Hacking the Windows API with Python - Real Ethical Hacking
- Description
- Curriculum
- FAQ
- Reviews
Welcome to the FIRST complete guide to Hacking Windows API With Python! A lot of other Python Hacking courses will just teach you how to hack or attack target systems. We teach how to actually build your own Custom Tools and start a Professional Portfolio that will boost your career!
This course not only teaching you how to use python to abuse windows but also how windows API calls actually work! This will help you in any language when looking at the windows API. While going through the course you will be exposed to how Windows really works under the hood! This will provide you much better insight on how Windows works as well as some more advanced topics.
Topics to expect:
-
Learning Windows APIs & How They Work
-
How to use Windows API Calls in Python
-
Windows Internal Complex Structures
-
Windows Access Tokens
-
Windows Handles
-
How Processes work and pass data
-
Crushing Processes via Token Smashing
-
Creating Custom Tools
-
Building a Professional Portfolio
-
Impersonating Other Users via Abused Processes
-
Compiling Python to Windows PE/exe
Students should have basic familiarity with Python.
These are only SOME of the topics covered in this course. Of course you will receive 24 hour support via Q/A of the course.
Don’t wait! Take your career to the next level with the Full Guide on Hacking The Windows API With Python.
-
6Hello World Windows API StyleVideo lesson
We take our first look at issuing a Windows API Call in Python.
-
7Gaining a Handle to a Windows ProcessVideo lesson
We gain our first handle to another Windows Process and learn about Process Access.
-
8First Project - ProcKillerVideo lesson
We look at our first project! We take multiple Windows API calls and bring them together to kill a process.
-
9First Project - ProcKiller - WalkthroughVideo lesson
This is a full walkthrough of our first project ProcKiller. We will go over in depth how this works and how it was built.
-
10Windows Internal StructuresVideo lesson
We quickly spoke about Windows Internal Structures before. We take this a step further and implement them into code.
-
11Spawning a ProcessVideo lesson
We take a look at how process creation works in the Windows world.
-
12Undocumented API CallsVideo lesson
Our first look at using a undocumented Windows API Call.
-
13What are Token PrivilegesVideo lesson
We take a deeper dive into Token Privileges, more specifically SeDebug.
-
14Opening a Processes Access TokenVideo lesson
Now that we understand what a token is we can look at accessing it directly.
-
15Checking a Processes Token PrivilegesVideo lesson
Now that we understand the privileges of a token we will want to see how to check for them on a process.
-
16Modifying a Processes Token PrivilegesVideo lesson
Working with tokens privileges can destroy a process! This about how this can be abused!
-
17Second Project - Impersonation ToolVideo lesson
We now create our second tool that allows us to impersonate another user on the System! We can expand this even further with more features!
-
18Second Project - Impersonation Tool WalkthroughVideo lesson
This is a full walkthrough of our second project: Impersonation Tool. We will go over in depth how this works and how it was built.

External Links May Contain Affiliate Links read more