Companies Home Search Profile

Malware Development Course 2022: From Zero to Hero

Focused View

Engin Demirbilek

3:22:26

255 View
  • 001 Introduction.mp4
    00:27
  • 002 Course Syllabus.mp4
    00:55
  • 003 Downloading Files for Virtualization.mp4
    03:50
  • 004 Creating Virtual Machines.mp4
    03:59
  • 005 Installing Guest Additions.mp4
    04:30
  • 006 Creating First Windows Application.mp4
    04:59
  • 007 Installing Apache, PHP, MySQL and ATOM on Ubuntu.mp4
    05:07
  • 007 installation-commands.txt
  • external-assets-links.txt
  • 008 Gathering Information About The Victim Computer.mp4
    10:08
  • 008 Windows-Tasks-To-Complete-1.pdf
  • 008 info.cs.txt
  • 009 Gaining Persistence on System.mp4
    08:14
  • 009 Windows-Tasks-To-Complete-2.pdf
  • 009 pers.cs.txt
  • 010 Downloading Files in Victim System.mp4
    13:34
  • 010 Windows-Tasks-To-Complete-3.pdf
  • 010 download-function.txt
  • 011 Directory Operations.mp4
    11:46
  • 011 Windows-Tasks-To-Complete-4.pdf
  • 011 enumworking-directory-function.txt
  • 011 setworking-directory-function.txt
  • 012 Creating Necessary Functions for Returning Information.mp4
    10:37
  • 012 Windows-Tasks-To-Complete-5.pdf
  • 012 necessary-functions.txt
  • 013 Executing Commands via CMD.mp4
    07:38
  • 013 Windows-Tasks-To-Complete-6.pdf
  • 013 executecmd-function.cs.txt
  • 014 Dealing with Exceptions and Fixing a minor Bug.mp4
    08:43
  • 014 Windows-Tasks-To-Complete-7.pdf
  • 014 complete-ops.cs.txt
  • 015 Connecting to the Attacker Server.mp4
    06:16
  • 015 Windows-Tasks-To-Complete-8.pdf
  • external-assets-links.txt
  • 016 Creating a Database For Control Panel.mp4
    05:13
  • 016 Web-Panel-Tasks-To-Complete-1.pdf
  • 016 commands.txt
  • 017 Connecting MySQL using PHP.mp4
    04:29
  • 017 Web-Panel-Tasks-To-Complete-2.pdf
  • 018 18.Creating-a-login-page.mov
    08:58
  • 018 Creating Login Page.mp4
    08:59
  • 018 Web-Panel-Tasks-To-Complete-3.pdf
  • 018 login.php.txt
  • 019 Creating Username and Password for Control Panel.mp4
    02:24
  • 019 Web-Panel-Tasks-To-Complete-4.pdf
  • 019 sql-commands.txt
  • 020 Creating a Session Control Mechanism.mp4
    02:53
  • 020 Web-Panel-Tasks-To-Complete-5.pdf
  • 020 session.php.txt
  • 021 Creating the Main Page of Control Panel.mp4
    12:41
  • 021 Web-Panel-Tasks-To-Complete-6.pdf
  • 021 index.php.txt
  • 022 Creating the Registration Page for Victims.mp4
    05:26
  • 022 Web-Panel-Tasks-To-Complete-7.pdf
  • 022 register.php.txt
  • 023 Creating the Command Sender Page.mp4
    09:51
  • 023 Web-Panel-Tasks-To-Complete-8.pdf
  • 023 getcommand.php.txt
  • 024 Creating the Result Reciever Page.mp4
    06:18
  • 024 Web-Panel-Tasks-To-Complete-9.pdf
  • 024 getresults.php.txt
  • 025 Creating the Victim Management Pages.mp4
    16:32
  • 025 Web-Panel-Tasks-To-Complete-10.pdf
  • 025 manage.php.txt
  • external-assets-links.txt
  • 026 Putting All Together (Last Touches In Client Software).mp4
    17:59
  • Description


    Learn how to create your own malware & computer virus from zero. Advance your hacking skills.

    What You'll Learn?


    • You will learn to create virtual machines.
    • You will learn C#/.NET basics.
    • You will learn to set-up Apache, MySQL services.
    • You will learn PHP, MySQL basics.
    • You will learn how malwares work.
    • You will learn how to create your custom malware from scratch.
    • You will learn how to communicate with your Attacker server.
    • You will learn how to send commands from Attacker to victims.
    • You will learn how to control multiple computers from one control panel.
    • You will learn how to enumerate and exfiltrate information from Windows systems.
    • You will learn how to Download additional files to victims computer.
    • You will learn how to gain persistence on system.
    • You will learn how to execute commands via CMD.
    • You will learn how computer viruses work.

    Who is this for?


  • Anyone interested in developing custom malwares.
  • Penetration testers
  • Red Teamers
  • Developers
  • System / Network Admins
  • Blue Teams / Threat Hunters
  • Cyber security enthusiasts
  • More details


    Description

    Are you interested in cybersecurity and/or developing your computer virus in ethical hacking purposes ?

    In this course, we will dive deep into the malwares and control panels by creating an actual one from zero ! You will learn how to develop your own custom malware from scratch with step-by-step detailed instructions for beginners. You will also learn how to enhance your malware's capabilities by developing special methods such as gathering host information, gaining persistance, uploading files to victim computer and executing commands via Command Line. After developing your own malware, you will then develop a custom attacker server software to control multiple victims at the same time from a web panel like professional C2 servers using PHP and MySQL.

    This course will provide you with everything you need to know in terms of malware and command-control server in beginner level. After this course you will feel more confident in your skills as a penetration tester, ethical hacker and red teamer. You will also have a fundamental understanding of offensive tools. If you are a blue teamer, threat hunter or incident responder, you can also benefit from this course by knowing how threat actors and APT's develope their malwares and command control structures.


    All of the captions are reviewed so feel free to use it for better learning experience.


    Who this course is for:

    • Anyone interested in developing custom malwares.
    • Penetration testers
    • Red Teamers
    • Developers
    • System / Network Admins
    • Blue Teams / Threat Hunters
    • Cyber security enthusiasts

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Engin Demirbilek
    Engin Demirbilek
    Instructor's Courses
    Hi i am ethical hacker / red teamer since 2015. I perform network, web penetration tests and source code analysis operations. I am the author of a few zeroday exploits and a few offensive-security tools.Currently i am OSWE, OSCP, OSWP and CEH | Practical holder.Hopefully my courses will enchance your skills in ethical hacking and red teaming.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 27
    • duration 3:22:26
    • Release Date 2023/05/17

    Courses related to Ethical Hacking

    Courses related to Information Security