Section 1: Introduction to Python for ethical hacking!

Section 2: Port and vulnerability scanning

Section 3: SSH & FTP attacks

Section 4: Password cracking

Section 5: Sniffers, flooders, and spoofers

Section 6: Coding DNS spoofer

Section 7: Network analysis

Section 8: Multi functioning reverse shell

Section 9: Coding keylogger

Section 10: Command and control center

Section 11: Website penetration testing with Python

Lecture 1: Welcome to Python for ethical hacking!