BEGINING ETHICAL HACKING WITH PYTHON
Part I:
Ch 1: Legal Side of Hacking
Ch 2: Hacking Environment
Ch 3: Installing Virtual Box
Ch 4: Installing Kali Linux & Other Operating Systems on VB
Ch 5: Linux Terminal, Basic Commands
Part II:
Ch 06: Python 3 & Ethical Hacking
Ch 07: Python Environment
Ch 08: General Syntaxes
Ch 09: Variables, Objects & Values
Ch 10: Conditionals
Ch 11: Loops
Ch 12: Regular Expressions
Ch 13: Exceptions, Catching Errors
Ch 14: Functions
Ch 15: Classes
Ch 16: String Methods
Ch 17: File Input And Output
Ch 18: Containers
Ch 19: Database
Ch 20: Module
Ch 21: Debugging, Unittest Module
Ch 22: Socket and Networking
Ch 23: Importing Nmap Module
Ch 24: Building an Nmap Network Scanner
Part I:
Ch 1: Legal Side of Hacking
Ch 2: Hacking Environment
Ch 3: Installing Virtual Box
Ch 4: Installing Kali Linux & Other Operating Systems on VB
Ch 5: Linux Terminal, Basic Commands
Part II:
Ch 06: Python 3 & Ethical Hacking
Ch 07: Python Environment
Ch 08: General Syntaxes
Ch 09: Variables, Objects & Values
Ch 10: Conditionals
Ch 11: Loops
Ch 12: Regular Expressions
Ch 13: Exceptions, Catching Errors
Ch 14: Functions
Ch 15: Classes
Ch 16: String Methods
Ch 17: File Input And Output
Ch 18: Containers
Ch 19: Database
Ch 20: Module
Ch 21: Debugging, Unittest Module
Ch 22: Socket and Networking
Ch 23: Importing Nmap Module
Ch 24: Building an Nmap Network Scanner
You must reply before you can see the hidden data contained here.