Python For Offensive PenTest: A Complete Practical Course

698 Enrolled
6 Hours
You save 35% -

59 Lessons (6h)

  • Home Lab Setup
    Preparing Attacker Machine - Kali linux
    Preparing Target Machine - Windows 7
    Download Link
  • Warming up - Your First Anti-Virus Free Persistence Shell
    TCP Reverse Shell Outline
    Coding a TCP Reverse Shell
    Data Exfiltration
    Exporting To EXE
    HTTP Reverse Shell Outline
    Coding HTTP Reverse Shell In 5 Lines of Python!
    Data Exfiltration
    Exporting To EXE
    Persistence Outline
    Making Putty.exe Persistant
    Wrap up - Making a Persistant HTTP Reverse Shell
    Tuning the connection attempts
    Final Notes
    Download - Exercises + Scripts
  • Advanced Scriptable Shell
    Dynamic DNS (DDNS) Outline
    DDNS Aware Shell
    Interacting with Twitter
    Parsing Tweet in 3 Lines!
    Replicating Metasploit "Screen Capturing"
    Replicating Metasploit "Searching for Content"
    Target Directory Navigation
    Integrating Low Level Port Scanner
    Download - Exercises + Scripts
  • Passwords Hacking
    Anti-Virus Free Keylogger
    Hijacking KeePass Password Manager
    Man in the Browser Outline
    FireFox API Hooking with ImmunityDebugger
    Python in Firefox PoC
    Exercise: Python in Firefox EXE
    Bonus: Dumping Saved Passwords Out of Google Chrome
    Bonus: Exercise: Dumping Saved Passwords Out of Google Chrome
    Passwords Phishing - DNS Poisoning
    In Action: Facebook Password Phishing
    Don't Skip Me! - Countermeasures
    Download - Exercises + Scripts
  • Catch Me If You Can!
    Bypassing Host Based Firewall Outline
    Hijacking Internet Explorer - Shell Over Internet Explorer
    Bypassing Reputation Filtering in Next Generation Firewalls - Outline
    Interacting with Source Forge
    Interacting with Google Forms
    Exercise: Putting All Together - Bypassing Botnet Filtering
    Bypassing IPS with Hand-Made XOR Encryption
    Download - Exercises + Scripts
  • Miscellaneous Fun in Windows
    Privilege Escalation Part 1 - Weak Service File Permission Outline
    Privilege Escalation Part 2 - Preparing Vulnerable Software
    Privilege Escalation Part 3 - Backdoor-ing Legitmate Windows Service
    Privilege Escalation Part 4 - Create a New Admin account & Erasing Tracks
    Download - Exercises + Scripts
  • Bonus: How Malware Abuse Cryptography? Python Answers
    Quick Introudction To Encryption Algorithms
    Protecting Your Tunnel with AES
    Protecting Your Tunnel with RSA
    Developing One Time, Hybrid - Encryption Key Preview

Learn to Write Python Scripts to Build Your Own White Hat Hacking Tools!

Hussam Khrais


Hussam Khrais is a senior security engineer with over four years of experience in penetration testing, Python scripting, and network security. He spends countless hours forging custom hacking tools in Python. Hussam currently holds the following certificates in information security:
  • GIAC Penetration Testing - GPEN
  • Certified Ethical Hacker - CEH
  • Cisco Certified Network Professional - Security (CCNP Security)


This is not your average penetration testing course. While most courses introduce you to simple techniques based on unrealistic situations with completely unsecured systems, this course will teach you the real skills you need. The instructor strongly believes that ethical hackers shouldn't rely on other tools--they should be able to make their own.

  • Learn to use Python to create your own tools w/ 59 lectures & 6 hours of content
  • Understand why using Python is essential
  • Discover Python's cross platform functionalities
  • Learn how to get your job done w/ only a few lines of code
  • Set up your own virtual hacking workplace
  • Learn to counter most types of cyber attacks
  • Expand your expertise in cyber security


Important Details

  • Length of time users can access this course: lifetime
  • Access options: web streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate


  • Basic Python knowledge
  • Intermediate penetration & ethical hacking experience
  • Internet required


  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...