CyberCode Academy Titelbild

CyberCode Academy

CyberCode Academy

Von: CyberCode Academy
Jetzt kostenlos hören, ohne Abo

Über diesen Titel

Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
Copyright CyberCode Academy
Bildung
  • Course 25 - API Python Hacking | Episode 4: Structures, Process Spawning, and Undocumented Calls
    Feb 25 2026
    In this lesson, you’ll learn about:
    • Defining Windows Internal Structures in Python
      • Representing structures like PROCESS_INFORMATION and STARTUPINFO using ctypes.Structure
      • Mapping Windows data types (HANDLE, DWORD, LPWSTR) with the _fields_ attribute
      • Instantiating structures for API calls to configure or retrieve process information
    • Spawning System Processes
      • Using CreateProcessW from kernel32.dll
      • Setting application paths (e.g., cmd.exe) and command-line arguments
      • Managing creation flags like CREATE_NEW_CONSOLE (0x10)
      • Passing structures by reference with ctypes.byref to receive process and thread IDs
    • Accessing Undocumented APIs and Memory Casting
      • Leveraging DnsGetCacheDataTable from dnsapi.dll for reconnaissance
      • Navigating linked lists via pNext pointers in structures like DNS_CACHE_ENTRY
      • Using ctypes.cast to transform raw memory addresses into Python-readable structures
      • Extracting DNS cache information, such as record names and types, through loops and error handling
    • Key Outcome
      • Ability to build custom security tools that interact directly with Windows internals
      • Mastery of low-level API calls, memory traversal, and structure manipulation for forensic or security applications


    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cybercode_academy
    Mehr anzeigen Weniger anzeigen
    22 Min.
  • Course 25 - API Python Hacking | Episode 3: From ctypes Basics to Building a Process Killer
    Feb 24 2026
    In this lesson, you’ll learn about:
    • Interfacing Python with Windows API using ctypes
      • Loading core DLLs: user32.dll and kernel32.dll
      • Executing basic functions like MessageBoxW
      • Mapping C-style data types (e.g., LPCWSTR, DWORD) to Python equivalents
    • Error Handling and Privileges
      • Using GetLastError to debug API failures
      • Common errors such as "Access Denied" (error code 5)
      • Understanding how token privileges and administrative rights affect process interactions
    • ProcKiller Project Workflow
      1. Find Window Handle: FindWindowA
      2. Retrieve Process ID: GetWindowThreadProcessId with ctypes.byref
      3. Open Process with Privileges: OpenProcess using PROCESS_ALL_ACCESS
      4. Terminate Process: TerminateProcess
    • Professional Practices
      • Documenting code thoroughly
      • Uploading projects to GitHub to build a professional portfolio
    • Key Outcome
      • Mastery of Python-to-Windows API integration, robust error handling, and creating scripts that can manipulate processes programmatically.


    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cybercode_academy
    Mehr anzeigen Weniger anzeigen
    20 Min.
  • Course 25 - API Python Hacking | Episode 2: Foundations of Windows Internals and API Mechanisms
    Feb 23 2026
    In this lesson, you’ll learn about:
    • Fundamentals of Windows Processes and Threads
      • A process is a running program with its own virtual memory space
      • Threads are units of execution inside processes, allocated CPU time to perform tasks
      • Access tokens manage privileges and access rights; privileges can be enabled, disabled, or removed but cannot be added to an existing token
    • Key System Programming Terminology
      • Handles: Objects that act as pointers to memory locations or system resources
      • Structures: Memory formats used to store and pass data during API calls
    • Windows API Mechanics
      • How applications interact with the OS via user space → kernel space transitions
      • Anatomy of an API call, including parameters and naming conventions:
        • "A" → Unicode version
        • "W" → ANSI version
        • "EX" → Extended or newer version
    • Core Dynamically Linked Libraries (DLLs)
      • kernel32.dll: Process and memory management
      • user32.dll: Graphical interface and user interaction
      • Researching functions using Windows documentation and tools like Dependency Walker to identify both documented and undocumented API calls
    • Key Outcome
      • Understanding of how Windows manages processes, threads, and privileges, along with the workflow for interacting with the operating system through APIs and DLLs.


    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cybercode_academy
    Mehr anzeigen Weniger anzeigen
    21 Min.
Noch keine Rezensionen vorhanden