Python 黑客 使用 Python 进行真正的道德黑客 PYCEH23 +
Python Hacking Real Ethical Hacking with Python PYCEH23 +
- 1. Introduction
- 1. Why Python is Best Programming Language for Ethical Hacking and Pentest
- 2. Introduction to Python
- 1. Defining and Printing Variables
- 2. Finding Error and Reading Traceback in Python
- 3. Strings in Python
- 1. Fully Understand Assignment Operator in 4 Minutes
- 2. Using Methods with Strings
- 3. Using F Strings and Methods
- 4. Playing With Newlines and Tabs
- 5. Manipulation with Strings
- 6. Single Quote and Double Quote
- 4. Numbers in Python
- 1. Python Mathematics and Floats
- 2. Comments and Underscores in Kotlin
- 5. Lists in Python
- 1. Indexes, Lists and Creating Lists in Python
- 2. Adding and Removing Items from List
- 3. Popping an Item from List
- 4. Removing an Item from List
- 5. Sorting List
- 6. Len, Indexing Errors and Final of This Section
- 6. Loops in Python
- 1. Looping with Lists
- 2. Playing with Loops
- 3. Possible Errors with Loops
- 4. Using Range and Loops Together
- 5. Slices in with Lists and Loops
- 6. Using Slices vs Vars for Copying List
- 7. Tuples vs Lists in Python
- 7. If, Else, Else If
- 1. Introduction to Conditions
- 2. If Else with Example
- 3. If Statement and Introduction to Expressions
- 8. Functions in Python
- 1. Defining simple Function in Python
- 2. Parameters with Functions in Python
- 3. Functions with Multi Parameters
- 4. Default Values in Python
- 5. Returning Variable from Function
- 9. OOP - Classes in Python
- 1. Creating Class with Functions and Understanding init method
- 2. Creating instances from Class
- 3. Creating more instances with classes
- 10. OOP - Inheritance in Python
- 1. Inheritance Application in 16 Minutes
- 11. Manipulating MAC Address
- 1. Manipulating MAC Address using Terminal
- 2. Developing Python MAC Changer Program
- 12. ARP Scanner
- 1. Understanding ARP and ARP Table
- 2. Creating Network Scanner from ZERO
- 13. Starting Practical with Nmap
- 1. Nmap's Network Scanning Capabilities
- 2. Beginning to Using NSE Scripts
- 3. Port scanning on Servers
- 4. Port scanning techniques and Interface Selection
- 5. Nmap Using Target List and Exclude List with CIDR
- 6. Nmap Operating System Detection
- 7. Random Port Scanning and Legal Issues
- 14. Developing MiTM Program with Python
- 1. How MiTM Attack works in Reality
- 2. Planning Our Program
- 3. Creating Fake ARP Request Sender
- 4. Spoofing Router and Target at the same Time and Fixing Problems
- 5. Intercepting Traffic and Hacking Login and Password from same network
- 15. Creating Pentest RAT Malware - Sending Data or Messages - Server Client Side
- 1. Understanding Sockets and its functions in Python
- 2. Remote Access T - Part 1
- 3. Remote Access T - Part 2
- 4. Explaining Server side Line by Line
- 5. Remote Access T - Coding Client Side
- 6. Executing Client and Server Application on windows and kali
- 16. Creating Pentest RAT Malware - Adding More Functionality
- 1. Developing Server Side
- 2. Developing Client Side and Executing it