EPISODE · Feb 25, 2026 · 21 MIN
Course 25 - API Python Hacking | Episode 4: Structures, Process Spawning, and Undocumented Calls
from CyberCode Academy · host CyberCode Academy
In this lesson, you’ll learn about:Defining Windows Internal Structures in PythonRepresenting structures like PROCESS_INFORMATION and STARTUPINFO using ctypes.StructureMapping Windows data types (HANDLE, DWORD, LPWSTR) with the _fields_ attributeInstantiating structures for API calls to configure or retrieve process informationSpawning System ProcessesUsing CreateProcessW from kernel32.dllSetting application paths (e.g., cmd.exe) and command-line argumentsManaging creation flags like CREATE_NEW_CONSOLE (0x10)Passing structures by reference with ctypes.byref to receive process and thread IDsAccessing Undocumented APIs and Memory CastingLeveraging DnsGetCacheDataTable from dnsapi.dll for reconnaissanceNavigating linked lists via pNext pointers in structures like DNS_CACHE_ENTRYUsing ctypes.cast to transform raw memory addresses into Python-readable structuresExtracting DNS cache information, such as record names and types, through loops and error handlingKey OutcomeAbility to build custom security tools that interact directly with Windows internalsMastery of low-level API calls, memory traversal, and structure manipulation for forensic or security applicationsYou can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy
NOW PLAYING
Course 25 - API Python Hacking | Episode 4: Structures, Process Spawning, and Undocumented Calls
No transcript for this episode yet
Similar Episodes
Apr 28, 2026 ·22m
Apr 19, 2026 ·43m
Apr 12, 2026 ·31m
Mar 22, 2026 ·33m
Mar 15, 2026 ·31m