Course Overview

This course equips you with the skills to use Python for real-world cybersecurity tasks. Starting from the basics, you’ll learn about variables, data types, loops, functions, and using packages — building a strong foundation to develop your own hacking tools. 

As you progress, you’ll create practical projects such as a MAC address changer, ARP spoofing tool, packet sniffer, keylogger, and backdoor. These hands-on exercises will help you understand network discovery, command execution, packet analysis, and data extraction techniques used by ethical hackers. In the final stages, you'll convert Python programs into executables, add persistence, and build an automated vulnerability scanner to detect XSS flaws in web applications.  

By the end of the course, you’ll be able to build powerful cybersecurity tools and understand how attackers think and operate. 

What You Will Learn

  • Using Python to automate penetration testing and hacking tasks.
  • Writing scripts for ARP spoofing, packet sniffing and malware development.
  • Developing a vulnerability scanner with Python.

Program Curriculum

  • First Program in Python
  • Python Variables
  • Data Types in Pytho
  • Casting in Python
  • Lists in Python
  • Tuples in Python
  • Sets in Python
  • Dictionaries in Python
  • If Condition in Python
  • While Loops in Python
  • For Loops in Python
  • Function in Python
  • Learning Builds in Function from ChatGPT in vscode
  • Installing Some Package and Use It
  • Chapter 1 Quiz

  • What is a MAC Address and How Can We Change It?
  • Running System Commands Using Subprocess Modules
  • Implementing a Very Basic MAC Changer
  • Implementing Variables in MAC Changer
  • Implementing the Input Function with MAC Changer
  • Handling Hijacking Problem
  • Handling Command-Line Arguments
  • Initializing Variables Based on Command-Line Arguments
  • Using Functions for MAC Changer
  • Decision-Making in MAC Changer
  • Chapter 2 Quiz

  • What is an Algorithm and How to Read the Output?
  • Introduction to Regular Expressions
  • Extracting Substrings Using Regex
  • Refactoring the Housekeeping
  • Implementing an Algorithm to Verify MAC Address Change
  • Chapter 3 Quiz

  • What is ARP and What Is It Used For?
  • Designing an Algorithm to Discover Clients on the Same Network
  • Using Scapy to Create an ARP Request
  • Combining Frames to Broadcast Packets
  • Sending and Receiving Packets
  • Iterating Over Lists and Analyzing Packets
  • Using Escape Characters to Enhance Program Output
  • Iterating Over Nested Data Structures
  • Chapter 4 Quiz

  • What is an ARP Spoofing Program and How Does It Work?
  • Using ARP-Spoof Program
  • Creating and Sending ARP Response
  • Extracting MAC Address from Response
  • Using Loops in ARP Spoofing
  • Improving the Program by Using Counters
  • Dynamic Printing
  • Handling Exceptions
  • Restoring ARP Table When an Exception Occurs
  • Chapter 5 Quiz

  • Sniffing Packets Using Scapy
  • Extracting Data from a Specific Layer
  • Analyzing Sniffed Packets – Extracting Fields from Layers
  • Analyzing Fields – Extracting Passwords
  • Extracting URLs
  • Extracting Data from Windows
  • Chapter 6 Quiz

  • Running Python Programs on Windows
  • Capturing and Analyzing ARP Responses
  • Detecting ARP Spoofing Attacks
  • Chapter 7 Quiz

  • Writing a Basic Keylogger
  • Global Variables in Keylogger
  • Logging Special Keys
  • Threading and Recursion
  • Object-Oriented Programming (OOP)
  • Constructor Methods and Instance Variables
  • Logging Keystrokes and Reporting via Emails
  • Chapter 8 Quiz

  • Client-Server Communication and Connection Types
  • Connecting Two Remote Computers Using Sockets
  • Sending and Receiving Data Over TCP
  • Executing System Commands Remotely
  • Implementing a Server
  • Implementing Skeleton for Server-Client Communication
  • Refactoring – Creating Listener Class
  • Refactoring – Creating Backdoor Class
  • Sending Commands as Lists and Implementing Exit Command
  • Changing Directories in File Systems
  • Downloading Files from Victim Computers
  • Downloading Any Kind of File from Hacked Computer
  • Chapter 9 Quiz

  • Converting Python Programs to Windows Binary Executables
  • Running Executables Silently
  • Persistency
  • Running Programs on Startup
  • Creating a Basic Trojan Using Download & Execute Payload
  • Creating a Trojan by Embedding Files in Program Code
  • Adding an Icon to Generated Executables
  • Chapter 10 Quiz

  • GET and POST Methods
  • Parsing HTML Code
  • Extracting HTML Attributes
  • Posting Forms
  • Building Basic Structure for a Vulnerability Scanner
  • Using Default Parameters
  • Sending Requests in a Session
  • Extracting and Submitting Forms Automatically
  • Implementing a Method to Run Scanner
  • Discovering XSS Vulnerabilities
  • Implementing Code to Discover XSS in Forms
  • Implementing Code to Discover XSS in Links
  • Automatically Discovering Vulnerabilities Using the Vulnerability Scanner
  • Chapter 11 Quiz
Load more modules

Instructor

Neamatullah Ekhteyari

Neamatullah Ekhteyari is an accomplished educator and software engineer known for his expertise in online instruction, software engineering, and penetration testing. With a passion for teaching and extensive knowledge in technology, Neamatullah aims to empower learners in the digital realm. He excels in various programming languages like Python, Java, and PHP, emphasizing best practices to develop efficient software solutions. As a skilled penetration tester, Neamatullah assists organizations in strengthening their cybersecurity defenses by identifying vulnerabilities and implementing effective safeguards. His dynamic teaching style, incorporating real-world examples and hands-on projects, ensures easy comprehension of complex concepts. Neamatullah's courses on Udemy cater to both beginners and experienced professionals, offering transformative learning experiences and a history of student success. Enroll in his courses today to unlock your potential and advance your career under his guidance.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering video-based learning with 840+ courses and diverse Learning Paths to enhance your skills.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 840+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro and

  • 1400+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month

Related Courses

1 of 50