1. Урок 1.00:07:30
    Teaser
  2. Урок 2.00:06:32
    Course Introduction
  3. Урок 3.00:06:14
    Introduction to Python Programming & Ethical Hacking
  4. Урок 4.00:07:49
    Lab Overview & Needed Software
  5. Урок 5.00:11:14
    Installing Kali 2020 as a virtual Machine
  6. Урок 6.00:05:11
    Basic Overview of Kali Linux
  7. Урок 7.00:11:22
    The Terminal & Linux Commands
  8. Урок 8.00:09:09
    Python 2 VS Python 3 & Writing Our First Program
  9. Урок 9.00:09:33
    Installing & Using a Python IDE
  10. Урок 10.00:07:42
    What is MAC Address & How To Change it
  11. Урок 11.00:09:19
    Using Python Modules & Executing System Commands
  12. Урок 12.00:05:18
    Implementing a Very Basic MAC Changer
  13. Урок 13.00:10:14
    Variables & Strings
  14. Урок 14.00:04:37
    Using Variables in MAC Changer
  15. Урок 15.00:06:19
    Getting Input From The User
  16. Урок 16.00:09:41
    Handling User Input
  17. Урок 17.00:09:45
    Handling Command-line Arguments
  18. Урок 18.00:07:52
    Initialising Variables Based on Command-line Arguments
  19. Урок 19.00:09:41
    Python Functions
  20. Урок 20.00:06:56
    Returning Values From Functions
  21. Урок 21.00:06:55
    Decision Making in Python
  22. Урок 22.00:09:06
    Using Conditional Statements in MAC Changer
  23. Урок 23.00:03:16
    Introduction to Algorithms
  24. Урок 24.00:06:25
    Reading Output Returned By System Commands
  25. Урок 25.00:08:15
    Introduction to Regular Expressions (Regex)
  26. Урок 26.00:06:41
    Extracting a Substring Using Regex
  27. Урок 27.00:11:00
    Refactoring & Housekeeping
  28. Урок 28.00:06:13
    Implementing The Validation Algorithm
  29. Урок 29.00:06:23
    Python 3 Compatibility
  30. Урок 30.00:10:12
    Introduction & Teaser
  31. Урок 31.00:03:33
    Installing Windows as a Virtual Machine
  32. Урок 32.00:09:44
    Introduction to ARP
  33. Урок 33.00:04:01
    Designing an Algorithm To Discover Clients on The Same Network
  34. Урок 34.00:06:49
    Using Scapy To Create an ARP Request
  35. Урок 35.00:09:38
    Combining Frames To Broadcast Packets
  36. Урок 36.00:06:58
    Sending & Receiving Packets
  37. Урок 37.00:08:22
    Introduction Lists in Python
  38. Урок 38.00:10:10
    Iterating Over Lists & Analysing Packet
  39. Урок 39.00:06:30
    Using Escape Characters To Improve Program Output
  40. Урок 40.00:09:38
    Introduction to Dictionaries in Python
  41. Урок 41.00:08:56
    Improving the Program Using a List of Dictionaries
  42. Урок 42.00:07:19
    Iterating Over Nested Data Structures
  43. Урок 43.00:06:56
    Testing The Network Scanner With Python 3
  44. Урок 44.00:06:21
    What is ARP Spoofing?
  45. Урок 45.00:05:09
    Intercepting Data in a Network Using arpspoof
  46. Урок 46.00:07:12
    Creating an ARP Response
  47. Урок 47.00:05:35
    Sending ARP Responses
  48. Урок 48.00:07:00
    Extracting MAC Address From Responses
  49. Урок 49.00:08:54
    Introduction to Loops in Python
  50. Урок 50.00:07:57
    More on Loops & Counters
  51. Урок 51.00:06:55
    Dynamic Printing
  52. Урок 52.00:05:17
    Exception Handling in Python
  53. Урок 53.00:11:56
    Implementing a Restore Function
  54. Урок 54.00:05:34
    Restoring ARP Tables on Exception
  55. Урок 55.00:04:40
    Introduction & Teaser
  56. Урок 56.00:07:21
    Sniffing Packets Using Scapy
  57. Урок 57.00:06:51
    Extracting data From a Specific Layer
  58. Урок 58.00:12:22
    Analysing Sniffed Packets & Extracting Fields From Layers
  59. Урок 59.00:11:06
    Analysing Fields & Extracting Passwords
  60. Урок 60.00:08:01
    Extracting URLs
  61. Урок 61.00:08:04
    Capturing Passwords From Any Computer Connected to the Same Network
  62. Урок 62.00:07:21
    Strings & Bytes in Python 3
  63. Урок 63.00:13:01
    Intercepting Packets - Creating a Proxy
  64. Урок 64.00:09:22
    Converting Packets to Scapy Packets
  65. Урок 65.00:07:21
    Introduction to DNS Spoofing
  66. Урок 66.00:06:27
    Filtering DNS Responses
  67. Урок 67.00:07:57
    Analysing & Creating a Custom DNS Response
  68. Урок 68.00:07:58
    Modifying Packets On The Fly
  69. Урок 69.00:05:46
    Redirecting DNS Responses
  70. Урок 70.00:04:28
    Introduction & Teaser
  71. Урок 71.00:09:23
    Filtering Traffic Based on the Port Used
  72. Урок 72.00:05:55
    Analysing HTTP Requests
  73. Урок 73.00:10:20
    Intercepting HTTP Requests
  74. Урок 74.00:10:48
    Modifying HTTP Responses on The Fly
  75. Урок 75.00:09:25
    Intercepting & Replacing Downloads on The Network
  76. Урок 76.00:01:21
    Introduction & Teaser
  77. Урок 77.00:06:50
    Analysing HTTP Responses
  78. Урок 78.00:07:16
    Replacing a Substring Using Regex
  79. Урок 79.00:09:49
    Decoding HTTP Responses
  80. Урок 80.00:08:51
    Modifying HTTP Responses & Injecting Javascript Code in HTML Pages
  81. Урок 81.00:08:30
    Refactoring & Housekeeping
  82. Урок 82.00:06:02
    Debugging Issues in Python
  83. Урок 83.00:08:58
    Using Groups & None-capturing Regex
  84. Урок 84.00:11:39
    Recalculating Content Length
  85. Урок 85.00:11:42
    BeEF Overview & Basic Hook Method
  86. Урок 86.00:05:38
    Hooking Computers Using code_injector
  87. Урок 87.00:04:25
    Basic BeEF Commands
  88. Урок 88.00:05:42
    Delivering Malware Using BeEF
  89. Урок 89.00:10:50
    How to Bypass HTTPS
  90. Урок 90.00:08:05
    Bypassing HTTPS & Sniffing Login Credentials
  91. Урок 91.00:10:57
    Replacing Downloads on HTTPS Pages
  92. Урок 92.00:08:36
    Injecting Code in HTTPS Pages
  93. Урок 93.00:09:46
    Running Python Programs on Windows
  94. Урок 94.00:06:44
    Capturing & Analysing ARP Responses
  95. Урок 95.00:07:51
    Detecting ARP Spoofing Attacks Using Python
  96. Урок 96.00:01:58
    Introduction & Teaser
  97. Урок 97.00:09:41
    Execute System Command Payload
  98. Урок 98.00:11:26
    Sending Emails Using Python
  99. Урок 99.00:10:08
    Filtering Command Output Using Regex
  100. Урок 100.00:09:35
    Stealing WiFi Passwords Saved on a Computer
  101. Урок 101.00:07:50
    Downloading Files Using Python
  102. Урок 102.00:11:25
    Writing Files on Disk
  103. Урок 103.00:08:20
    Password Recovery Basics
  104. Урок 104.00:08:04
    Stealing Saved Passwords From Remote Computers
  105. Урок 105.00:09:44
    Interacting With The File System Using Python
  106. Урок 106.00:03:42
    Introduction & Teaser
  107. Урок 107.00:10:01
    Writing a Basic Local Keylogger Using Python
  108. Урок 108.00:08:08
    Introduction to Global Variables
  109. Урок 109.00:06:59
    Logging Special Keys
  110. Урок 110.00:11:00
    Introduction to Threading & Recursion in Python
  111. Урок 111.00:15:08
    Introduction Object Oriented Programming
  112. Урок 112.00:08:07
    Constructor Methods & Instance Variables
  113. Урок 113.00:11:59
    Logging Key-strikes and Reporting Them By Email
  114. Урок 114.00:05:47
    Introduction & Teaser
  115. Урок 115.00:07:47
    Client - Server Communication & Connection Types
  116. Урок 116.00:10:10
    Connecting Two Remote Computers Using Sockets
  117. Урок 117.00:05:20
    Sending & Receiving Data Over TCP
  118. Урок 118.00:10:07
    Executing System Commands Remotely
  119. Урок 119.00:09:09
    Implementing a Server
  120. Урок 120.00:06:59
    Implementing Skeleton For Server - Client Communication
  121. Урок 121.00:08:14
    Refactoring - Creating a Listener Class
  122. Урок 122.00:06:24
    Refactoring - Creating a Backdoor Class
  123. Урок 123.00:11:15
    Serialisation - Theory
  124. Урок 124.00:07:56
    Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP
  125. Урок 125.00:06:21
    Serialisation - Reliably Sending & Receiving Data
  126. Урок 126.00:08:17
    Sending Commands as List & Implementing Exit Command
  127. Урок 127.00:09:25
    Interacting With the File System - Implementing "cd" Command
  128. Урок 128.00:07:31
    Reading Files Using Python
  129. Урок 129.00:06:53
    Writing Files Using Python
  130. Урок 130.00:07:55
    Downloading Files From Hacked Computer
  131. Урок 131.00:07:54
    Implementing Upload Functionality in Listener
  132. Урок 132.00:06:13
    Implementing Upload Functionality in Backdoor
  133. Урок 133.00:09:39
    Handling Unknown Exceptions
  134. Урок 134.00:12:33
    Using the Backdoor to Hack Windows, Linux & OS X
  135. Урок 135.00:14:52
    Testing The Backdoor With Python 3.
  136. Урок 136.00:03:16
    Introduction & Teaser
  137. Урок 137.00:07:13
    Converting Python Programs To Windows Binary Executables
  138. Урок 138.00:07:23
    Running Executables Silentely
  139. Урок 139.00:07:44
    Installing Windows Pyinstaller on Linux
  140. Урок 140.00:08:35
    Packaging Programs For Windows From Linux
  141. Урок 141.00:08:16
    Introduction to Persistence
  142. Урок 142.00:14:44
    Running Programs on Startup
  143. Урок 143.00:10:37
    Creating a Basic Trojan Using Download & Execute Payload
  144. Урок 144.00:08:34
    Creating a Trojan By Embedding Files In Program Code
  145. Урок 145.00:05:23
    Bypassing Anti-Virus Programs - Theory
  146. Урок 146.00:09:05
    Bypassing Anti-Virus Programs - Practical
  147. Урок 147.00:05:15
    Adding an Icon to Generated Executables
  148. Урок 148.00:09:36
    Spoofing File Extension
  149. Урок 149.00:08:42
    Converting Python Programs To OS X Executables
  150. Урок 150.00:07:24
    Converting Python Programs to Linux Executables
  151. Урок 151.00:06:43
    Introduction & Teaser
  152. Урок 152.00:04:14
    What is a Website
  153. Урок 153.00:05:32
    How to Hack a Website
  154. Урок 154.00:10:01
    Sending GET Requests To Web Servers
  155. Урок 155.00:11:45
    Discovering Website Subdomains Using Python
  156. Урок 156.00:10:55
    Discovering Hidden Paths in Websites
  157. Урок 157.00:06:27
    Reading Response Content
  158. Урок 158.00:07:09
    Extracting Useful Data From Response
  159. Урок 159.00:07:11
    Filtering Rsults
  160. Урок 160.00:06:43
    Extracting Unique Links & Storing Them In a List
  161. Урок 161.00:09:38
    Recursively Discovering All Paths On a Target Website
  162. Урок 162.00:06:43
    Testing The Crawler With Python 3
  163. Урок 163.00:12:00
    Sending Post Requests to Websites
  164. Урок 164.00:09:06
    Guessing Login Information on Login Pages
  165. Урок 165.00:02:36
    Introduction & Teaser
  166. Урок 166.00:07:06
    HTTP Requests - POST VS GET
  167. Урок 167.00:08:20
    Parsing HTML Code Using Python
  168. Урок 168.00:10:31
    Extracting HTML Attributes
  169. Урок 169.00:10:28
    Posting Forms
  170. Урок 170.00:11:25
    Building Basic Structure For a Vulnerability Scanner
  171. Урок 171.00:05:09
    Using Default Parameters
  172. Урок 172.00:09:17
    Sending Requests in a Session
  173. Урок 173.00:10:08
    Extracting & Submitting Forms Automatically
  174. Урок 174.00:06:09
    Implementing a Method To Run The Scanner
  175. Урок 175.00:09:08
    Discovering XSS Vulnerabilities
  176. Урок 176.00:05:09
    Exploiting XSS Vulnerabilities
  177. Урок 177.00:08:16
    Implementing Code To Discover XSS in Forms
  178. Урок 178.00:07:44
    Implementing Code To Discover XSS in Parameters
  179. Урок 179.00:08:47
    Automatically Discovering Vulnerabilities Using the Vulnerability Scanner