Python3 For Offensive Security Certified Professional,OSCP

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size2.6 GB
  • Uploaded Byfreecoursewb
  • Downloads151
  • Last checkedAug. 10th '21
  • Date uploadedAug. 07th '21
  • Seeders 15
  • Leechers12

Infohash : DF0B62BC6A45935765EC0679B67386C1319F363E

Python3 For Offensive Security Certified Professional,OSCP

Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 48.0 KHz
Language: English | Size: 2.54 GB | Duration: 5h 0m
Python3 for Bug Hunter
What you'll learn
20 videos on Python programming & ethical hacking
Install hacking lab & needed software (on Windows, OS X and Linux)
Learn 2 topics at the same time - Python programming & Ethical Hacking
Start from 0 up to a high-intermediate level
Write over 20 ethical hacking and security programs
Learn by example, by writing exciting programs
Model problems, design solutions & implement them using Python
Write programs in Python 2 and 3
Write cross platform programs that work on Windows, OS X & Linux
Have a deep understanding on how computer systems work
Have a strong base & use the skills learned to write any program even if its not related to hacking
Understand what is Hacking, what is Programming, and why are they related
Design a testing lab to practice hacking & programming safely
Interact & use Linux terminal
Understand what MAC address is & how to change it
Write a python program to change MAC address
Use Python modules and libraries
Understand Object Oriented Programming
Write object oriented programs
Model & design extendable programs
Write a program to discover devices connected to the same network
Read, analyse & manipulate network packets
Use sockets to send data over TCP
Send data reliably over TCP
Write client-server programs
Write a backdoor that works on Windows, OS X and Linux
Implement cool features in the backdoor such as file system access, upload and download files and persistence
Write a remote keylogger that can register all keystrikes and send them by Email
Interact with files using python (read, write & modify)
Convert python programs to binary executables that work on Windows, OS X and Linux
Convert malware to torjans that work and function like other file types like an image or a PDF
Bypass Anti-Virus Programs
Write a program that can discover vulnerabilities in websites

Description
Welcome to my comprehensive course on python programming and ethical hacking. The course assumes you have NO prior knowledge in any of these topics, and by the end of it you'll be at a high intermediate level being able to combine both of these skills to write python programs to hack into computer systems exactly the same way that black hat hackers do. That's not all, you'll also be able to use the programming skills you learn to write any program even if it has nothing to do with hacking.

This course is highly practical but it won't neglect the theory, we'll start with basics of ethical hacking and python programming and installing the needed software. Then we'll dive and start programming straight away. You'll learn everything by example, by writing useful hacking programs, no boring dry programming lectures.

The course is divided into a number of sections, each aims to achieve a specific goal, the goal is usually to hack into a certain system! We'll start by learning how this system work and its weaknesses, then you'll lean how to write a python program to exploit these weaknesses and hack the system. As we write the program I will teach you python programming from scratch covering one topic at a time. By the end of the course you're going to have a number of ethical hacking programs written by yourself (see below) from backdoors, keyloggers, credential harvesters, network hacking tools, website hacking tools and the list goes on. You'll also have a deep understanding on how computer systems work, how to model problems, design an algorithm to solve problems and implement the solution using python.

,

Files:

[ FreeCourseWeb.com ] Udemy - Python3 For Offensive Security Certified Professional,OSCP
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Ports and Vulnerability
    • 1. Intro to Socket Programming.mp4 (238.3 MB)
    • 1. Intro to Socket Programming.srt (14.3 KB)
    • 2. Ports and Vulnerability Scanner Part-1.mp4 (98.3 MB)
    • 2. Ports and Vulnerability Scanner Part-1.srt (10.1 KB)
    • 3. Ports and Vulnerability Scanner Part-2.mp4 (65.4 MB)
    • 3. Ports and Vulnerability Scanner Part-2.srt (6.3 KB)
    • 4. Ports and Vulnerability Scanner Part-3.mp4 (214.9 MB)
    • 4. Ports and Vulnerability Scanner Part-3.srt (23.3 KB)
    • 5. Ports and Vulnerability Scanner Part-4(a).mp4 (145.1 MB)
    • 5. Ports and Vulnerability Scanner Part-4(a).srt (14.7 KB)
    • 6. Ports and Vulnerability Scanner Part-4(b).mp4 (111.9 MB)
    • 6. Ports and Vulnerability Scanner Part-4(b).srt (9.4 KB)
    • 7. Ports and Vulnerability Scanner Part-4(c).mp4 (91.0 MB)
    • 7. Ports and Vulnerability Scanner Part-4(c).srt (6.1 KB)
    • 8. Ports and Vulnerability Scanner Part-5 Automatic Bannger.mp4 (124.6 MB)
    • 8. Ports and Vulnerability Scanner Part-5 Automatic Bannger.srt (11.3 KB)
    2. FTP and SSH
    • 1. FTP and SSH Brute Forcing Part-1 SSH-Login.mp4 (127.8 MB)
    • 1. FTP and SSH Brute Forcing Part-1 SSH-Login.srt (12.4 KB)
    • 2. FTP and SSH Brute Forcing Part-2 SSH Upload.mp4 (104.3 MB)
    • 2. FTP and SSH Brute Forcing Part-2 SSH Upload.srt (10.4 KB)
    • 3. FTP and SSH Brute Forcing Part-3 SSH Download.mp4 (78.2 MB)
    • 3. FTP and SSH Brute Forcing Part-3 SSH Download.srt (6.9 KB)
    • 4. FTP and SSH Brute Forcing Part-4 SSH Brute Force Part-2.mp4 (220.9 MB)
    • 4. FTP and SSH Brute Forcing Part-4 SSH Brute Force Part-2.srt (12.4 KB)
    • 5. FTP and SSH Brute Forcing Part-5 SSH Brute Force Part-1.mp4 (122.7 MB)
    • 5. FTP and SSH Brute Forcing Part-5 SSH Brute Force Part-1.srt (9.1 KB)
    • 6. FTP and SSH Brute Forcing Part-6 Anonymous FTP Login.mp4 (111.3 MB)
    • 6. FTP and SSH Brute Forcing Part-6 Anonymous FTP Login.srt (8.8 KB)
    • 7. FTP and SSH Brute Forcing Part-7 FTP Brute Forcing.mp4 (178.5 MB)
    • 7. FTP and SSH Brute Forcing Part-7 FTP Brute Forcing.srt (10.4 KB)
    3. Cryptography
    • 1. Cryptography part-1 hash generate.mp4 (98.0 MB)
    • 1. Cryptography part-1 hash generate.srt (6.6 KB)
    • 2. Cryptography part-2 sha1 cracker.mp4 (94.0 MB)
    • 2. Cryptography part-2 sha1 cracker.srt (7.7 KB)
    • 3. Cryptography part-3 md5 cracker.mp4 (103.2 MB)
    • 3. Cryptography part-3 md5 cracker.srt (7.3 KB)
    • 4. Cryptography part-4 Cracking Crypt Password with salt.mp4 (132.5 MB)
    • 4. Cryptography part-4 Cracking Crypt Password with salt.srt (10.6 KB)
    • 5. Cryptography part-5 Cracking pdf Password.mp4 (75.2 MB)
    • 5. Cryptography part-5 Cracking pdf Password.srt (6.1 KB)
    • 6. Change MAC Address part-1 Manual method.mp4 (75.3 MB)
    • 6. Change MAC Address part-1 Manual method.srt (8.5 KB)
    • Bonus Resources.txt (0.3 KB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce