Black Hat Python for
Pentesters and Hackers
Write and implement Python Scripts to
Pentest Linux and Windows Machines
Black Hat Python for Pentesters and Hackers
Need automated testing tools? This is the right time to switch to Python. Packed with many reverse engineering and exploitation libraries, Python is a great language to learn if you want a secure execution of all your information security tasks.

This Course Will Help You To
![]() |
Write python code to intercept and analyse network traffic. |
![]() |
Data-mine popular social media websites and evade modern anti-virus |
![]() |
Write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts |
Who is it for?
Pentesters, security enthusiasts and network administrators who want to automate tasks in Python. Basic knowledge of Python is assumed.
Approach
Each chapter of the course will start with an overview and some references which you can use to explore further on some subjects. It will then be followed by hands on demonstration which you can replicate within a lab environment which we will help you to build
About the Course
Black Hat Python for Penetration Testers and Hackers
Starting from scratch this course will enable you to all the latest tools and techniques available for Python penetration testing.
This course will teach you how to read and write new packets, sniff the network and will equip you with everything or anything you need to audit and attack web applications. Later you will dive deeper into writing code to address the specifics with attacking Windows systems.
By the end of the course you will successfully able to use to Python scripts for penetration testing on a variety of system.
Click on the link below to download the code files and get started
https://github.com/codered-by-ec-council/Black-Hat-Python-for-Pentesters
Watch Your First Video
Course Outline
SECTION ONE – Python Setup and Components (40 minutes)
- Overview of Python Penetration Testing
- Setting up Python environment: Installation and configuring virtual environments
- String formatting in Python 3
- Python Data Structures: Dictionaries, lists, tuples, and sets
- Python networking: File I/O handling and data serialization
- Object-Oriented Programming in Python
SECTION TWO – Working with Python Network Recon Framework (40 minutes)
- Port scanning principles
- Making a port scanner
- Banner grabbing
- Importing and using nmap
SECTION THREE – The Python Spy: Web Recon (40 minutes)
- Target research and reconnaissance
- Web page scraping
- Phishing: Going from Recon to creds
SECTION FOUR – The Password Cracker: Working with Brute-Force tools (40 minutes)
- Password Cracking Concepts
- Pre-computed wordlists
- Brute force with threads
- Rainbow tables
- Cracking Linux hashes
- Cracking ZIP files
SECTION FIVE – Evade Anti-virus with Python (40 minutes)
- Python Ctypes
- Evading anti-virus checking
- Dropping the payload
SECTION SIX – Python Forensics: Use Python Scripts for Network Investigation (40 minutes)
- Overview of Forensics Investigation
- Parsing Windows registry
- Examining metadata
- Investigating application artifacts
SECTION SEVEN – Databases and Wrapping Up (30 minutes)
- Using SQLAlchemy to work with SQL databases
- Investigating Firefox profile databases

Cody Jackson
Military Veteran
Offensive Python Expert
Know Your Author
Cody Jackson is a differently military veteran, the founder of Socius Consulting, an IT and business management consulting company in San Antonio, Texas.
He is a self-taught Python programmer and is the author of Learning to Program Using Python and Secret Recipes of the Python Ninja.
He holds an Associate in Science degree in electromechanical technology, a Bachelor of Science degree in computer engineering technology, and a Master of Science degree in IT management, as well as numerous IT certifications including CEH