17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Ethical Hacking - Learn The Art Of Hacking Using Python3
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Learn to hack windows OS using Backdoor and Ransomware created from scratch using Python. Completely for Beginners!
What you'll learn Learn to create payloads, malware Learn to hack windows OS creating Ransomware Learn about socket programming Learn about different modules of Python Learn about Cryptography-Encryption and Decryption Learn to write Object oriented programs to create malware Interact and use terminals/command prompt Create viruses that can bypass Antivirus Programs Spoof the extension of malware Learn about Social Engineering Attacks Learn how to create real world payloads and attack victim machine
Requirements Student must have basic understanding of Python Some topics of Python students must know are: Functions, Object Oriented Programming and Data structures (list, dictionary, tuple)
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
30.3 MB
~Get Your Files Here !/2. Introduction to the Backdoor/1. What is Backdoor.mp4
32.5 MB
~Get Your Files Here !/2. Introduction to the Backdoor/1. What is Backdoor.srt
5 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/1. Introduction to subprocess module.mp4
43.5 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/1. Introduction to subprocess module.srt
9 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/10. Change Directory using Backdoor.mp4
127.2 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/10. Change Directory using Backdoor.srt
24.7 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/11. Handle Change Directory (cd) exceptions.mp4
70.1 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/11. Handle Change Directory (cd) exceptions.srt
12.3 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/2. Saving result of command execution.mp4
41.6 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/2. Saving result of command execution.srt
7.6 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/3. Backdoor in Server-Client.mp4
12.4 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/3. Backdoor in Server-Client.srt
1.7 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/4. Server Side Programming.mp4
27 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/4. Server Side Programming.srt
6.1 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/5. Client Side Programming.mp4
48.5 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/5. Client Side Programming.srt
8.6 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/6. Send message from Server to Client.mp4
61.9 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/6. Send message from Server to Client.srt
8.9 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/7. Server-Client Communication.mp4
63.9 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/7. Server-Client Communication.srt
11 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/8. Executing shell commands through backdoor.mp4
86.8 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/8. Executing shell commands through backdoor.srt
16 KB
~Get Your Files Here !/3. Creating Backdoor from Scratch/9. Handle Exceptions.mp4
78 MB
~Get Your Files Here !/3. Creating Backdoor from Scratch/9. Handle Exceptions.srt
12.7 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/1. Download Functionality.mp4
124.7 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/1. Download Functionality.srt
21.9 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/10. Binding Payload with other files.mp4
146 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/10. Binding Payload with other files.srt
19.1 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/2. Handle Download Exceptions.mp4
52.1 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/2. Handle Download Exceptions.srt
8.6 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/3. Maintaining DRY principle at Client Side.mp4
62 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/3. Maintaining DRY principle at Client Side.srt
8.7 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/4. Maintaining DRY principle at Server Side.mp4
30.7 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/4. Maintaining DRY principle at Server Side.srt
4.7 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/5. Upload Functionality.mp4
73 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/5. Upload Functionality.srt
12.2 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/6. Debug and Test Upload Feature.mp4
104.8 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/6. Debug and Test Upload Feature.srt
16.5 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/7. Lock Windows Machine.mp4
72.4 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/7. Lock Windows Machine.srt
10.2 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/8. Making Payload Persistance.mp4
109.6 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/8. Making Payload Persistance.srt
17.4 KB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/9. Convert .py to .exe Making Executables.mp4
52 MB
~Get Your Files Here !/4. Adding Several Functionalities to Backdoor/9. Convert .py to .exe Making Executables.srt
7.2 KB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/1. Introduction to Security.mp4
30.2 MB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/1. Introduction to Security.srt
4 KB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/2. Security Goals.mp4
41.6 MB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/2. Security Goals.srt
4.8 KB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/3. What is Cryptography.mp4
52.6 MB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/3. What is Cryptography.srt
5.6 KB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/4. Categories of Cryptography.mp4
117.2 MB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/4. Categories of Cryptography.srt
13.2 KB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/5. Symmetric and Asymmetric Encryption.mp4
27.3 MB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/5. Symmetric and Asymmetric Encryption.srt
5.1 KB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/6. Asymmetric Cryptography - RSA algorithm.mp4
57.1 MB
~Get Your Files Here !/5. Theory on Cryptography Must watch before creating Ransomware/6. Asymmetric Cryptography - RSA algorithm.srt
12.1 KB
~Get Your Files Here !/6. Introduction to Ransomware/1. What is a Ransomware.mp4
25.3 MB
~Get Your Files Here !/6. Introduction to Ransomware/1. What is a Ransomware.srt
3.7 KB
~Get Your Files Here !/6. Introduction to Ransomware/2. How do Criminal install Ransomware.mp4
7.9 MB
~Get Your Files Here !/6. Introduction to Ransomware/2. How do Criminal install Ransomware.srt
1.3 KB
~Get Your Files Here !/6. Introduction to Ransomware/3. Types of Ransomware.mp4
79.8 MB
~Get Your Files Here !/6. Introduction to Ransomware/3. Types of Ransomware.srt
12.3 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/1. Generate Private and Public Keys on Kali Machine.mp4
33 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/1. Generate Private and Public Keys on Kali Machine.srt
7.6 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/10. Display Ransom Note on Victim's Computer.mp4
250.2 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/10. Display Ransom Note on Victim's Computer.srt
31.3 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/11. Decrypting Files on Victim Computer.mp4
92.4 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/11. Decrypting Files on Victim Computer.srt
17.6 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/12. Finally Testing our Ransomware.mp4
265.3 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/12. Finally Testing our Ransomware.srt
30.6 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/2. Create Fernet Key for Ransomware.mp4
81.7 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/2. Create Fernet Key for Ransomware.srt
19.4 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/3. Testing Ransomware to generate Fernet Key on Windows Machine.mp4
112.3 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/3. Testing Ransomware to generate Fernet Key on Windows Machine.srt
19.3 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/4. Encrypt Fernet Key.mp4
135.4 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/4. Encrypt Fernet Key.srt
23 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/5. Encrypt and Decrypt Files.mp4
43.7 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/5. Encrypt and Decrypt Files.srt
8.8 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/6. Crypt System by Traversing through Directories and Files.mp4
151.8 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/6. Crypt System by Traversing through Directories and Files.srt
20 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/7. Decrypt Fernet Key on Kali Linux.mp4
145.5 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/7. Decrypt Fernet Key on Kali Linux.srt
25 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/8. Change Victim's Desktop Background.mp4
141.8 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/8. Change Victim's Desktop Background.srt
17.7 KB
~Get Your Files Here !/7. Creating Ransomware From Scratch/9. Ransom Note.mp4
55.4 MB
~Get Your Files Here !/7. Creating Ransomware From Scratch/9. Ransom Note.srt