Python Programming for Hackers (Part 1) – Getting Started

December 30, 2015 | Views: 81253

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Hi and welcome to this new how to series of student tutorials. My name is Bijay, and I’ll be teaching you a complete series of Python Programming for Hackers. Part 1 is the introduction to the course outline and the set up process.


Well, first, why Python?

  • Python is my favorite programming language. Believe me, it’s cool.
  • With it’s decreased complexity, increased efficiency and limitless third-party libraries, Python provides an excellent development platform to build our own tools, or, in ethical hackers terms, it’s called offensive tools.
  • Python allows rapid development and testing – which are essential for ethical hackers, pentesters and security professionals.
  • Python is a Hackers’ Language (I read it in TJ O’ Connor’s book) and I believe that. Definitely, Python is a Hackers’ Language.


Who should read this training series?

  • Basically, I recommend this training series to beginners
  • Actually, this training series is for anyone who wants to learn Python and then aims to apply in the field of cybersecurity, pentesting or ethical hacking.


What will be covered in this training series?

  • Yes, we’ll start with ‘Hello World’. Then, we’ll see some basics of Python programming. Such as,
    • Variables and it’s types, Operators, Strings, Conditions and Loops.
    • Then we will go deeper and start playing with scripts of ethical hackers. Such as:
      • Penetration Testing with Python,
      • Web Analysis with Python,
      • Network Traffic Analysis with Python
      • Forensics Analysis
      • Wireless Vulnerabilities
      • Exploits

Along with the tutorial series, we’ll write some scripts and utilize many of the built-in scripts/modules for port scanning, vulnerability assessment, geo-locating of criminals with IP addresses, different types of exploits, investigating with forensics toolkit, detecting malicious toolkits, browsing anonomously with Python and a lot more.


What are the Python Programming Requirements?

  • IDE for Python. You can get it here:
  • We’ll be using it in Windows and Kali Linux
  • With Kali Linux, we can use Pycrust or we can go to terminal and type Python, then we can use it that way
  • Except these 2 OS, if you have any other OS, you may manage them on your own.
  • We need third-party library files and set up tools. I’ll not mention those tools now, because we’ll be seeing those later in this tutorial series and we’ll use them when we need them.


This is my own work 🙂


P.S. I used the Python logo in the custom thumbnail, which I downloaded from

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. where are the videos?

  2. im trying to look for the others part but i cant find… please help

  3. where is your video series?

Page 7 of 7« First...«34567
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?