Currently Empty: £0.00
Welcome to the FIRST complete guide to Hacking Windows API With Python! A lot of other Python Hacking courses will just teach you how to hack or attack target systems. We teach how to actually build your own Custom Tools and start a Professional Portfolio that will boost your career!
This course not only teaching you how to use python to abuse windows but also how windows API calls actually work! This will help you in any language when looking at the windows API. While going through the course you will be exposed to how Windows really works under the hood! This will provide you much better insight on how Windows works as well as some more advanced topics.
Topics to expect:
-
Learning Windows APIs & How They Work
-
How to use Windows API Calls in Python
-
Windows Internal Complex Structures
-
Windows Access Tokens
-
Windows Handles
-
How Processes work and pass data
-
Crushing Processes via Token Smashing
-
Creating Custom Tools
-
Building a Professional Portfolio
-
Impersonating Other Users via Abused Processes
-
Compiling Python to Windows PE/exe
Students should have basic familiarity with Python.
These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course.
Don’t wait! Take your career to the next level with the Full Guide on Hacking The Windows API With Python.
Setting Up
Windows API Overview
The API Basics & Hooking Into A Windows Process
More Advanced Windows API Calls
-
6Hello World Windows API Style
We take our first look at issuing a Windows API Call in Python.
-
7Gaining a Handle to a Windows Process
We gain our first handle to another Windows Process and learn about Process Access.
-
8First Project - ProcKiller
We look at our first project! We take multiple Windows API calls and bring them together to kill a process.
-
9First Project - ProcKiller - Walkthrough
This is a full walkthrough of our first project ProcKiller. We will go over in depth how this works and how it was built.
Abusing Windows Tokens
-
10Windows Internal Structures
We quickly spoke about Windows Internal Structures before. We take this a step further and implement them into code.
-
11Spawning a Process
We take a look at how process creation works in the Windows world.
-
12Undocumented API Calls
Our first look at using a undocumented Windows API Call.
Compiling Python to PE/EXE
-
13What are Token Privileges
We take a deeper dive into Token Privileges, more specifically SeDebug.
-
14Opening a Processes Access Token
Now that we understand what a token is we can look at accessing it directly.
-
15Checking a Processes Token Privileges
Now that we understand the privileges of a token we will want to see how to check for them on a process.
-
16Modifying a Processes Token Privileges
Working with tokens privileges can destroy a process! This about how this can be abused!
-
17Second Project - Impersonation Tool
We now create our second tool that allows us to impersonate another user on the System! We can expand this even further with more features!
-
18Second Project - Impersonation Tool Walkthrough
This is a full walkthrough of our second project: Impersonation Tool. We will go over in depth how this works and how it was built.
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
Stars 5
87
Stars 4
46
Stars 3
9
Stars 2
3
Stars 1
1