#TheShadowArmy
🔸️Black-Hat Python For Pentesters🔸️
🟠SOURCE :- CLICK HERE TO SEE
CLICK ON THE TOPICS TO WATCH VIDEOS
0. Course Overview
1. Penteration Testing Overview
2 Settings up Python
3 String formatting in Python
4 Python data structures
5 Python networking & file
6. Object oriented programming in Python
7. Port scanner principles
8. Making a port scanner
9 Banner Grabbing
10 importing and using nmap
10 importing and using nmap
11 Target Research and Reconnaissance
12 Web page scrapping
13 Phishing going from recon to creds
14 Password cracking concepts
15 Pre computed word list s
16 Brute force with threads
17 Rainbow 🌈 Tables
18 Cracking Linux Hashes
19 Cracking Zip Files
20 Python ctypes
21 Evading antivirus checking
22 Dropping the payload
23 Overview of Forensic Investigation
24 Parsing windows registry
25. examining metadata
26 Investigating Application Artifacts
27 Using sqlalchemy to work with sql database
28. Investigating Firefox profile Databases
29 Course review
30 Leverage Python as a hacker
Uploaded By :- @HackingShadowBot
_-_-_-_-_-_- ⚜JOIN NOW ⚜ -_-_-_-_-_-_
❍❍❍ ❖ @HackingShadow ❖ ❍❍❍
🔸️Black-Hat Python For Pentesters🔸️
🟠SOURCE :- CLICK HERE TO SEE
CLICK ON THE TOPICS TO WATCH VIDEOS
0. Course Overview
1. Penteration Testing Overview
2 Settings up Python
3 String formatting in Python
4 Python data structures
5 Python networking & file
6. Object oriented programming in Python
7. Port scanner principles
8. Making a port scanner
9 Banner Grabbing
10 importing and using nmap
10 importing and using nmap
11 Target Research and Reconnaissance
12 Web page scrapping
13 Phishing going from recon to creds
14 Password cracking concepts
15 Pre computed word list s
16 Brute force with threads
17 Rainbow 🌈 Tables
18 Cracking Linux Hashes
19 Cracking Zip Files
20 Python ctypes
21 Evading antivirus checking
22 Dropping the payload
23 Overview of Forensic Investigation
24 Parsing windows registry
25. examining metadata
26 Investigating Application Artifacts
27 Using sqlalchemy to work with sql database
28. Investigating Firefox profile Databases
29 Course review
30 Leverage Python as a hacker
Uploaded By :- @HackingShadowBot
_-_-_-_-_-_- ⚜JOIN NOW ⚜ -_-_-_-_-_-_
❍❍❍ ❖ @HackingShadow ❖ ❍❍❍