Offensive Python Scripter

Learn to Create your own Hacking Tools

The world of information security consists of a multitude of complex issues and techniques on how to deal with the many environments that can be vulnerable to global cyber-attacks.

The groups that get stronger are not only the hackers who try to hurt you but also the defense groups in the organizations, the more known the attacks, the more definite their defense.

The course offers participants advanced levels of attack to evade the many defense mechanisms available in the market today with the help of independent tools and Python programming capabilities.

Why hackerSlash?

Regardless of what phase of life you are at, the outlook and approach learned here will help you later.
This tailored course will cover all the aspects of offensive python that makes you proficient. Every day there will be a new workshop to check the improvement of the candidates. On this basis, we improve the individual skills to master it in the area of infosec.



Module 1: Offensive Networking with Python

This module will teach the students how to use python programming language during any penetration testing or ethical hacking operation and how to use Python to automate your network analysis scripts on various information security fields.
Offensive Networking
o Raw Sockets Basics
o Socket Libraries and Functionality
o Programming Servers and Clients
o Writing Packet Sniffers
o PCAP File Parsing and Analysis
o Automating Network Attacks with Python
Utilizing Scapy
o Crafting packets with Scapy
o Routing using Scapy
o Creating Automation with Scapy
o Offensive Scapy Techniques
o DDoS Attack
o Port Scanning and Version Detection
o Automate the Process of PCAP Parsing
o Using Scapy to Create a Custom Wireless Data leakage tool

Module 2: Ethical Hacking with Python

This module will teach students to handle common and various ethical hacking techniques to write automation processes to that procedure.
Ethical Hacking
o Privesc Enumeration Scripts
o Python I/O Handling
Password Cracking
o Wordlist Generation Tool
o Building Password Guessing Tool
o Password Cracking with Python
o Automating Brute-force Attacks
o Automate Banner Grabbing
Advanced Scanning with Python
o Shodan CLI Integration
o Automated Nmap Script
o Advanced Shodan Search with Python
Web Application pen-testing automation process
o Fuzzing
o Requests and Response
o Examine Directories and Files
o Parsing HTML Files
o URL Fetching and Parsing
o Customizing SQL Injection Queries

Module 3: Replicate Metasploit features

Metasploit framework is written in Ruby and does not support scripts written in Python, so it requires some additional tuning to automate the actions of the attacker using Metasploit and Python together. In this module, students will learn how to automate Metasploit script using Python and other useful techniques for ethical hacking.
Creating Offensive Tool
o Interact Python with Metasploit
o Create Metasploit Scripts
o Build a Port Scanner
o Process Monitoring with Python
o Cracking Tools
o Reverse Shells
o Extracting Images from TCP Streams
Mimicking Metasploit Framework
o Auxiliary in Python
o Understanding Reverse and Bind Shells
o Working with Anonymity
o Enumerating Services
o Post Exploitation Procedures
o Introduction to Buffer Overflow attacks
o Pymetasploit3 – Metasploit Automation Library


  • CPU: 64-bit Intel i5/i7 with 4th generation + (2.0 GHz)

  • 8 GB of RAM or higher

  • 300 GB free space

  • Administrator Access

  • Wi-Fi 802.11 capability

  • Windows 10 Pro, Linux or macOS (Latest updated)

  • NOTE:
    All other software and configuration requirement will be provided and guided.


  • Ethical hackers and penetration testers

  • Students

  • Information security professionals and cybersecurity consultants

  • System and network security administrators

  • Programmers who want to get their hands dirty

  • Understanding the cyber threat landscapes

  • Acquiring knowledge and tools

  • Identifying attacks when accruing on the network

  • Testing networks and systems for vulnerabilities and create an attack mechanism

  • Reinforce Metasploit framework using Python

  • Becoming familiar with a variety of available tools for

  • performing security-related tasks

  • 40 Hours

    | Free For Selected Bangladeshi Students
    | $300 USD for International students