RTO: Malware Development Essentials
Buy now
Learn more
Intro and Setup
Introduction
Development VM Setup
RTO-Win10.ova
RTO-maldev.zip
RTO-maldev-encrypted.zip
Shellcodes
Portable Executable
PE files - format and structure
PE Bear - looking inside
Generating EXE vs DLL
PE compilation
Droppers
Storing payloads in code section
Data section as a container
Payloads in resource section
Where to store payloads?
Obfuscation and Hiding
Payload encoding
Encrypting payloads - XOR
Encrypting payloads - AES
Antivirus vs call obfuscation
Implementing function call obfuscation
Encoding and Encryption
Backdoors and Trojans
Backdooring PE theory
Making Putty a trojan
Code Injection
Injecting code into remote process
Implementing code injection
Loading DLLs into remote process
DLL generator and injector
What is code injection?
Extras
Making program invisible
Combined Project
Dropper implementation
Bypassing Windows Defender
Assignment
Dropper overview
Summary
Your Feedback
Course closing information
Products
Course
RTO: Malware Development Essentials
RTO: Malware Development Essentials
RTO: Malware Development Essentials
Buy now
Learn more
Intro and Setup
Introduction
Development VM Setup
RTO-Win10.ova
RTO-maldev.zip
RTO-maldev-encrypted.zip
Shellcodes
Portable Executable
PE files - format and structure
PE Bear - looking inside
Generating EXE vs DLL
PE compilation
Droppers
Storing payloads in code section
Data section as a container
Payloads in resource section
Where to store payloads?
Obfuscation and Hiding
Payload encoding
Encrypting payloads - XOR
Encrypting payloads - AES
Antivirus vs call obfuscation
Implementing function call obfuscation
Encoding and Encryption
Backdoors and Trojans
Backdooring PE theory
Making Putty a trojan
Code Injection
Injecting code into remote process
Implementing code injection
Loading DLLs into remote process
DLL generator and injector
What is code injection?
Extras
Making program invisible
Combined Project
Dropper implementation
Bypassing Windows Defender
Assignment
Dropper overview
Summary
Your Feedback
Course closing information
Learn more
Buy now
A course on becoming a better ethical hacker, pentester and red teamer by learning offensive security tools development in Windows.
Intro and Setup
6 Lessons
Introduction
Development VM Setup
RTO-Win10.ova
RTO-maldev.zip
RTO-maldev-encrypted.zip
Shellcodes
Portable Executable
4 Lessons
PE files - format and structure
PE Bear - looking inside
Generating EXE vs DLL
PE compilation
Droppers
4 Lessons
Storing payloads in code section
Data section as a container
Payloads in resource section
Where to store payloads?
Obfuscation and Hiding
6 Lessons
Payload encoding
Encrypting payloads - XOR
Encrypting payloads - AES
Antivirus vs call obfuscation
Implementing function call obfuscation
Encoding and Encryption
Backdoors and Trojans
2 Lessons
Backdooring PE theory
Making Putty a trojan
Code Injection
5 Lessons
Injecting code into remote process
Implementing code injection
Loading DLLs into remote process
DLL generator and injector
What is code injection?
Extras
1 Lesson
Making program invisible
Combined Project
4 Lessons
Dropper implementation
Bypassing Windows Defender
Assignment
Dropper overview
Summary
2 Lessons
Your Feedback
Course closing information