Useful Links
Computer Science
Cybersecurity
Python for Ethical Hacking
1. Introduction to Python for Ethical Hacking
2. Setting Up the Development Environment
3. Python Programming Fundamentals
4. Core Networking with Python
5. Reconnaissance and Information Gathering
6. Network Traffic Analysis and Manipulation
7. Web Application Security Testing
8. Web Vulnerability Exploitation
9. System Exploitation and Post-Exploitation
10. Advanced Python Security Techniques
11. Tool Development and Automation
System Exploitation and Post-Exploitation
Shell Access and Management
Shell Spawning Techniques
subprocess Module Usage
Shell Command Execution
Interactive Shell Creation
Reverse Shell Implementation
TCP Reverse Shells
HTTP Reverse Shells
DNS Reverse Shells
Encrypted Reverse Shells
Bind Shell Implementation
TCP Bind Shells
Multi-Client Bind Shells
Authentication Mechanisms
System Interaction and Control
Operating System Interface
Windows System Interaction
Linux System Interaction
Cross-Platform Compatibility
File System Operations
Directory Navigation
File Manipulation
Permission Analysis
Hidden File Discovery
Process Management
Process Enumeration
Process Monitoring
Process Injection Techniques
Privilege Escalation Techniques
Local Privilege Escalation
Misconfiguration Exploitation
SUID/SGID Binary Abuse
Kernel Exploit Integration
Service Exploitation
Windows Privilege Escalation
Token Manipulation
Registry Analysis
Service Account Abuse
Linux Privilege Escalation
Sudo Misconfiguration
Cron Job Exploitation
Capability Abuse
Credential Harvesting and Cracking
Password Hash Extraction
Windows Hash Extraction
Linux Hash Extraction
Application Password Storage
Hash Cracking Implementation
Dictionary Attacks
Brute Force Attacks
Rainbow Table Usage
Hybrid Attacks
Credential Storage and Management
Secure Credential Storage
Credential Database Management
Password Policy Analysis
Persistence and Stealth
Persistence Mechanism Implementation
Registry Persistence
Scheduled Task Persistence
Service Installation
Startup Script Modification
Stealth Techniques
Process Hiding
File Hiding
Network Traffic Obfuscation
Log Evasion
Backdoor Implementation
Simple Backdoors
Encrypted Backdoors
Covert Channel Backdoors
Previous
8. Web Vulnerability Exploitation
Go to top
Next
10. Advanced Python Security Techniques