Module 1: Introduction
Module 2: Automating Information Gathering
Module 3: Writing a Keylogger in Python
Module 4: ZIP Password Bruteforcing in Python
Module 5: Going Forward
Have you ever wondered why some ethical hackers have an edge over other ethical hackers? One of the major reasons is that they can code their own tools and automate their security assessment processes. Most often than not they use scripting languages such as Python, which is relatively easy to understand and very powerful when you master it. Throughout this course you will learn how to combine multiple Python libraries that are related to cybersecurity so that you build an automated process of information gathering. You will also learn how to code a keylogger, as well as how to write a ZIP password bruteforcer in Python. Additional reading resources will be provided along the way.