You Will Learn
What is malware development
What is PE file structure
Where to store your payload inside PE
How to encode and encrypt payloads
How and why obfuscate function calls
How to backdoor programs
How to inject your code into remote processes
What Will You Get?
Full-blown videos explaining all techniques in detail
Requirements
Understanding of operating system architecture
Some experience with Windows OS
Basic knowledge about C and Intel assembly
Computer with min. 4 GB of RAM + 30 GB of free disk space
VirtualBox 6.0+ installed
Strong will to learn and having fun
Target Audience
Ethical Hackers
Penetration Testers
Blue Teamers
Threat Hunters
Download:
What is malware development
What is PE file structure
Where to store your payload inside PE
How to encode and encrypt payloads
How and why obfuscate function calls
How to backdoor programs
How to inject your code into remote processes
What Will You Get?
Full-blown videos explaining all techniques in detail
Requirements
Understanding of operating system architecture
Some experience with Windows OS
Basic knowledge about C and Intel assembly
Computer with min. 4 GB of RAM + 30 GB of free disk space
VirtualBox 6.0+ installed
Strong will to learn and having fun
Target Audience
Ethical Hackers
Penetration Testers
Blue Teamers
Threat Hunters
Download: