Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Python 3 For Offensive PenTest: A Complete Practical Course
Quick Intro
Course Intro (1:55)
Python 3 / Windows 10 / Kali 2 : Gaining Access - Your First Persistence Shell
TCP Reverse Shell Outline (4:51)
Server Side - Coding a TCP Reverse Shell (7:46)
Client Side - Coding a TCP Reverse Shell (8:44)
Coding a Low Level Data Exfiltration (7:11)
Exporting To EXE (2:52)
HTTP Reverse Shell Outline (2:36)
Coding a HTTP Reverse Shell (11:06)
Data Exfiltration (7:54)
Persistence Outline (4:29)
Making our HTTP Reverse Shell Persistent (10:07)
Tuning the connection attempts (4:24)
Python 3 / Windows 10 / Kali 2 : Advanced Scriptable Shell
DDNS Aware Shell (5:28)
Interacting with Twitter (9:49)
Target Directory Navigation (6:45)
Replicating Metasploit "Screen Capturing" (4:54)
Replicating Metasploit "Searching for Content" (5:49)
Integrating Low Level Port Scanner (5:29)
Python 3 / Windows 10 / Kali 2 : Catch Me If You Can!
Bypassing Host Based Firewall Outline (3:24)
Hijacking Internet Explorer - Shell Over Internet Explorer (5:04)
Bypassing Reputation Filtering in Next Generation Firewalls - Outline (2:56)
Interacting with Source Forge (5:49)
Interacting with Google Forms (4:55)
Python 3: How Malware Abuse Cryptography? Python Answers
Bypassing IPS with Hand-Made XOR Encryption (7:27)
Quick Introduction To Encryption Algorithms (7:05)
Protecting Your Tunnel with AES (8:57)
Protecting Your Tunnel with RSA (12:41)
Developing One Time, Hybrid - Encryption Key (4:35)
Protecting Your Tunnel with RSA
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock