1. Урок 1. 00:07:30
    Teaser
  2. Урок 2. 00:06:32
    Course Introduction
  3. Урок 3. 00:06:14
    Introduction to Python Programming & Ethical Hacking
  4. Урок 4. 00:07:49
    Lab Overview & Needed Software
  5. Урок 5. 00:11:14
    Installing Kali 2020 as a virtual Machine
  6. Урок 6. 00:05:11
    Basic Overview of Kali Linux
  7. Урок 7. 00:11:22
    The Terminal & Linux Commands
  8. Урок 8. 00:09:09
    Python 2 VS Python 3 & Writing Our First Program
  9. Урок 9. 00:09:33
    Installing & Using a Python IDE
  10. Урок 10. 00:07:42
    What is MAC Address & How To Change it
  11. Урок 11. 00:09:19
    Using Python Modules & Executing System Commands
  12. Урок 12. 00:05:18
    Implementing a Very Basic MAC Changer
  13. Урок 13. 00:10:14
    Variables & Strings
  14. Урок 14. 00:04:37
    Using Variables in MAC Changer
  15. Урок 15. 00:06:19
    Getting Input From The User
  16. Урок 16. 00:09:41
    Handling User Input
  17. Урок 17. 00:09:45
    Handling Command-line Arguments
  18. Урок 18. 00:07:52
    Initialising Variables Based on Command-line Arguments
  19. Урок 19. 00:09:41
    Python Functions
  20. Урок 20. 00:06:56
    Returning Values From Functions
  21. Урок 21. 00:06:55
    Decision Making in Python
  22. Урок 22. 00:09:06
    Using Conditional Statements in MAC Changer
  23. Урок 23. 00:03:16
    Introduction to Algorithms
  24. Урок 24. 00:06:25
    Reading Output Returned By System Commands
  25. Урок 25. 00:08:15
    Introduction to Regular Expressions (Regex)
  26. Урок 26. 00:06:41
    Extracting a Substring Using Regex
  27. Урок 27. 00:11:00
    Refactoring & Housekeeping
  28. Урок 28. 00:06:13
    Implementing The Validation Algorithm
  29. Урок 29. 00:06:23
    Python 3 Compatibility
  30. Урок 30. 00:10:12
    Introduction & Teaser
  31. Урок 31. 00:03:33
    Installing Windows as a Virtual Machine
  32. Урок 32. 00:09:44
    Introduction to ARP
  33. Урок 33. 00:04:01
    Designing an Algorithm To Discover Clients on The Same Network
  34. Урок 34. 00:06:49
    Using Scapy To Create an ARP Request
  35. Урок 35. 00:09:38
    Combining Frames To Broadcast Packets
  36. Урок 36. 00:06:58
    Sending & Receiving Packets
  37. Урок 37. 00:08:22
    Introduction Lists in Python
  38. Урок 38. 00:10:10
    Iterating Over Lists & Analysing Packet
  39. Урок 39. 00:06:30
    Using Escape Characters To Improve Program Output
  40. Урок 40. 00:09:38
    Introduction to Dictionaries in Python
  41. Урок 41. 00:08:56
    Improving the Program Using a List of Dictionaries
  42. Урок 42. 00:07:19
    Iterating Over Nested Data Structures
  43. Урок 43. 00:06:56
    Testing The Network Scanner With Python 3
  44. Урок 44. 00:06:21
    What is ARP Spoofing?
  45. Урок 45. 00:05:09
    Intercepting Data in a Network Using arpspoof
  46. Урок 46. 00:07:12
    Creating an ARP Response
  47. Урок 47. 00:05:35
    Sending ARP Responses
  48. Урок 48. 00:07:00
    Extracting MAC Address From Responses
  49. Урок 49. 00:08:54
    Introduction to Loops in Python
  50. Урок 50. 00:07:57
    More on Loops & Counters
  51. Урок 51. 00:06:55
    Dynamic Printing
  52. Урок 52. 00:05:17
    Exception Handling in Python
  53. Урок 53. 00:11:56
    Implementing a Restore Function
  54. Урок 54. 00:05:34
    Restoring ARP Tables on Exception
  55. Урок 55. 00:04:40
    Introduction & Teaser
  56. Урок 56. 00:07:21
    Sniffing Packets Using Scapy
  57. Урок 57. 00:06:51
    Extracting data From a Specific Layer
  58. Урок 58. 00:12:22
    Analysing Sniffed Packets & Extracting Fields From Layers
  59. Урок 59. 00:11:06
    Analysing Fields & Extracting Passwords
  60. Урок 60. 00:08:01
    Extracting URLs
  61. Урок 61. 00:08:04
    Capturing Passwords From Any Computer Connected to the Same Network
  62. Урок 62. 00:07:21
    Strings & Bytes in Python 3
  63. Урок 63. 00:13:01
    Intercepting Packets - Creating a Proxy
  64. Урок 64. 00:09:22
    Converting Packets to Scapy Packets
  65. Урок 65. 00:07:21
    Introduction to DNS Spoofing
  66. Урок 66. 00:06:27
    Filtering DNS Responses
  67. Урок 67. 00:07:57
    Analysing & Creating a Custom DNS Response
  68. Урок 68. 00:07:58
    Modifying Packets On The Fly
  69. Урок 69. 00:05:46
    Redirecting DNS Responses
  70. Урок 70. 00:04:28
    Introduction & Teaser
  71. Урок 71. 00:09:23
    Filtering Traffic Based on the Port Used
  72. Урок 72. 00:05:55
    Analysing HTTP Requests
  73. Урок 73. 00:10:20
    Intercepting HTTP Requests
  74. Урок 74. 00:10:48
    Modifying HTTP Responses on The Fly
  75. Урок 75. 00:09:25
    Intercepting & Replacing Downloads on The Network
  76. Урок 76. 00:01:21
    Introduction & Teaser
  77. Урок 77. 00:06:50
    Analysing HTTP Responses
  78. Урок 78. 00:07:16
    Replacing a Substring Using Regex
  79. Урок 79. 00:09:49
    Decoding HTTP Responses
  80. Урок 80. 00:08:51
    Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
  81. Урок 81. 00:08:30
    Refactoring & Housekeeping
  82. Урок 82. 00:06:02
    Debugging Issues in Python
  83. Урок 83. 00:08:58
    Using Groups & None-capturing Regex
  84. Урок 84. 00:11:39
    Recalculating Content Length
  85. Урок 85. 00:11:42
    BeEF Overview & Basic Hook Method
  86. Урок 86. 00:05:38
    Hooking Computers Using code_injector
  87. Урок 87. 00:04:25
    Basic BeEF Commands
  88. Урок 88. 00:05:42
    Delivering Malware Using BeEF
  89. Урок 89. 00:10:50
    How to Bypass HTTPS
  90. Урок 90. 00:08:05
    Bypassing HTTPS & Sniffing Login Credentials
  91. Урок 91. 00:10:57
    Replacing Downloads on HTTPS Pages
  92. Урок 92. 00:08:36
    Injecting Code in HTTPS Pages
  93. Урок 93. 00:09:46
    Running Python Programs on Windows
  94. Урок 94. 00:06:44
    Capturing & Analysing ARP Responses
  95. Урок 95. 00:07:51
    Detecting ARP Spoofing Attacks Using Python
  96. Урок 96. 00:01:58
    Introduction & Teaser
  97. Урок 97. 00:09:41
    Execute System Command Payload
  98. Урок 98. 00:11:26
    Sending Emails Using Python
  99. Урок 99. 00:10:08
    Filtering Command Output Using Regex
  100. Урок 100. 00:09:35
    Stealing WiFi Passwords Saved on a Computer
  101. Урок 101. 00:07:50
    Downloading Files Using Python
  102. Урок 102. 00:11:25
    Writing Files on Disk
  103. Урок 103. 00:08:20
    Password Recovery Basics
  104. Урок 104. 00:08:04
    Stealing Saved Passwords From Remote Computers
  105. Урок 105. 00:09:44
    Interacting With The File System Using Python
  106. Урок 106. 00:03:42
    Introduction & Teaser
  107. Урок 107. 00:10:01
    Writing a Basic Local Keylogger Using Python
  108. Урок 108. 00:08:08
    Introduction to Global Variables
  109. Урок 109. 00:06:59
    Logging Special Keys
  110. Урок 110. 00:11:00
    Introduction to Threading & Recursion in Python
  111. Урок 111. 00:15:08
    Introduction Object Oriented Programming
  112. Урок 112. 00:08:07
    Constructor Methods & Instance Variables
  113. Урок 113. 00:11:59
    Logging Key-strikes and Reporting Them By Email
  114. Урок 114. 00:05:47
    Introduction & Teaser
  115. Урок 115. 00:07:47
    Client - Server Communication & Connection Types
  116. Урок 116. 00:10:10
    Connecting Two Remote Computers Using Sockets
  117. Урок 117. 00:05:20
    Sending & Receiving Data Over TCP
  118. Урок 118. 00:10:07
    Executing System Commands Remotely
  119. Урок 119. 00:09:09
    Implementing a Server
  120. Урок 120. 00:06:59
    Implementing Skeleton For Server - Client Communication
  121. Урок 121. 00:08:14
    Refactoring - Creating a Listener Class
  122. Урок 122. 00:06:24
    Refactoring - Creating a Backdoor Class
  123. Урок 123. 00:11:15
    Serialisation - Theory
  124. Урок 124. 00:07:56
    Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP
  125. Урок 125. 00:06:21
    Serialisation - Reliably Sending & Receiving Data
  126. Урок 126. 00:08:17
    Sending Commands as List & Implementing Exit Command
  127. Урок 127. 00:09:25
    Interacting With the File System - Implementing "cd" Command
  128. Урок 128. 00:07:31
    Reading Files Using Python
  129. Урок 129. 00:06:53
    Writing Files Using Python
  130. Урок 130. 00:07:55
    Downloading Files From Hacked Computer
  131. Урок 131. 00:07:54
    Implementing Upload Functionality in Listener
  132. Урок 132. 00:06:13
    Implementing Upload Functionality in Backdoor
  133. Урок 133. 00:09:39
    Handling Unknown Exceptions
  134. Урок 134. 00:12:33
    Using the Backdoor to Hack Windows, Linux & OS X
  135. Урок 135. 00:14:52
    Testing The Backdoor With Python 3.
  136. Урок 136. 00:03:16
    Introduction & Teaser
  137. Урок 137. 00:07:13
    Converting Python Programs To Windows Binary Executables
  138. Урок 138. 00:07:23
    Running Executables Silentely
  139. Урок 139. 00:07:44
    Installing Windows Pyinstaller on Linux
  140. Урок 140. 00:08:35
    Packaging Programs For Windows From Linux
  141. Урок 141. 00:08:16
    Introduction to Persistence
  142. Урок 142. 00:14:44
    Running Programs on Startup
  143. Урок 143. 00:10:37
    Creating a Basic Trojan Using Download & Execute Payload
  144. Урок 144. 00:08:34
    Creating a Trojan By Embedding Files In Program Code
  145. Урок 145. 00:05:23
    Bypassing Anti-Virus Programs - Theory
  146. Урок 146. 00:09:05
    Bypassing Anti-Virus Programs - Practical
  147. Урок 147. 00:05:15
    Adding an Icon to Generated Executables
  148. Урок 148. 00:09:36
    Spoofing File Extension
  149. Урок 149. 00:08:42
    Converting Python Programs To OS X Executables
  150. Урок 150. 00:07:24
    Converting Python Programs to Linux Executables
  151. Урок 151. 00:06:43
    Introduction & Teaser
  152. Урок 152. 00:04:14
    What is a Website
  153. Урок 153. 00:05:32
    How to Hack a Website
  154. Урок 154. 00:10:01
    Sending GET Requests To Web Servers
  155. Урок 155. 00:11:45
    Discovering Website Subdomains Using Python
  156. Урок 156. 00:10:55
    Discovering Hidden Paths in Websites
  157. Урок 157. 00:06:27
    Reading Response Content
  158. Урок 158. 00:07:09
    Extracting Useful Data From Response
  159. Урок 159. 00:07:11
    Filtering Rsults
  160. Урок 160. 00:06:43
    Extracting Unique Links & Storing Them In a List
  161. Урок 161. 00:09:38
    Recursively Discovering All Paths On a Target Website
  162. Урок 162. 00:06:43
    Testing The Crawler With Python 3
  163. Урок 163. 00:12:00
    Sending Post Requests to Websites
  164. Урок 164. 00:09:06
    Guessing Login Information on Login Pages
  165. Урок 165. 00:02:36
    Introduction & Teaser
  166. Урок 166. 00:07:06
    HTTP Requests - POST VS GET
  167. Урок 167. 00:08:20
    Parsing HTML Code Using Python
  168. Урок 168. 00:10:31
    Extracting HTML Attributes
  169. Урок 169. 00:10:28
    Posting Forms
  170. Урок 170. 00:11:25
    Building Basic Structure For a Vulnerability Scanner
  171. Урок 171. 00:05:09
    Using Default Parameters
  172. Урок 172. 00:09:17
    Sending Requests in a Session
  173. Урок 173. 00:10:08
    Extracting & Submitting Forms Automatically
  174. Урок 174. 00:06:09
    Implementing a Method To Run The Scanner
  175. Урок 175. 00:09:08
    Discovering XSS Vulnerabilities
  176. Урок 176. 00:05:09
    Exploiting XSS Vulnerabilities
  177. Урок 177. 00:08:16
    Implementing Code To Discover XSS in Forms
  178. Урок 178. 00:07:44
    Implementing Code To Discover XSS in Parameters
  179. Урок 179. 00:08:47
    Automatically Discovering Vulnerabilities Using the Vulnerability Scanner