• $890 or 6 monthly payments of $150

Malware Analysis and Development

  • Course
  • 107 Lessons
  • Discord access

Learn advanced analysis techniques from real-world malware and harness this knowledge to craft your own malware, understanding attacker strategies. Empower yourself with both defensive and offensive cybersecurity skills.

Read more about the instructors, course contents and special pricing:

Contents

Introduction

00-Introduction.mp4
Preview
MalwareAnalysisAndDevelopmentLabs.pdf
MalwareAnalysisAndDevelopment.pdf
Labs.zip
Demos.zip
Malware Samples.zip
Malware Samples Zip Password

Windows Internals Overview

1-Processes.mp4
Preview
2-Task Manager.mp4
3-Process Explorer.mp4
Preview
4-Virtual Memory.mp4
5-Threads.mp4
6-System Architecture.mp4
7-APIs.mp4
8-Objects and Handles.mp4
9-Labs Intro.mp4

Windows Application Development Fundamentals

1-Application Development Fundamentals.mp4
2-Working with Strings.mp4
3-System Information.mp4
4-Working with Handles.mp4
Preview
5-Sharing Objects by Name.mp4
6-Duplicating Handles.mp4
7-Object Names and Sessions.mp4
8-Sessions.mp4
9-Private Object Namespace.mp4

Processes, Memory and Threads

1-Process Creation.mp4
2-The CreateProcess API.mp4
3-Process Termination.mp4
4-Labs Solution Walkthrough.mp4
5-DllMain.mp4
Preview
6-Process and Thread Attributes.mp4
7-Process Enumeration.mp4
8-PEB and Other Details.mp4
9-Process Memory.mp4
10-Reserving and Committing Memory.mp4
11-Heaps.mp4
12-Threads Basics.mp4
13-Creating Threads.mp4
14-Odds and Ends.mp4

Dynamic Link Libraries

1-Building DLLs.mp4
2-Consuming DLLs.mp4
3-Reducing Dependencies.mp4
4-DLL Injection with a Remote Thread.mp4
5-DLL Injection with an APC.mp4
6-Odds and Ends.mp4

x86/x64 Fundamentals

1-Operating Modes.mp4
2-Assembling with Visual Studio.mp4
3-x86/x64 Basics.mp4
4-Operands and Address Modes.mp4
5-Fundamental Instructions.mp4
6-Calling External Functions.mp4
7-Calling Conventions.mp4
8-Bitwise Operations.mp4
9-Branch Instructions.mp4
10-The Stack.mp4
11-Shellcode.mp4
12-Injecting Shellcode.mp4
13-Odds and Ends.mp4

.NET Fundamentals

.NET Fundamentals.mp4

COM Fundamentals

1-COM Basics.mp4
2-COM Concepts, Clients and Servers.mp4
3-Creating and Using a COM Object.mp4
4-Smart Pointers.mp4
5-OLE/COM Object Viewer.mp4
6-COM Activation in Detail.mp4

The Native API

1-Native API Basics.mp4
2-Object Manager and Native APIs.mp4
3-Registry APIs.mp4
4-Enumerating Processes and Handles.mp4

Introduction to Malware Analysis and Lab Setup

1 - The Importance of Understanding and Dissecting TTPs.mp4
2 - Introduction to Malware Analysis.mp4
3 - Understanding AV-EDR Vendor Detection Names.mp4
4 - Installing Flare-VM.mp4
5 - PE 101 - Part 1.mp4
6 - PE 101 - Part 2.mp4
7 - Strings.mp4
8 - Packing Detection - Part 1.mp4
Preview
9 - Packing Detection - Part 2.mp4
10 - Packing Detection - Part 3.mp4
11 - Detecting Malicious Functionality.mp4

Reverse Engineering .NET, VBA and Shellcode Malware

1 - Introduction to the SolarWinds Sunburst Attack.mp4
2 - Sunburst Backdoor Initial Analysis.mp4
Preview
3 - Sunburst Backdoor Backtracking (Function Call Tree Analysis).mp4
4 - Sunburst Backdoor Reverse Engineering - Part 1.mp4
5 - Sunburst Backdoor Reverse Engineering - Part 2.mp4
6 - Sunburst Backdoor Reverse Engineering - Part 3.mp4
7 - Sunburst Backdoor Reverse Engineering - Part 4.mp4
8 - Sunburst Backdoor Reverse Engineering - Part 5.mp4
9 - VBA Macro Shellcode Analysis - Part 1.mp4
10 - VBA Macro Shellcode Analysis - Part 2.mp4
11 - VBA Macro Shellcode Analysis - Part 3.mp4

Reverse Engineering C/C++ Malware

1 - DarkSide Ransomware Initial Analysis.mp4
2 - Runtime Code Unpacking - Part 1.mp4
3 - Runtime Code Unpacking - Part 2.mp4
4 - Runtime Code Unpacking - Part 3.mp4
5 - Dynamic API Resolve.mp4
6 - Rebuilding the IAT (Import Address Table).mp4
Preview
7 - DarkSide Ransomware TTPs Dissection - Part 1.mp4
8 - DarkSide Ransomware TTPs Dissection - Part 2.mp4

Malware Development

1-Minimal Executables.mp4
2-DarkSide Malware Techniques.mp4
3-Simple Memory Sharing.mp4
4-Memory Mapped Files.mp4
5-Payload in Resources.mp4
6-More Techniques.mp4

Bonus Content

One Electron to Rule Them All.mp4
For serious people only - MAoS - Malware Analysis on Steroids.mp4
Preview

Exclusive for TrainSec students, 20% discount:

Ever wanted to work with Threat.Zone? The time is now!

20% off for Malware analyst professional students.

With features like MemProcFS for analyzing memory dumps, CDR for sanitizing files, and CSI tools for digital forensics, Threat.Zone provides a powerful environment for malware analysis and security investigations.