riversongs Posted June 30 Report Share Posted June 30 Free Download Udemy - Malware Development For Ethical Hackers & PentestersPublished 5/2025MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 11.39 GB | Duration: 20h 45mMaster Ethical Malware Development: Learn Techniques to Create, Analyze and Test Malware Safely for Ethical HackingWhat you'll learnEthical Malware Development: Learn how to safely create malware for ethical hacking and penetration testing, focusing on real-world applications and techniques.Antivirus Evasion & Bypass Techniques: Master strategies to bypass antivirus (AV) and endpoint detection systems (EDR), enhancing your malware development skillMalware Analysis & Behavior: Gain hands-on experience in analyzing malware, studying its behavior, and understanding its impact on systems and networks.Privilege Escalation & Persistence: Discover methods to elevate malware privileges and ensure its persistence on compromised systems, even after rebootsAdvanced Cryptography & Obfuscation: Learn about cryptographic methods and simple ciphers used in malware for encryption and obfuscation, including algorithmsRequirementsBasic knowledge of programming in C/C++ ,Python and x86/x64 Assembly is recommended.Familiarity with Windows operating systems and their Sysinternals Suit.Understanding of basic cybersecurity concepts and ethical hacking principles.A system capable of running virtual machines (e.g., VMware, VirtualBox) to safely test and analyze malware.A willingness to learn, explore, and apply offensive programming techniques responsibly.Basic knowledge of Linux ( Kali Linux ) Operating system administration.DescriptionUnlock the world of ethical malware development with this in-depth course designed for ethical hackers and pentesters. This course teaches you how malware functions, how to create it safely, and how to bypass antivirus detection in controlled environments, all while enhancing your cybersecurity expertise.You'll explore key concepts in ethical hacking, including the creation and analysis of malware, and gain practical experience in evading antivirus systems. Learn techniques used by professionals to simulate real-world attacks and improve security defenses.The course covers:Ethical malware development practices.Malware behavior analysis in virtualized environments.Antivirus evasion strategies and bypass techniques.Techniques for testing and strengthening security measures.Whether you're an aspiring ethical hacker, a cybersecurity enthusiast, or an experienced pentester, this course will deepen your understanding of how malware operates and provide you with valuable tools for improving security.By the end of the course, you will be able to develop, analyze, and bypass antivirus defenses for testing purposes, giving you a competitive edge in the cybersecurity field.Enroll today to take your ethical hacking skills to the next level and start mastering malware development, antivirus evasion, and more!Keywords: ethical malware development, antivirus evasion, malware analysis, ethical hacking, pentesting, cybersecurity training, antivirus bypass techniques.OverviewSection 1: IntroductionLecture 1 IntroductionSection 2: Lab setupLecture 2 Lab setup 1Section 3: Building the foundationLecture 3 What is a malware and its typesLecture 4 Introduction to PE file structureLecture 5 Understanding MS-DOS Header in PE file of windowsLecture 6 Understanding DOS stub in PE file of windowsLecture 7 PE - Header section structure BasicsLecture 8 Understanding PE Headers subsections - Signature, File Header and OptionalHeaderLecture 9 Understanding PE Section HeadersLecture 10 Understanding PE sections in windowsLecture 11 Understanding token, handle and thread of a processLecture 12 Understanding token information in process hackerLecture 13 Understanding handle table informationLecture 14 Understanding threads in process hackerSection 4: Windows API programming basics - Handles in WindowsLecture 15 What is a Handle in windows ?Lecture 16 Windows Handle example: Finding out running program using windows handleLecture 17 Windows Handle example: Hiding , minimizing, maximizing running programSection 5: Windows API programming basics: Creating, Manipulating Processes in windowsLecture 18 Lab configuration in Malware development machine.Lecture 19 Deep diving into CreateProcess function and understanding its input parameters.Lecture 20 Creating a process using CreateProcess functionLecture 21 How can we hide a program using STARTUPINFO structure flagsLecture 22 Hiding program practical demonstrationLecture 23 Hiding program using CreateProcess function flags in windowsLecture 24 Hiding console programs in windowsLecture 25 Understanding inherit handles in CreateProcess function in windowsLecture 26 Practical demonstration of inherit handle in CreateProcess functionLecture 27 How to set custom environment variable for child process in windowsLecture 28 How to set custom working directory for child process in CreateProcess functionLecture 29 How to open a process using OpenProcess windows api functionSection 6: Thread basics in windows API programmingLecture 30 Understanding CreateThread function working in windowsLecture 31 Practical demonstration of thread creation with CreateThread windows functionLecture 32 How to execute a shellcode with CreateThread functionLecture 33 Practical demonstration of executing a shellcode with CreateThread functionLecture 34 Understanding ANSI and UNICODE in windows programmingSection 7: Malware injection attacks in windows operating systemLecture 35 Understanding how to inject code into other running processes in windowsLecture 36 Practical demonstration of malware code injection into other processes in windowLecture 37 Understanding DLL injection attack in windowsLecture 38 Practical demonstration of DLL injection attack in windowsLecture 39 Understanding DLL hijacking concept in windowsLecture 40 Practical demonstration of DLL hijacking in windowsLecture 41 Understanding APC code injection techniqueLecture 42 APC injection practical demonstration in windowsSection 8: Malware persistenceLecture 43 Malware persistence using registry entryLecture 44 Practical demonstration of Malware persistence using registry entryLecture 45 Malware persistence via WinlogonLecture 46 Practical demonstration of malware persistence via WinlogonLecture 47 Understanding malware persistence by creating Malicious Windows ServicesLecture 48 Practical demonstration of malware persistence via creating Windows ServiceSection 9: Privilege escalations - Token stealing in WindowsLecture 49 Understanding basic token theft conceptLecture 50 How to enable SeDebugPrivilege - understanding basic conceptLecture 51 Understanding the working of enable SeDebugPrivilege programLecture 52 Practical demonstration of enabling SeDebugPrivilege of a program tokenLecture 53 Understanding the basic steps of how to steal token of winlogon processLecture 54 Practical demonstration of stealing token of winlogon processSection 10: Privilege escalation - Password stealing from lsass process in windowsLecture 55 What is lsass process in windows ?Lecture 56 How do we steal the password from lsass process in windows ?Lecture 57 Understanding Windows API functions used in finding the target process idLecture 58 Understanding the program logic of process id ( lsass.exe ) finding programLecture 59 Practical demonstration of finding the process id of lsass in WindowsLecture 60 Understanding the program flow of password stealing program from lsass processLecture 61 Practical demonstration of dumping the memory of lsass process from our malwareLecture 62 Extracting the password hashes from the lsass dump fileEthical Hackers & Pentesters: Professionals looking to enhance their skills in malware development, analysis, and antivirus evasion for penetration testing.,Cybersecurity Enthusiasts: Individuals passionate about understanding malware mechanics and offensive programming techniques.,Aspiring Malware Analysts: Those interested in studying malware behavior, persistence, and obfuscation methods in controlled environments.,Red Team Operators: Security experts aiming to simulate real-world attacks to identify vulnerabilities and improve defenses.,Advanced Learners in Cybersecurity: Students or professionals seeking to deepen their knowledge of malware development, privilege escalation, and anti-debugging strategies.Homepagehttps://www.udemy.com/course/malware-development-for-ethical-hackers-pentesters/Rapidgator Links Downloadhttps://rg.to/file/65f7d8229b2dfd2a8d050512e44c36ff/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part01.rar.htmlhttps://rg.to/file/a608448acb5e341c691f005171492852/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part02.rar.htmlhttps://rg.to/file/ce61d9336d966f352628c998847a0dd3/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part03.rar.htmlhttps://rg.to/file/292b3b0c2d3c537bd69e5f81b36cb381/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part04.rar.htmlhttps://rg.to/file/5b574ecfbacbef0b14780b2f423ce0c0/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part05.rar.htmlhttps://rg.to/file/2caa665beca067ea29fd6dcbafde66b9/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part06.rar.htmlhttps://rg.to/file/e54d121a9b42f24019e8e36ab32cff32/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part07.rar.htmlhttps://rg.to/file/72e45887808e8dad7d7669136d5abdba/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part08.rar.htmlhttps://rg.to/file/1be08ee404ccec65a7dc9f7d13025490/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part09.rar.htmlhttps://rg.to/file/5226ca0ff06f701bdc35a3bc4d695b03/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part10.rar.htmlhttps://rg.to/file/4a4a273791a90f2456ff18039d8f9644/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part11.rar.htmlhttps://rg.to/file/6a15e34a2dd40713f77859a5a485da29/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part12.rar.htmlFikper Links Downloadhttps://fikper.com/Pt0XaGomlE/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part01.rar.htmlhttps://fikper.com/XEUev43yF6/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part02.rar.htmlhttps://fikper.com/JzmEz9icsD/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part03.rar.htmlhttps://fikper.com/heSrjOvSLR/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part04.rar.htmlhttps://fikper.com/Cpm83g2wnt/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part05.rar.htmlhttps://fikper.com/2q6IS77uhz/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part06.rar.htmlhttps://fikper.com/BQOrMJljLW/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part07.rar.htmlhttps://fikper.com/ACAyGru61M/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part08.rar.htmlhttps://fikper.com/79UKwEjXQV/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part09.rar.htmlhttps://fikper.com/6rxAhXyhzb/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part10.rar.htmlhttps://fikper.com/PXWwEweZss/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part11.rar.htmlhttps://fikper.com/8MXQVNRv1r/mtiou.Malware.Development.For.Ethical.Hackers..Pentesters.part12.rar.htmlNo Password - Links are Interchangeable Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now