Malware Development For Ethical Hackers & Pentesters

Posted By: ELK1nG

Malware Development For Ethical Hackers & Pentesters
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 11.39 GB | Duration: 20h 45m

Master Ethical Malware Development: Learn Techniques to Create, Analyze and Test Malware Safely for Ethical Hacking

What you'll learn

Ethical Malware Development: Learn how to safely create malware for ethical hacking and penetration testing, focusing on real-world applications and techniques.

Antivirus Evasion & Bypass Techniques: Master strategies to bypass antivirus (AV) and endpoint detection systems (EDR), enhancing your malware development skill

Malware Analysis & Behavior: Gain hands-on experience in analyzing malware, studying its behavior, and understanding its impact on systems and networks.

Privilege Escalation & Persistence: Discover methods to elevate malware privileges and ensure its persistence on compromised systems, even after reboots

Advanced Cryptography & Obfuscation: Learn about cryptographic methods and simple ciphers used in malware for encryption and obfuscation, including algorithms

Requirements

Basic knowledge of programming in C/C++ ,Python and x86/x64 Assembly is recommended.

Familiarity with Windows operating systems and their Sysinternals Suit.

Understanding of basic cybersecurity concepts and ethical hacking principles.

A system capable of running virtual machines (e.g., VMware, VirtualBox) to safely test and analyze malware.

A willingness to learn, explore, and apply offensive programming techniques responsibly.

Basic knowledge of Linux ( Kali Linux ) Operating system administration.

Description

Unlock the world of ethical malware development with this in-depth course designed for ethical hackers and pentesters. This course teaches you how malware functions, how to create it safely, and how to bypass antivirus detection in controlled environments, all while enhancing your cybersecurity expertise.You’ll explore key concepts in ethical hacking, including the creation and analysis of malware, and gain practical experience in evading antivirus systems. Learn techniques used by professionals to simulate real-world attacks and improve security defenses.The course covers:Ethical malware development practices.Malware behavior analysis in virtualized environments.Antivirus evasion strategies and bypass techniques.Techniques for testing and strengthening security measures.Whether you're an aspiring ethical hacker, a cybersecurity enthusiast, or an experienced pentester, this course will deepen your understanding of how malware operates and provide you with valuable tools for improving security.By the end of the course, you will be able to develop, analyze, and bypass antivirus defenses for testing purposes, giving you a competitive edge in the cybersecurity field.Enroll today to take your ethical hacking skills to the next level and start mastering malware development, antivirus evasion, and more!Keywords: ethical malware development, antivirus evasion, malware analysis, ethical hacking, pentesting, cybersecurity training, antivirus bypass techniques.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Lab setup

Lecture 2 Lab setup 1

Section 3: Building the foundation

Lecture 3 What is a malware and its types

Lecture 4 Introduction to PE file structure

Lecture 5 Understanding MS-DOS Header in PE file of windows

Lecture 6 Understanding DOS stub in PE file of windows

Lecture 7 PE - Header section structure Basics

Lecture 8 Understanding PE Headers subsections - Signature, File Header and OptionalHeader

Lecture 9 Understanding PE Section Headers

Lecture 10 Understanding PE sections in windows

Lecture 11 Understanding token, handle and thread of a process

Lecture 12 Understanding token information in process hacker

Lecture 13 Understanding handle table information

Lecture 14 Understanding threads in process hacker

Section 4: Windows API programming basics - Handles in Windows

Lecture 15 What is a Handle in windows ?

Lecture 16 Windows Handle example: Finding out running program using windows handle

Lecture 17 Windows Handle example: Hiding , minimizing, maximizing running program

Section 5: Windows API programming basics: Creating, Manipulating Processes in windows

Lecture 18 Lab configuration in Malware development machine.

Lecture 19 Deep diving into CreateProcess function and understanding its input parameters.

Lecture 20 Creating a process using CreateProcess function

Lecture 21 How can we hide a program using STARTUPINFO structure flags

Lecture 22 Hiding program practical demonstration

Lecture 23 Hiding program using CreateProcess function flags in windows

Lecture 24 Hiding console programs in windows

Lecture 25 Understanding inherit handles in CreateProcess function in windows

Lecture 26 Practical demonstration of inherit handle in CreateProcess function

Lecture 27 How to set custom environment variable for child process in windows

Lecture 28 How to set custom working directory for child process in CreateProcess function

Lecture 29 How to open a process using OpenProcess windows api function

Section 6: Thread basics in windows API programming

Lecture 30 Understanding CreateThread function working in windows

Lecture 31 Practical demonstration of thread creation with CreateThread windows function

Lecture 32 How to execute a shellcode with CreateThread function

Lecture 33 Practical demonstration of executing a shellcode with CreateThread function

Lecture 34 Understanding ANSI and UNICODE in windows programming

Section 7: Malware injection attacks in windows operating system

Lecture 35 Understanding how to inject code into other running processes in windows

Lecture 36 Practical demonstration of malware code injection into other processes in window

Lecture 37 Understanding DLL injection attack in windows

Lecture 38 Practical demonstration of DLL injection attack in windows

Lecture 39 Understanding DLL hijacking concept in windows

Lecture 40 Practical demonstration of DLL hijacking in windows

Lecture 41 Understanding APC code injection technique

Lecture 42 APC injection practical demonstration in windows

Section 8: Malware persistence

Lecture 43 Malware persistence using registry entry

Lecture 44 Practical demonstration of Malware persistence using registry entry

Lecture 45 Malware persistence via Winlogon

Lecture 46 Practical demonstration of malware persistence via Winlogon

Lecture 47 Understanding malware persistence by creating Malicious Windows Services

Lecture 48 Practical demonstration of malware persistence via creating Windows Service

Section 9: Privilege escalations - Token stealing in Windows

Lecture 49 Understanding basic token theft concept

Lecture 50 How to enable SeDebugPrivilege - understanding basic concept

Lecture 51 Understanding the working of enable SeDebugPrivilege program

Lecture 52 Practical demonstration of enabling SeDebugPrivilege of a program token

Lecture 53 Understanding the basic steps of how to steal token of winlogon process

Lecture 54 Practical demonstration of stealing token of winlogon process

Section 10: Privilege escalation - Password stealing from lsass process in windows

Lecture 55 What is lsass process in windows ?

Lecture 56 How do we steal the password from lsass process in windows ?

Lecture 57 Understanding Windows API functions used in finding the target process id

Lecture 58 Understanding the program logic of process id ( lsass.exe ) finding program

Lecture 59 Practical demonstration of finding the process id of lsass in Windows

Lecture 60 Understanding the program flow of password stealing program from lsass process

Lecture 61 Practical demonstration of dumping the memory of lsass process from our malware

Lecture 62 Extracting the password hashes from the lsass dump file

Ethical Hackers & Pentesters: Professionals looking to enhance their skills in malware development, analysis, and antivirus evasion for penetration testing.,Cybersecurity Enthusiasts: Individuals passionate about understanding malware mechanics and offensive programming techniques.,Aspiring Malware Analysts: Those interested in studying malware behavior, persistence, and obfuscation methods in controlled environments.,Red Team Operators: Security experts aiming to simulate real-world attacks to identify vulnerabilities and improve defenses.,Advanced Learners in Cybersecurity: Students or professionals seeking to deepen their knowledge of malware development, privilege escalation, and anti-debugging strategies.