Navigation X

Bookmark Mirror Link https://leakforum.st (May 16) x

https://leakforum.io/images/care/like.gif https://leakforum.io/images/care/like.gif

UDEMY - Ethical Hacking Foundations Malware Development

posted by Sauron and Last Post: 2 months ago


UDEMY - Ethical Hacking Foundations Malware Development  728
Sauron Retired
3.013
Posts
2.938
Threads
Retired
#1
[Image: Screenshot-4.png]
 Requirements
  • Understanding of operating system architecture
  • Some experience with Windows OS
  • Basic knowledge about C and Intel assembly
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 6.0+ installed
  • Strong will to learn and having fun
DescriptionAre you a pen tester having some experience with Metasploit or Empire frameworks? Or maybe you take your first steps as an ethical hacker and you want to know more about how all these offensive tools work? Or you are a blue teamer or threat hunter who needs to better understand the internal workings of malware?
This course will provide you the answers you're looking for. It will teach you how to develop your own custom malware for latest Microsoft Windows 10. And by custom malware we mean building a dropper for any payload you want (Metasploit meterpreter, Empire or Cobalt Strike beacons, etc.), injecting your shellcodes into remote processes, creating trojan horses (backdooring existing software) and bypassing Windows Defender AV.
You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
Who this course is for:
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics
Hidden Content
You must register or login to view this content.

Yaya Until Further Notice I Am Retired Yaya
Reply
Fargelda Junior Member
8
Posts
0
Threads
Junior Member
#2
(5 months ago)Sauron Wrote:
[Image: Screenshot-4.png]
 Requirements
  • Understanding of operating system architecture
  • Some experience with Windows OS
  • Basic knowledge about C and Intel assembly
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 6.0+ installed
  • Strong will to learn and having fun
DescriptionAre you a pen tester having some experience with Metasploit or Empire frameworks? Or maybe you take your first steps as an ethical hacker and you want to know more about how all these offensive tools work? Or you are a blue teamer or threat hunter who needs to better understand the internal workings of malware?
This course will provide you the answers you're looking for. It will teach you how to develop your own custom malware for latest Microsoft Windows 10. And by custom malware we mean building a dropper for any payload you want (Metasploit meterpreter, Empire or Cobalt Strike beacons, etc.), injecting your shellcodes into remote processes, creating trojan horses (backdooring existing software) and bypassing Windows Defender AV.
You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
Who this course is for:
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics
Thx für this
Reply
Cr0cki0g0 Banned
114
Posts
0
Threads
Banned
#3
Development
Reply

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)