming a Network Scanner/15.1 argparse Documentation.html 110 B
13. Writing Malware - Keylogger/5.1 Threading Documentation.html 109 B
12. Writing Malware/8.1 LaZagne Git Repo.html 108 B
2. Writing a MAC Address Changer - Python Basics/8.1 Optparse Documentation Page.html 108 B
12. Writing Malware/3.1 smtplib Documentation.html 107 B
14. Writing Malware - Backdoors/3.1 Sockets Official Documentation.html 106 B
15. Writing Malware - Packaging/7.2 Python Shutil Library Documentation.html 106 B
15. Writing Malware - Packaging/12.2 Easyicon - a website to convert images to icons.html 105 B
4. Programming a Network Scanner/10.1 Python Escape Characters.html 105 B
14. Writing Malware - Backdoors/11.1 json Documentation.html 104 B
1. Introduction/5.1 How to Fix Missing Nat Network Issue.html 104 B
4. Programming a Network Scanner/1.2 Best Wireless Adapters To Use With Kali.html 104 B
17. Website Hacking - Writing a Crawler/1.1 Python Requests.html 103 B
12. Writing Malware/10.1 OS Library Documentation.html 102 B
15. Writing Malware - Packaging/7.1 Python OS Library Documentation.html 102 B
1. Introduction/4.1 Virtual Box Download Page.html 102 B
3. MAC Changer - Algorithm Design/4.1 Re Module Manual Page.html 102 B
6. Writing a Packet Sniffer/3.1 Scapy-http Git Repo.html 101 B
4. Programming a Network Scanner/3.1 Scapy Documentation.html 100 B
15. Writing Malware - Packaging/11.2 UPX Download Page.html 97 B
6. Writing a Packet Sniffer/3.2 Berkeley Packet Filter (BPF) syntax.html 94 B
13. Writing Malware - Keylogger/2.1 Pynput Documentation.html 93 B
15. Writing Malware - Packaging/12.1 Iconfinder - a website to download icons.html 88 B
4. Programming a Network Scanner/1.3 Website That Sells Supported Wireless Adapters.html 88 B
15. Writing Malware - Packaging/11.1 Nodistribute.html 86 B
3. MAC Changer - Algorithm Design/3.2 Pythex.org.html 80 B
[FreeTutorials.Us] Udemy Learn Python & Ethical Hacking From Scratch -
1.1 Moxie explaining how SSLstrip works.html 112 B
1. How to Bypass HTTPS.mp4 164 MB
1. How to Bypass HTTPS.srt 13 kB
1. How to Bypass HTTPS.vtt 11 kB
2. Bypassing HTTPS & Sniffing Login Credentials.mp4 68 MB
2. Bypassing HTTPS & Sniffing Login Credentials.srt 9.7 kB
2. Bypassing HTTPS & Sniffing Login Credentials.vtt 8.6 kB
3. Replacing Downloads on HTTPS Pages.mp4 116 MB
3. Replacing Downloads on HTTPS Pages.srt 13 kB
3. Replacing Downloads on HTTPS Pages.vtt 11 kB
4. Injecting Code in HTTPS Pages.mp4 100 MB
4. Injecting Code in HTTPS Pages.srt 9.8 kB
4. Injecting Code in HTTPS Pages.vtt 8.6 kB
/1. Running Python Programs on Windows.mp4 107 MB
/1. Running Python Programs on Windows.srt 12 kB
/1. Running Python Programs on Windows.vtt 11 kB
/2. Capturing & Analysing ARP Responses.mp4 56 MB
/2. Capturing & Analysing ARP Responses.srt 8.0 kB
/2. Capturing & Analysing ARP Responses.vtt 7.1 kB
/3. Detecting ARP Spoofing Attacks.mp4 68 MB
/3. Detecting ARP Spoofing Attacks.srt 9.0 kB
/3. Detecting ARP Spoofing Attacks.vtt 7.9 kB
/10.1 OS Library Documentation.html 102 B
/10. Interacting With The File System.mp4 77 MB
/10. Interacting With The File System.srt 12 kB
/10. Interacting With The File System.vtt 11 kB
/1.1 Evil Files.pdf.pdf 1.3 MB
/1. Introduction & Teaser.mp4 44 MB
/1. Introduction & Teaser.srt 2.4 kB
/1. Introduction & Teaser.vtt 2.1 kB
/2. Execute System Command Payload.mp4 91 MB
/2. Execute System Command Payload.srt 12 kB
/2. Execute System Command Payload.vtt 11 kB
/3.1 smtplib Documentation.html 107 B
/3. Sending Reports By Email.mp4 90 MB
/3. Sending Reports By Email.srt 14 kB
/3. Sending Reports By Email.vtt 12 kB
/4. Filtering Command Output Using Regex.mp4 91 MB
/4. Filtering Command Output Using Regex.srt 13 kB
/4. Filtering Command Output Using Regex.vtt 11 kB
/5. Stealing WiFi Passwords Saved on a Computer.mp4 118 MB
/5. Stealing WiFi Passwords Saved on a Computer.srt 12 kB
/5. Stealing WiFi Passwords Saved on a Computer.vtt 11 kB
/6. Downloading Files From Program.mp4 90 MB
/6. Downloading Files From Program.srt 10 kB
/6. Downloading Files From Program.vtt 8.8 kB
/7.1 File Modes In Python.html 118 B
/7. Writing Files on Disk.mp4 69 MB
/7. Writing Files on Disk.srt 14 kB
/7. Writing Files on Disk.vtt 12 kB

Stream

Downloading Seeding [FreeTutorials.Us] Udemy - Learn Python & Ethical Hacking From Scratch from to 0 peers.
of
0 b/s / ↗0 b/s