برمجة ادوات اختبار الاختراق باستخدام لغة البرمجة بايثون

تعلم كيفية صناعة ادوات الاختراق الخاصة بك خطوة بخطوة

Your Instructor


Mohamed Ali
Mohamed Ali

Network And System Administrator Expert

Founder Of Tech Geek YouTube Channel

Personal Interest :

i am interested in Network Analysis field

i am interested in information security field, especially Ethical hacking And Penetration Testing

i am interested how to write Hacking Tools

i am interested in cryptography

i like breaking the rules for penetration testing


Course Curriculum


  Section 1- Introduction
Available in days
days after you enroll
  Section 2: Lab Setup
Available in days
days after you enroll
  Section 3: Build System Command Project
Available in days
days after you enroll
  Section 4: Build ICMP Sender Project
Available in days
days after you enroll
  Section 5: Build Network Scanner Tool Project
Available in days
days after you enroll
  Section 6: Build MITM Attacks Project
Available in days
days after you enroll
  Section 8: Build Advanced Malware - Download Files From Target Project
Available in days
days after you enroll
  Section 9: Build Advanced Malware - Upload Files To Target Project
Available in days
days after you enroll
  Section 10: Take Screen Shot From Target Project
Available in days
days after you enroll
  Section 12: Build Final Advanced Malware Project
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!