This course teaches you all the way from fundamentals of C# to invoke WinAPI with C#. C# is Microsoft developed language which can be used for multiple purposes. C# gives almost all access to windows components including WinAPI via PInvoke. This course also teaches how to build your own C2 Server with Python Flask as backend and C2 agent. Features include Client connection manager, File explorer, Registry Explorer, etc. More features of C2 will be added from time to time. We will see how to code a traditional reverse shell with C2 which by default bypasses Constrained Language Mode. Next we will see some privilege escalation techniques. Next we will enumerate Active Directory with C# and build our own automation tools. We will write tools that automate Kerberoasting, DCSync capable users, Delegation Attacks and much more. We will write a simple loader that loads .NET executables in memory and executes them. Next we will see how to use WinAPI functions in C# and write tools for Shellcode Injection, DLL Injection, Debugging checks, Backdooring of PE Files and much more. We will also see the structure of PE File format.
No programming or Activedirectory experience required.
This course explains all the theory necessary to get started into building your own tools.
Who this course is for:
- Penetration Testers
- Red Teamers
- System Administrators
- Windows Enthusiasists
- Security Researchers
What you’ll learn
- Learn C# Basics
- Learn how to build tools with C#
- Learn how to enumerate Active Directory using C#
- Automate tasks using C#
- Learn some Powershell tools
- Learn WinAPI with C#
- Enumerate LSASS using WinAPI
- Learn PE File Format
Free Download Links-
- Contact us to buy the Google Drive download link of this course in $2.
Note: Comment below if you find the download links dead and comment with fake or temporary Email-id is going to be ignored.