Softwarez.Info - Software's World!
Complete Ethical Hacking Cybersecurity Course with Python - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials)
+--- Thread: Complete Ethical Hacking Cybersecurity Course with Python (/Thread-Complete-Ethical-Hacking-Cybersecurity-Course-with-Python)



Complete Ethical Hacking Cybersecurity Course with Python - AD-TEAM - 02-09-2025

[Image: 537368816_que-es-udemy-analisis-opiniones.jpg]
6.07 GB | 19min 17s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English

Files Included :
1 -Course Promotion.mp4 (28.61 MB)
2 -Course Introduction.mp4 (35.07 MB)
1 -1 writing a basic keylogger.mp4 (24.16 MB)
2 -2 global variables in keylogger.mp4 (34.01 MB)
3 -3 logging special keys.mp4 (46.95 MB)
4 -4 threading and recursion.mp4 (40.04 MB)
5 -5 OOP, object oriented programming.mp4 (83.95 MB)
6 -6 constructor methods and instance variables.mp4 (61.89 MB)
7 -7 logging key-strikes and reporting by emails.mp4 (124.76 MB)
1 -1 client - server communication and connection types.mp4 (16.97 MB)
10 -10 changing directory in file systems.mp4 (118.4 MB)
11 -11 downloading files from victim computers.mp4 (69.94 MB)
12 -12 download any kind of file from hacked computer.mp4 (28.54 MB)
2 -2 Connecting two remote computer using socket.mp4 (50.53 MB)
3 -3 sending and receiving data over tcp.mp4 (39.42 MB)
4 -4 execute system commond remotly.mp4 (86.63 MB)
5 -5 implementing a server.mp4 (64.44 MB)
6 -6 implementing skeleton for server - client communication.mp4 (52.84 MB)
7 -7 Refactoring - Creating Listener Class.mp4 (54.81 MB)
8 -8 Refactoring - Creating Backdoor class.mp4 (32.07 MB)
9 -9 sending commands as list and implementing exit command.mp4 (50.65 MB)
1 -1 Converting Python Programs To Windows Binary Executables.mp4 (56.5 MB)
2 -2 Running Executables Silentely.mp4 (69.44 MB)
3 -3 Persistencey.mp4 (43.2 MB)
4 -4 running programs on startup.mp4 (175.77 MB)
5 -5 Creating a Basic Trojan Using Download Execute Payload.mp4 (117.34 MB)
6 -6 Creating a Trojan By Embedding Files In Program Code.mp4 (75.22 MB)
7 -7 Adding an Icon to Generated Executables mp4.mp4 (67.42 MB)
1 -1 installing metasploitable.mp4 (41.01 MB)
10 -10 Recursively discovering all paths on a target website.mp4 (31.88 MB)
2 -2 accessing metasploitable from kali.mp4 (41.18 MB)
3 -3 sending get requests to web server.mp4 (65.27 MB)
4 -4 Discovering Subdomains.mp4 (35.99 MB)
5 -5 descovering google sub domain.mp4 (68.59 MB)
6 -6 descovering hidden path.mp4 (89.95 MB)
7 -7 extracting link from webpage using re.mp4 (91.35 MB)
8 -8 filtering results.mp4 (135.79 MB)
9 -9 getting only the unique link.mp4 (35.12 MB)
1 -1 sending post requests to website.mp4 (72.85 MB)
2 -2 guess login password.mp4 (82.13 MB)
1 -1 get and post method.mp4 (35.26 MB)
10 -10 descovering XSS vulnerabilities.mp4 (49.13 MB)
11 -11 implementing code to discover xss in forms.mp4 (80.18 MB)
12 -12 implementing code to discover xss in links.mp4 (62.26 MB)
13 -15 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4 (63.56 MB)
2 -2 parsing html code.mp4 (61.45 MB)
3 -3 extracting html attributes.mp4 (73.08 MB)
4 -4 posting forms.mp4 (119.67 MB)
5 -5 building basic structure for vulnerability scanner.mp4 (94.65 MB)
6 -6 using default parameters.mp4 (16.37 MB)
7 -7 sendig request to a session.mp4 (97.49 MB)
8 -8 extracting submitting forms automatically.mp4 (173.49 MB)
9 -9 Implementing a method to run scanner.mp4 (53.22 MB)
1 -1 Lab Overview & Needed Software.mp4 (58.6 MB)
2 -2 Installing Windows and kali linux on Virtual Box.mp4 (48.55 MB)
3 -3 Installing VsCode in kali linux.mp4 (66.49 MB)
4 -4 Some Basic Command of Kali linux.mp4 (34.32 MB)
1 -1 Your First program in python.mp4 (26.35 MB)
10 -10 while loops in python.mp4 (38.41 MB)
11 -11 for loops in python.mp4 (32.9 MB)
12 -12 function in python.mp4 (54.97 MB)
13 -13 learning builds-in function from chatgpt in vscode.mp4 (42.93 MB)
14 -14 Installing some package and use it.mp4 (50.1 MB)
2 -2 Python Variables.mp4 (35.03 MB)
3 -3 DataType in Python.mp4 (29.82 MB)
4 -4 Casting in python.mp4 (24.28 MB)
5 -5 List in python.mp4 (26.68 MB)
6 -6 tuple in python.mp4 (21.63 MB)
7 -7 sets in python.mp4 (23.07 MB)
8 -7 dictionary in python.mp4 (23.07 MB)
9 -9 if condition in python.mp4 (26.01 MB)
1 -1 what is Mac address and how to change it.mp4 (58.09 MB)
10 -10 Decision Making in MAC Changer.mp4 (70.52 MB)
2 -2 Runing System command using subproccess modules.mp4 (37.46 MB)
3 -3 Implementing a very basic MAC changer.mp4 (28.83 MB)
4 -4 Implementing variables in MAC changer.mp4 (35.37 MB)
5 -5 Implementing the input function with MAC changer.mp4 (43.52 MB)
6 -6 handling Hijacking problem.mp4 (45.78 MB)
7 -7 Handling Command Line argument.mp4 (41.47 MB)
8 -8 Initialising variables base on command line arguments.mp4 (38.72 MB)
9 -9 uisng functions for Mac Changer.mp4 (42.83 MB)
1 -1 What is an algorithm and read the output.mp4 (38.08 MB)
2 -2 REgular Expression.mp4 (41.92 MB)
3 -3 Extracting Substring using Regex.mp4 (74.54 MB)
4 -4 Rfactoring the Housekeeping.mp4 (39.59 MB)
5 -5 Implementing the algorithm to check if the mac did changed.mp4 (38.28 MB)
1 -1 whati is ARP and what is it used for.mp4 (40.62 MB)
2 -2 design and algorithm to descover client connected to the same network.mp4 (16.08 MB)
3 -3 using scapy to create an arp request.mp4 (35.7 MB)
4 -4 combining frames to broadcast packets.mp4 (48.3 MB)
5 -5 sending and receiving packets.mp4 (29.75 MB)
6 -6 iterating over lists analysing packet.mp4 (62 MB)
7 -7 using excape characters to engance program output.mp4 (34.13 MB)
8 -8 iterating over nested data structures.mp4 (60.49 MB)
1 -1 what is arp spoofing program and how does it work.mp4 (33.47 MB)
2 -2 using arpspoof program.mp4 (38.51 MB)
3 -3 creating and sending ARP response.mp4 (37.22 MB)
4 -4 Extracting mac address from response.mp4 (55.1 MB)
5 -5 using loops in arp spoofing.mp4 (63.91 MB)
6 -6 improving the program by using counter.mp4 (33.76 MB)
7 -7 Dynamic Printing.mp4 (23.31 MB)
8 -8 Handling Exceptions.mp4 (24.81 MB)
9 -9 restoring arp table when an exception occures.mp4 (118.31 MB)
1 -1 sniffing packets using scapy.mp4 (67.89 MB)
2 -2 extracting data from a specific layer.mp4 (51.29 MB)
3 -3 Analysing Sniffed Packets Extracting Fields From Layers.mp4 (68.9 MB)
4 -4 Analysing Fields Extracting Passwords.mp4 (70.57 MB)
5 -5 Extracting URL.mp4 (68.52 MB)
6 -6 Extracting data from windows.mp4 (100.44 MB)
1 -1 Running Python Programs on Windows.mp4 (51.77 MB)
2 -2 capturing and analyzing arp responses.mp4 (44.47 MB)
3 -3 detecting arp spoofing attacks.mp4 (80.44 MB)]
Screenshot
[Image: GqUxk1y6_o.jpg]

TurboBit

[To see links please register or login]

RapidGator

[To see links please register or login]