HOW TO BECOME EXPERT IN MALWARE
by tacticaloperative - Wednesday December 20, 2023 at 06:39 AM
#21
Thank you. It is useful for me. I have donate points it to you.
Reply
#22
thanks for sharing your tips

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#23
knowledge is important in this world
Reply
#24
Thank you brother

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#25
Learn how to learn, then learn and then write malware that is unique xd
Reply
#26
(Dec 20, 2023, 06:39 AM)tacticaloperative Wrote: I have up to 3 yrs of malware development and initially it was very hard for me to start since a lot of resources were paywalled and there wasnt a direct route for you to develop malware. 

1)LEARN C this pretty much rosseta stone of computer programming languages from javascript to perl are built on top of C.
>https://www.youtube.com/watch?v=j-_s8f5K30I&ab_channel=freeCodeCamp.org
>https://www.cc4e.com/book/chap00.md
>https://github.com/h0mbre/Learning-C/tree/master/Assignment-01
2)Reverse Engineering is next part of process
> begin https://github.com/hoppersroppers/nightmare
The Nightmare course is our main binary exploitation track, but the first 4 chapters are about learning the tools and RE. Work throught the first 4 sections until you get to the overflows section, then come on back to RE.
>work back through h0mbre C using GDB and Ghidra for every assignment. This takes a while, but is a really good way to get familar with how to do Linux reverse engineering and become comfortable with disassembly:https://github.com/h0mbre/Learning-C/tree/master/Assignment-01
3)MALWARE RE once you have become apt in reverse engineering you can start reverse engineering malware
>https://malwareunicorn.org/workshops/re101.html#0
>https://malwareunicorn.org/workshops/re102.html#0
4)Build your own malware and exploits


If im missing anything plz add

addittional resources:
 
good to see this post is well
Reply
#27
very helpful bro

[url=https://breachforums.cx/private.php?action=send&uid=56026][/url]
Reply
#28
thanks for your wisdom

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#29
Thank you for the share much appreciated. Going to look's like I can do some more reading today.
Reply
#30
very helpful bro
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [ LIST ] 5 FREE STEALERS WITH PROS/CONS elix 381 14,512 3 hours ago
Last Post: GWNiemand1212
  Sektor7 - Malware Development Advanced - Vol.1 Sh4d0w1X 422 41,907 6 hours ago
Last Post: 7one
  [Go] Using the recycle bin for stealthy persistence (Beginner tutorial) CreateThread 16 870 7 hours ago
Last Post: sureno
  Xordium stealer for Pulsar v2.4.5 nullvex 24 904 Today, 01:12 AM
Last Post: CuantoxReal
  [Sektor7] Full Recent Course Spearr 29 570 Today, 01:08 AM
Last Post: CuantoxReal

Forum Jump:


 Users browsing this forum: 2 Guest(s)