Ethical Hacking: Hacking with Python

Ethical Hacking: Hacking with Python

Ethical Hacking: Hacking with Python

Learn how to use Python for Hacking

Language: english

Note: 3.8/5 (121 notes) 18,563 students

Instructor(s): Peter A

Last update: 2021-08-29

What you’ll learn

  • Python basics
  • How to investigate Attack Surface with Python
  • How to do SSH brute forcing
  • How to create a key logger



  • Python programming experience recommended, but not required



The title of this course is “Hacking with Python”, and it’s a course for everyone interested in hacking or Python. If you’re a hacker, you’re probably thinking “But it’s not! Python is for business applications and engineering. Not for me! I hack on the command-line.”

Ahem, I see what you did there: cute. But I have news for you: python is a great language to start learning now. Why? Because it’s becoming one of the most popular languages in the world, and there are thousands of libraries written in it for you to use. Plus, it’s easy to learn, powerful enough to handle complicated projects, runs everywhere, is one of the most popular languages today (literally!), and allows you to get things done quickly with great code that’s readable.

In this course you will build several Python programs that investigate the attack surface like a subdomain scanner, directory scanner, port scanner and others. You will also use Python scripts that do SSH brute forcing and keyloggers.

If you are a beginner and interested in Python or Hacking, this course is for you. You don’t need any prior knowledge to starting this course, not even of Python. It should be a lot of fun, so what are you waiting for?


Who this course is for

  • Python developers that want to learn more about hacking
  • Hackers that want to learn more about Python
  • People that want to learn Python and Hacking


Course content

  • Introduction
    • Intro
    • Introduction
  • Brief intro to Python
    • Before your start
    • Hello world
    • Variables
    • If statements
    • Loops
    • Imports
    • Files
    • What’s next?
  • Attack Surface
    • Introduction
    • Subdomain scanner
    • Directory scanner
    • Scan network
    • Port scanner
  • Hacking
    • Introduction
    • SSH brute force
    • More scripts
    • More brute force scripts
    • Download files
    • Keylogger


Ethical Hacking: Hacking with PythonEthical Hacking: Hacking with Python

Time remaining or 147 enrolls left


Don’t miss any coupons by joining our Telegram group 

Udemy Coupon Code 100% off | Udemy Free Course | Udemy offer | Course with certificate