->

Ethical Hacking with Python Build 35+ hacking tools with Python programming

English | 31 August 2022 | ASIN: B0BTC8LT31 | 302 pages| Epub | 3 MB


 

Learn How To Build 37 Ethical Hacking Tools from Scratch using Python

From simple port scanners to advanced reverse shells, you'll be amazed how such tools can be made with Python!

Python is one of the best programming languages for building automation scripts, Infosec tools, and even malware!

This EBook is a practical hands-on for Python programmers that hope to expand their knowledge in Cyber security and Python by building their own tools for information gathering, penetration testing, digital forensic investigation, and more!

Here's what you'll get

- Tons of Programs to Build: Build 37 tools

- Working Code: You'll get access to a able link of 45 Python (.py) code files counting 4059 lines of code!

This EBook is for

- Python programmers who are interested in building tools in the cyber security field.

- Python bners who seek to expand their knowledge in Python and information security.

- Cyber security enthusiasts who want to utilize the tools built in the EBook and apply their skills.

Chapter 1: Information Gathering

1. Extracting Domain Name Information

2. Subdomain Enumeration Tool

3. Geolocating IP Addresses

4. Port Scanning

Chapter 2: Building Malware

1. Making a Ransomware

2. Making a Keylogger

3. Making a Reverse Shell

4. Making an Advanced Reverse Shell

Chapter 3: Building Password Crackers

1. Cracking ZIP Files

2. Cracking PDF documents

3. Brute-forcing SSH Servers

4. Brute-forcing FTP Servers

5. Password Generator

Chapter 4: Forensic Investigations

1. Extracting PDF Metadata

2. Extracting Image Metadata

3. Extracting Video Metadata

4. Extracting Passwords from Chrome

5. Extracting Cookies from Chrome

6. Hiding Data in Images

7. Chag your MAC address

8. Extracting Saved Wi-Fi Passwords

Chapter 5: Packet Manipulation with Scapy

1. DHCP Listener

2. Network Scanner

3. Wi-Fi Scanner

4. SYN Flooding Attack

5. Creating Fake Access Points

6. Forcing Devices to Disconnect

7. ARP Spoofing Attack

8. Detecting ARP Spoofing Attacks

9. DNS Spoofing

10. Sniffing HTTP Packets

11. Injecting Code into HTTP Packets

12. Advanced Network Scanner

Chapter 6: Extracting Email Addresses from the Web

1. Building a Simple Email Extractor

2. Building an Advanced Email Spider

 

Ethical Hacking with Python Build 35+ hacking tools with Python programming

 

 


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Themelli   |  

Information
Members of Guests cannot leave comments.




rss