Black Hat Python for Pentesters and Hackers

Black Hat Python for
Pentesters and Hackers

Write and implement Python Scripts to
Pentest Linux and Windows Machines


Black Hat Python for Pentesters and Hackers

Need automated testing tools? This is the right time to switch to Python. Packed with many reverse engineering and exploitation libraries, Python is a great language to learn if you want a secure execution of all your information security tasks.

This Course Will Help You To

Write python code to intercept and analyse network traffic.
Data-mine popular social media websites and evade modern anti-virus
Write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts

Who is it for?

Pentesters, security enthusiasts and network administrators who want to automate tasks in Python. Basic knowledge of Python is assumed.


Each chapter of the course will start with an overview and some references which you can use to explore further on some subjects. It will then be followed by hands on demonstration which you can replicate within a lab environment which we will help you to build

About the Course

icon box image


4 hours

icon box image



icon box image



Black Hat Python for Penetration Testers and Hackers

Starting from scratch this course will enable you to all the latest tools and techniques available for Python penetration testing.

This course will teach you how to read and write new packets, sniff the network and will equip you with everything or anything you need to audit and attack web applications. Later you will dive deeper into writing code to address the specifics with attacking Windows systems.

By the end of the course you will successfully able to use to Python scripts for penetration testing on a variety of system.

Click on the link below to download the code files and get started

Watch Your First Video

Course Outline

SECTION ONE – Python Setup and Components (40 minutes)

  • Overview of Python Penetration Testing
  • Setting up Python environment: Installation and configuring virtual environments
  • String formatting in Python 3
  • Python Data Structures: Dictionaries, lists, tuples, and sets
  • Python networking: File I/O handling and data serialization
  • Object-Oriented Programming in Python

SECTION TWO – Working with Python Network Recon Framework (40 minutes)

  • Port scanning principles
  • Making a port scanner
  • Banner grabbing
  • Importing and using nmap

SECTION THREE – The Python Spy: Web Recon (40 minutes)

  • Target research and reconnaissance
  • Web page scraping
  • Phishing: Going from Recon to creds

SECTION FOUR – The Password Cracker: Working with Brute-Force tools (40 minutes)

  • Password Cracking Concepts
  • Pre-computed wordlists
  • Brute force with threads
  • Rainbow tables
  • Cracking Linux hashes
  • Cracking ZIP files

SECTION FIVE – Evade Anti-virus with Python (40 minutes)

  • Python Ctypes
  • Evading anti-virus checking
  • Dropping the payload

SECTION SIX – Python Forensics: Use Python Scripts for Network Investigation (40 minutes)

  • Overview of Forensics Investigation
  • Parsing Windows registry
  • Examining metadata
  • Investigating application artifacts

SECTION SEVEN – Databases and Wrapping Up (30 minutes)

  • Using SQLAlchemy to work with SQL databases
  • Investigating Firefox profile databases

Cody Jackson
Military Veteran
Offensive Python Expert

Know Your Author

Cody Jackson is a differently military veteran, the founder of Socius Consulting, an IT and business management consulting company in San Antonio, Texas.

He is a self-taught Python programmer and is the author of Learning to Program Using Python and Secret Recipes of the Python Ninja.

He holds an Associate in Science degree in electromechanical technology, a Bachelor of Science degree in computer engineering technology, and a Master of Science degree in IT management, as well as numerous IT certifications including CEH