Ethical Hacking & Python Malware Complete Course
Master Ethical Hacking and Malware Development with Python – From Beginner to Advanced Techniques
4.46 (136 reviews)

14,641
students
22.5 hours
content
Jan 2025
last update
$19.99
regular price
What you will learn
Introduction to Ethical Hacking
Backdoors: Explore techniques for creating backdoor malware for unauthorized access to systems.
Packaging with Python: Understand how to package Python programs into standalone executables for distribution.
Website Hacking with Python: Leverage Python for web application hacking and exploit various vulnerabilities.
Guess Login Password with Python: Develop a script in Python to perform brute-force attacks for guessing login passwords.
Writing a Vulnerability Scanner with Python: Create a vulnerability scanner using Python to identify and assess system vulnerabilities.
Installing VirtualBox and setting up virtual machines (Windows, Kali Linux, Metasploitable)
Python programming fundamentals
Writing scripts for network scanning, penetration testing, and automation
Understanding MAC addresses and changing them
Packet sniffing, MITM (Man-in-the-Middle) attacks
Wireless network hacking (WPA/WPA2 cracking)
ARP spoofing, Bettercap, and Wireshark analysis
Website and Database Exploitation
SQL injections and database hacking
XSS (Cross-Site Scripting) attacks
File inclusion vulnerabilities
Exploiting web applications using Metasploit
Discovering and exploiting system vulnerabilities
Creating backdoors and persistence mechanisms
Post-exploitation techniques like keylogging and data extraction
Writing Trojans and backdoors
Converting Python scripts into Windows executables
Creating persistent malware and embedding payloads
Social Engineering and Credential Theft
Using tools like Veil, Beef, and Bettercap
Capturing credentials and session hijacking
Hooking browsers and stealing login credentials
Learning legal and responsible security testing
5692300
udemy ID
12/4/2023
course created date
12/23/2023
course indexed date
Bot
course submited by