Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status (how to buy - Premium status)
  • We have a scammer on our forum who poses as the administrator of our forum in his telegram channel.
    Scammer screen group - Screen 1, Screen 2 and group name - https://t.me/Niflheimworld (This is not an admin, the link is only for reference with whom not to conduct transactions)
    Do not trust him and do not conduct transactions with him!
    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

Sektor7 - Malware Development Advanced - Vol.1


ENCRYP73D_GH05T

New user
Landboar
Joined
Jan 17, 2025
Messages
200
Reaction score
4
NL COIN
1,015
Screenshot_21.png


Welcome to Malware Development Advanced (Vol.1) course!


ways to hide your payload inside NTFS and registry hive
  • learning object enumeration alternatives in the system memory
  • manipulating Process Environment Blocks to hide your module and confuse the potential defender
  • finding .NET process with RWX memory ready to abuse
  • detecting new process creation (from userland)
  • setting up global hooks
  • learning few userland rootkit techniques to hide your files, registry keys and processes
  • abusing memory and hardware breakpoints for hooking
  • hiding payload with Gargoyle and similar techniques
  • creating custom "RPC" allowing to call any API function with any number of parameters in a remote process
  • learning COFF objects, how to build, parse, load and execute them in the memory
The course ends with a custom project, employing some of the discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELL
You Will Learn How To
  • Hide payloads in the corners of NTFS and registry
  • Enumerate processes, modules and handles with alternatives
  • Find a perfect process for injection
  • Set up global hooks
  • Use few userland rootkit techniques
  • Abuse exception handlers
  • Hide a payload in a memory
  • Call any API (with any number of params) in a remote process
  • Build custom COFF objects
What Will You Get?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements
  • Recommended: taking Malware Development Intermediate course
  • Solid understanding of operating system architecture
  • Good experience with Windows OS
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 7.0+ installed
  • Strong will to learn and having fun
Target Audience
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics
 
shape1
shape2
shape3
shape4
shape7
shape8
Top