17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FTUForum.com] [UDEMY] Python 3 For Offensive PenTest A Complete Practical Course [FTU]
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
2019 Updated Python 3 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testing
BESTSELLER
Created by : Hussam Khrais Last updated : 1/2019 Language : English Torrent Contains : 106 Files, 8 Folders Course Source : https://www.udemy.com/python-for-offensive-security-practical-course/
What you'll learn
• Learn how to code your own reverse shell [TCP+HTTP] • Learn how to exfiltrate data from your target • Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge] • Replicate Metasploit features and and make an advanced shell • Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking] • Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell • Privilege escalation on windows with practical example
Requirements
• Basic knowledge in Python or ANY other programming/scripting languages • Intermediate knowledge in penetration testing and ethical hacking
Description
When other's tools fail, writing your own makes you a true penetration tester!
Before You Enroll !
The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetration testing. Consider the consequences of your actions, be smart and don't go to jail.
There are quite a lot of people who call themselves hackers but in reality few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker!
FAQ
Why Python?
• Easy to learn • Cross platform • Unlimited third party libraries • Get your job done with few lines • Ranked as #1 for the most popular programming languages • Plenty of open source hacking tools are written in python which can be easily integrated within your script
How To Use This Course?
1. View the course in order, start from module 1 and move on. 2. Before you see the video, download the script, read the inline comments, run the script in your home lab, then finally see the explanatory video, if you still got any question, post it in Udemy forum. 3. Don't skip the exercises, Google is your best friend. 4. Fall in love with Python, go for extra mile and start writing your own weapons!
How to reach me?
• Udemy forums in case you have ANY question or technical problem. • LinkedIn if you have ANY questions prior taking the course, Ideas and collaboration are welcomed.
Who this course is for :
• Ethical hackers and penetration testers • Students preparing for OSCP, OSCE, GPEN, GXPN, CEH • Information security professionals and cyber security consultants • System and network security administrators • Programmers who want to get their hands dirty.
For More Udemy Free Courses >>> https://ftuforum.com/ For more Lynda and other Courses >>> https://www.freecoursesonline.me/ Our Forum for discussion >>> https://discuss.ftuforum.com/
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
0. Websites you may like/How you can help Team-FTU.txt
237 B
1. Quick Intro/1. Course Intro.mp4
16.2 MB
1. Quick Intro/1. Course Intro.vtt
2.3 KB
1. Quick Intro/2. Preparing Kali 2 linux & Windows 10.html
2.4 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/1. Download Scripts.html
208 B
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/10. Coding a HTTP Reverse Shell.mp4
113.2 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/10. Coding a HTTP Reverse Shell.vtt
10.1 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/11. Data Exfiltration.mp4
96.9 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/11. Data Exfiltration.vtt
6.9 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/12. Exercise Switching user-agent value.html
450 B
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/13. Persistence Outline.mp4
32.6 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/13. Persistence Outline.vtt
4.5 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/14. Making our HTTP Reverse Shell Persistent.mp4
122.9 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/14. Making our HTTP Reverse Shell Persistent.vtt
8.8 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/15. Tuning the connection attempts.mp4
56.6 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/15. Tuning the connection attempts.vtt
4 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/16. Final Notes & Countermeasures.html
2.7 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/2. TCP Reverse Shell Outline.mp4
36.3 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/2. TCP Reverse Shell Outline.vtt
4.8 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/3. Server Side - Coding a TCP Reverse Shell.mp4
91.9 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/3. Server Side - Coding a TCP Reverse Shell.vtt
7 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/4. Client Side - Coding a TCP Reverse Shell.mp4
78.1 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/4. Client Side - Coding a TCP Reverse Shell.vtt
7.1 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/5. Exercise Overcome Empty String.html
425 B
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/6. Coding a Low Level Data Exfiltration.mp4
86.5 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/6. Coding a Low Level Data Exfiltration.vtt
6.9 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/7. Exporting To EXE.mp4
36.8 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/7. Exporting To EXE.vtt
2.8 KB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/8. Exercise Downloading Tools From Hacker Machine.html
735 B
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/9. HTTP Reverse Shell Outline.mp4
18.9 MB
2. Python 3 Windows 10 Kali 2 Gaining Access - Your First Persistence Shell/9. HTTP Reverse Shell Outline.vtt
18.9 MB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/1. Download Scripts.html
201 B
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/2. DDNS Aware Shell.mp4
54.5 MB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/3. Interacting with Twitter.mp4
82 MB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/3. Interacting with Twitter.vtt
82 MB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/4. Exercise Twitter as DDNS Tweet your Kali IPport.html
638 B
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/5. Target Directory Navigation.mp4
77.6 MB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/5. Target Directory Navigation.vtt
6.4 KB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/6. Replicating Metasploit Screen Capturing.mp4
50.8 MB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/6. Replicating Metasploit Screen Capturing.vtt
4.9 KB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/7. Replicating Metasploit Searching for Content.mp4
68.2 MB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/7. Replicating Metasploit Searching for Content.vtt
5.7 KB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/8. Integrating Low Level Port Scanner.mp4
51.1 MB
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell/8. Integrating Low Level Port Scanner.vtt
5.4 KB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/1. Download Scripts.html
201 B
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/2. Bypassing Host Based Firewall Outline.mp4
21.6 MB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/2. Bypassing Host Based Firewall Outline.vtt
3.5 KB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/3. Hijacking Internet Explorer - Shell Over Internet Explorer.mp4
55.9 MB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/3. Hijacking Internet Explorer - Shell Over Internet Explorer.vtt
5 KB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/4. Bypassing Reputation Filtering in Next Generation Firewalls - Outline.mp4
20.3 MB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/4. Bypassing Reputation Filtering in Next Generation Firewalls - Outline.vtt
3.2 KB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/5. Interacting with Source Forge.mp4
72.5 MB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/5. Interacting with Source Forge.vtt
5.9 KB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/6. Interacting with Google Forms.mp4
48.6 MB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/6. Interacting with Google Forms.vtt
4.7 KB
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!/7. Exercise Putting All Together - Bypassing Botnet Filtering.html