Blackhat Python: The Social Engineering App
Ethical Hacking-Blackhat Python

Blackhat Python: The Social Engineering App

The Social Engineering App In this Blackhat Python guide I will be talking about "The Social Engineering App". It's a password list generator used for dictionary attacks. I will explain in brief about password lists and dictionary attacks, but you can read my in-depth guide on these subjects here: Dictionary Attacks.Passwords Lists A password list, often referred to as a "password dictionary" or simply a "dictionary," is a collection of words, phrases, or character combinations. Password lists are used for…

Continue ReadingBlackhat Python: The Social Engineering App
Blackhat Python: The IP Stalker
Ethical Hacking-Blackhat Python

Blackhat Python: The IP Stalker

Quickly see if Your Targets are Online with The IP Stalker In this Blackhat Python project I have utilized the power of the ping command to monitor and quickly check if certain target systems are online. I then used TKinter to give the script a nice-looking and interactive GUI. This is my second and final version of this project as I feel it doesn't need any more time spent on it, it does what it is supposed to and looks…

Continue ReadingBlackhat Python: The IP Stalker
Blackhat Python: How to Build a Port Scanner
Ethical Hacking-Blackhat Python

Blackhat Python: How to Build a Port Scanner

Building Your own Port Scanner with Python In this Blackhat Python guide we are going to learn about port scanners and how to build your own port scanner tool with Python. Scanning with a network mapper tool like Nmap is the best way to scan a system. This guide will help you better understand the basics of what network mappers are doing in the background.What are Port Scanners? Port scanners are cybersecurity tools or software applications designed to scan and…

Continue ReadingBlackhat Python: How to Build a Port Scanner
Blackhat Python: Creating Malware with Python
Ethical Hacking-Blackhat Python

Blackhat Python: Creating Malware with Python

How to Create Malware with Python In this Ethical Hacking Blackhat Python guide we are going to learn about malware. Then we will create some fake malware using Python.What is Malware? Malware is a broad term that refers to any software or code that is specifically designed to damage, disrupt, or gain unauthorized access to computer systems, networks, or devices. The term "malware" is a contraction of "malicious software," and it encompasses various types of harmful software programs created by…

Continue ReadingBlackhat Python: Creating Malware with Python
Blackhat Python: Creating a Keylogger with Python
Ethical Hacking-Blackhat Python

Blackhat Python: Creating a Keylogger with Python

How to create a Keylogger with Python In this Ethical hacking guide about Blackhat Python, we will learn about "Keyloggers". Then we will use Python to create our own "Keylogger" script.What is a Keylogger? A keylogger, short for "keystroke logger," is a type of software or hardware device designed to record and monitor the keystrokes made on a computer or mobile device's keyboard. The primary purpose of a keylogger is to capture the keys pressed by a user, including letters,…

Continue ReadingBlackhat Python: Creating a Keylogger with Python
Blackhat Python: How to do a Basic Ping
Ethical Hacking-Blackhat Python

Blackhat Python: How to do a Basic Ping

Using Python to Ping an IP Address In this Ethical Hacking guide about Blackhat Python, we are going to learn about the Ping command, what it is and what it does. Then we will cover how to send a simple Ping using Python.What is Ping? The ping command is a network utility available in most operating systems, including Windows, macOS, and various Linux distributions. It is used to test the reachability of a host (typically a computer or network device)…

Continue ReadingBlackhat Python: How to do a Basic Ping
Blackhat Python: The Ping of Death
Ethical Hacking-Blackhat Python

Blackhat Python: The Ping of Death

The Infamous Ping of Death In this Ethical hacking guide about Blackhat Python, we will learn about the "Ping of Death". Then we will discuss a little about the Scapy Python library. Finally, we will cover how to use Python to create a "Ping of Death" attack.What is the Ping of Death? The "Ping of Death" is a computer network attack or a software bug that can lead to a denial of service (DoS) or crash of a computer system.…

Continue ReadingBlackhat Python: The Ping of Death