• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

IT & Software Sektor7 - Malware Development Advanced - Vol.1 (1 Viewer)

Currently reading:
 IT & Software Sektor7 - Malware Development Advanced - Vol.1 (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

mehtty

Member
LV
1
Joined
Feb 13, 2025
Threads
2
Likes
4
Awards
3
Credits
1,190©
Cash
0$
Screenshot 21


Welcome to Malware Development Advanced (Vol.1) course!

ways to hide your payload inside NTFS and registry hive :
  • learning object enumeration alternatives in the system memory
  • manipulating Process Environment Blocks to hide your module and confuse the potential defender
  • finding .NET process with RWX memory ready to abuse
  • detecting new process creation (from userland)
  • setting up global hooks
  • learning few userland rootkit techniques to hide your files, registry keys and processes
  • abusing memory and hardware breakpoints for hooking
  • hiding payload with Gargoyle and similar techniques
  • creating custom "RPC" allowing to call any API function with any number of parameters in a remote process
  • learning COFF objects, how to build, parse, load and execute them in the memory
The course ends with a custom project, employing some of the discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.

COURSE IN A NUTSHELL

You Will Learn How To :
  • Hide payloads in the corners of NTFS and registry
  • Enumerate processes, modules and handles with alternatives
  • Find a perfect process for injection
  • Set up global hooks
  • Use few userland rootkit techniques
  • Abuse exception handlers
  • Hide a payload in a memory
  • Call any API (with any number of params) in a remote process
  • Build custom COFF objects
What Will You Get ?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements :
  • Recommended: taking Malware Development Intermediate course
  • Solid understanding of operating system architecture
  • Good experience with Windows OS
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 7.0+ installed
  • Strong will to learn and having fun
Target Audience :
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics

Download Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom