Python For Android Hacking Crash Course: Trojan Perspective

When other's tools fail, writing your own makes you a true penetration tester!
4.4 (110 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
917 students enrolled
70% off
Take This Course
  • Lectures 28
  • Length 3.5 hours
  • Skill Level Intermediate Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 6/2016 English

Course Description

Python For Android Hacking! you maybe are wondering, am i reading the title correctly?Well, Yes you are! Welcome to the first online course that teaches Python For Android Hacking.

**To set the correct expectation, this is NOT an ordinary course to develop  a fancy Android Apps in Python. Instead, We'll use Python for coding android Trojan app for ethical hacking purposes.**

+Why not java?
Many penetration testers have a bit knowledge in Python due to its popularity in ethical hacking world, however when it came to Android, do they really need to turn from 
pentesters to Java developers? Well, the answer is NO, if your purpose was code a quick android app for social engineering attack, then this course is for you!

+Why should i buy this course?

  • To have answers to your questions 
  • To have support and help in making the code work at your end 
  • To receive any further updates on the course

What are the requirements?

  • Basic knowledge in Python or ANY other programming/scripting languages
  • 4GB RAM PC With Kali Linux Vbox installed
  • Android Device [i'm using 4.2]

What am I going to get from this course?

  • Code a simple Android GUI interface purely in Python
  • Build a simple cross platform SSH botnet purely in Python
  • Code an SSH Android Trojan
  • Transfer / exfiltrate Data out of target device
  • Run Python SSH reverse shell on Windows, Linux, Android
  • Transfer and decode Decode Android calls, sms messages, Whatsapp chat Databases

Who is the target audience?

  • Ethical hackers and penetration testers
  • Information security professionals and cyber security consultants
  • Programmers who want to get their hands dirty

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Start Here - Watch me first!
Section 2: Home Lab Setup
Preparing Wifi Setup
Framework Outline
Running Python On Android
Preparing Buildozer VM + Installing Kivy
Section 3: Boring But Necessasry! - Building a Simple GUI Interface
Your First "Hello World" app + Exporting to APK
Building a Simple GUI - Part 1
Building a Simple GUI - Part 2
Building a Simple GUI - Part 3
Section 4: Your First SSH Botnet - Get Your Hands Dirty!
Module Outline
Build Our Reverse SSH Tunnel - Server Side - Kali
Build Our Reverse SSH Tunnel - Client Side - Kivy VM
Build Our Reverse SSH Tunnel - Client Side - Qpython
Build A Basic Semi Android Shell
Data Exfiltration over SFTP
Foiling Script-Kiddies with Facebook Hacking Trojan
Integrating SSH reverse Shell Into Facebook Hacking Trojan
Exporting to Android Standalone APK
Building A Simple Botnet - Upgrading Our SSH Server
Building A Simple Botnet - Exporting Script to Windows Standalone
Building A Simple Botnet - Infecting Windows With Android
Section 5: Breaking Bad on Rooted Devices
How to gain root priv in Qpython script
Decoding WhatsApp [Messages,Contacts,Calls] & [Phone Call logs+ SMS Messages]
Enforcing Root Priv & Automate Data Exfiltration To Our SFTP
Countermeasure - Protect Yourself
Scripts Download Link
Course Manual - Ref link

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Hussam Khrais, Senior Security Engineer, GPEN, CEH

Hussam Khrais is a senior security engineer with over 5 years in penetration testing, Python scripting and network security where he spends countless hours in forging custom hacking tools in Python.

Hussam currently holds the following certificates in information security:-

-GIAC Penetration Testing - GPEN

-Certified Ethical Hacker - CEH

-Cisco Certified Network Professional - Security (CCNP Security)

Favorite Quotes

"If you want peace, prepare for war"

"what one man can do, another can do"

"Keep your friends close, and your enemies closer."

"anything is possible, if you try hard enough"

“If I had eight hours to chop down a tree, I'd spend six hours sharpening my ax."

Ready to start learning?
Take This Course