Python for hackers

Mahmoud Elfawair
1 min readDec 21, 2023

--

Hello you

In this session within the GDSC, I’ll cover what we talked about. You can find all the resources mentioned during the session in this Google Drive: here

For those who missed the session, here’s a summary: I began by introducing Python and explaining its basics. Then, I explained essential web concepts such as status codes and HTTP request methods. We covered how to use the requests and syslibraries, setting the groundwork. Moving on, I presented some projects I’ve worked on.

We started with sherlock.pya tool to gather information about a user on various social media platforms like Reddit, Chess, and Medium. Next, I demonstrated how to create a custom wordlist using cewl.py. Then, we utilized this wordlist to attack a login page.

Additionally, I covered significant topics like the difference between false positives and false negatives. I emphasized the importance of learning by mimicking existing tools.

Thank you to everyone who attended the onsite session and those reading this article. I hope you gained some valuable insights. See you in the next sessions!

--

--

Mahmoud Elfawair
Mahmoud Elfawair

Written by Mahmoud Elfawair

reverse engineering and linux enthusiast

No responses yet