Home
About Us
All Courses
Blog
Contact Us
FAQs
Home
All Courses
Development
Python for Hackers
Python for Hackers
Curriculum
6 Sections
38 Lessons
Lifetime
Expand all sections
Collapse all sections
Introduction
4
1.0
Welcome and course introduction
1.1
What is Python?
1.2
Why learn Python as a hacker?
1.3
Python2 vs Python3
Setup
6
2.0
How to install VirtualBox
2.1
How to install Kali Linux
2.2
The Python interpreter
2.3
How to run a Python script
2.4
How to install Sublime
2.5
Python syntax
Python 101
16
3.0
Variables & data types
3.1
Numbers
3.2
String formatting
3.3
Booleans & operators
3.4
Tuples
3.5
Lists
3.6
Dictionaries
3.7
Sets
3.8
Conditionals
3.9
Loops
3.10
Reading and writing files
3.11
User input
3.12
Exceptions and error handling
3.13
Comprehensions
3.14
Functions and code reuse
3.15
Lambdas
Extending Python
5
4.0
The Python package manager
4.1
Python virtual environments
4.2
Introduction to sys
4.3
Introduction to requests
4.4
Introduction to pwntools
Automating with Python
5
5.0
Project 1 – SSH login brute forcing
5.1
Project 2 – SHA256 password cracking
5.2
Project 3 – Web login form brute forcing
5.3
Project 4 – Exploiting a SQL injection
5.4
Project 5 – Exploiting a restricted SQL injection
Closing
2
6.0
The importance of comments
6.1
Wrap up and next steps
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content