Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Python For Android Hacking Crash Course: Trojan Perspective to your Wishlist.

Add to Wishlist

Python For Android Hacking Crash Course: Trojan Perspective

When other's tools fail, writing your own makes you a true penetration tester!
4.4 (112 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
954 students enrolled
Created by Hussam Khrais
Last updated 10/2016
$10 $50 80% off
4 days left at this price!
30-Day Money-Back Guarantee
  • 3.5 hours on-demand video
  • 4 Articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?

Python For Android Hacking! you maybe are wondering, am i reading the title correctly?Well, Yes you are! Welcome to the first online course that teaches Python For Android Hacking.

**To set the correct expectation, this is NOT an ordinary course to develop  a fancy Android Apps in Python. Instead, We'll use Python for coding android Trojan app for ethical hacking purposes.**

+Why not java?
Many penetration testers have a bit knowledge in Python due to its popularity in ethical hacking world, however when it came to Android, do they really need to turn from 
pentesters to Java developers? Well, the answer is NO, if your purpose was code a quick android app for social engineering attack, then this course is for you!

+Why should i buy this course?

  • To have answers to your questions 
  • To have support and help in making the code work at your end 
  • To receive any further updates on the course
Who is the target audience?
  • Ethical hackers and penetration testers
  • Information security professionals and cyber security consultants
  • Programmers who want to get their hands dirty
Students Who Viewed This Course Also Viewed
What Will I Learn?
Code a simple Android GUI interface purely in Python
Build a simple cross platform SSH botnet purely in Python
Code an SSH Android Trojan
Transfer / exfiltrate Data out of target device
Run Python SSH reverse shell on Windows, Linux, Android
Transfer and decode Decode Android calls, sms messages, Whatsapp chat Databases
View Curriculum
  • Basic knowledge in Python or ANY other programming/scripting languages
  • 4GB RAM PC With Kali Linux Vbox installed
  • Android Device [i'm using 4.2]
Curriculum For This Course
Expand All 28 Lectures Collapse All 28 Lectures 03:17:21
Start Here - Watch me first!
1 Lecture 03:18
Home Lab Setup
4 Lectures 29:25
Preparing Wifi Setup

Framework Outline

Running Python On Android

Preparing Buildozer VM + Installing Kivy
Boring But Necessasry! - Building a Simple GUI Interface
4 Lectures 48:53
Your First "Hello World" app + Exporting to APK

Building a Simple GUI - Part 1

Building a Simple GUI - Part 2

Building a Simple GUI - Part 3
Your First SSH Botnet - Get Your Hands Dirty!
12 Lectures 01:33:21
Module Outline

Build Our Reverse SSH Tunnel - Server Side - Kali

Build Our Reverse SSH Tunnel - Client Side - Kivy VM

Build Our Reverse SSH Tunnel - Client Side - Qpython

Build A Basic Semi Android Shell

Data Exfiltration over SFTP

Foiling Script-Kiddies with Facebook Hacking Trojan

Building A Simple Botnet - Upgrading Our SSH Server

Building A Simple Botnet - Exporting Script to Windows Standalone

Breaking Bad on Rooted Devices
7 Lectures 22:30
How to gain root priv in Qpython script

Decoding WhatsApp [Messages,Contacts,Calls] & [Phone Call logs+ SMS Messages]

Enforcing Root Priv & Automate Data Exfiltration To Our SFTP

Countermeasure - Protect Yourself

Scripts Download Link

Course Manual - Ref link

About the Instructor
4.4 Average rating
549 Reviews
4,775 Students
2 Courses
Senior Security Engineer, GPEN, CEH

Hussam Khrais is a senior security engineer with over 5 years in penetration testing, Python scripting and network security where he spends countless hours in forging custom hacking tools in Python.

Hussam currently holds the following certificates in information security:-

-GIAC Penetration Testing - GPEN

-Certified Ethical Hacker - CEH

-Cisco Certified Network Professional - Security (CCNP Security)

Favorite Quotes

"If you want peace, prepare for war"

"what one man can do, another can do"

"Keep your friends close, and your enemies closer."

"anything is possible, if you try hard enough"

“If I had eight hours to chop down a tree, I'd spend six hours sharpening my ax."

Report Abuse