This site uses cookies! Learn More

This site uses cookies!

For providing our services, we do use cookies.
But get used, this is what most of modern web do!
However we have to warn you since we are obligated to so due to EU laws.

By continuing to use this site, you agree to allow us to store cookies on your computer. :)
And no, we will not eat your computer nor you will be able to eat those cookies :P

Sign in to follow this  
Followers 0
Rahuls99

Penetration Testing Automation Using Python and Kali Linux

1 post in this topic


170f8438ef408bc5a9a6d442aec66cff.jpg
Penetration Testing Automation Using Python and Kali Linux
PEG-4 | English | 1280 x 720 | 1 050 kb/s | 30.000 fps | AAC 96.0 kb/s | 389.61 MB
Genre: Training

Learn how to build your own automated penetration testing application using Python and Kali Linux. Also, learn how to understand software tools and how they work.

Get a good understanding on how to use Python to automate your web penetration testing scenarios. In this course, Penetration Testing Automation Using Python and Kali Linux, you'll learn how to start automating your penetration testing tasks using Python and Kali Linux. First, you'll learn about information gathering automation. Next, you'll learn about network scanning automation. Finally, you'll learn about vulnerabilities assessment automation. By the end of this course, you'll be able to develop your own automated scanner for gathering information, scanning the network, and conducting an automated vulnerability assessment.

Course Overview
Course Overview 1m 48s

Welcome
Welcome 0m 43s
Prerequisites 1m 53s
Course Overview 1m 54s
Setting up the Environment 2m 42s
Summary 1m 31s

Building the Automation Sandbox
Introduction 0m 35s
The Automation Application Overview 2m 37s
Executing Commands from the Terminal 2m 48s
Opening the Browser 2m 5s
Saving the Results 3m 28s
Putting It All Together 8m 50s
Summary 0m 51s

Reconnaissance Automation
Introduction 0m 54s
Module Overview 1m 32s
DNS 8m 3s
Email Extraction 3m 13s
Whois 2m 32s
Files, Social Media, and Web Search 4m 9s
Google Dorks Extraction 11m 50s
Summary 0m 47s

Internal Scanning Automation
Introduction 0m 35s
Module Overview 1m 15s
IP Integration 9m 17s
Identifying Live Hosts 3m 41s
Port Scanning 5m 0s
Summary 0m 45s

Attack Automation
Introduction 0m 39s
Module Overview 1m 1s
Ports Extraction 2m 58s
Vulnerabilities Scan 6m 31s
Brute-force Attack 6m 15s
Summary 0m 43s

Web Application Security Automation
Introduction 2m 50s
Github Project 1m 58s
Web Application Security Scanner 4m 14s
Demo 3m 4s
Course Summary 0m 56s

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
Download ( NitroFlare )
http://nitroflare.com/view/2D4ECB4D8223F43/tk7f8.P.T.A.U.P.a.K.L.rar

Download ( Uploaded
http://uploaded.net/file/o3zpmi2k/tk7f8.P.T.A.U.P.a.K.L.rar

Download ( Rapidgator )
http://rapidgator.net/file/7325396904412adb1628b52c97c65180/tk7f8.P.T.A.U.P.a.K.L.rar.html

[b]Download (BigFile)[/b]
https://www.bigfile.to/file/d7MFGBX59zVz/tk7f8.P.T.A.U.P.a.K.L.rar

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0