Python 3 For Offensive PenTest A Complete Practical Course

Python 3 For Offensive PenTest A Complete Practical  Course

Python 3 For Offensive PenTest: A Complete Practical Course
.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 4h 49m | 1.12 GB
Instructor: Hussam Khrais

Learn to use Python for ethical hacking and penetration testing.


Learn how to code your own reverse shell TCP+HTTP
Learn how to exfiltrate data from your target
Make anonymous shells by interacting with Twitter, Google Form, and Sourceforge
Replicate Metasploit features and make an advanced shell
Learn how to hack passwords using multiple techniques (Keyloggers and the Clipboard}
Learn how malware is abusing cryptography by adding encryption {AES, RSA, and XOR} to your shell
Master privilege escalation on Windows with practical examples


Assume your target is running unpatched Windows XP, Anti-Virus is disabled, the firewall is turned off, IPS is not in place then you may (or not) get into a system! Does that sound like a real-world penetration test for you?

If you have ever attended an ethical hacking course that teaches you how to use some tools and how to click on some buttons, then you probably already know that being an advanced hacker needs more knowledge than clicking a few buttons as most of these tools will fail in a real-world scenario.

Whether you get bored from theory and basic courses which repeat the same tools and techniques over and over again and fail to teach you how to hack into even insecure systems, or you want to push your skills from beginner to the next level, then you have come to the right place!

There are quite a lot of people who call themselves hackers but, few have the solid skills to fit the definition, when other's tools fail, writing your own makes you a true hacker.

All the code files are placed at


Highly technical, completely hands-on, straight to the point!
Set up your home virtual hacking lab
Updated for Python 3.7/Windows 10, and Kali 2

Download link:

Links are Interchangeable - No Password - Single Extraction
Users of Guests are not allowed to comment this publication.