• $890 or 6 monthly payments of $150

Malware Analysis and Development

  • Course
  • 107 Lessons
  • Discord access

Learn advanced analysis techniques from real-world malware and harness this knowledge to craft your own malware, understanding attacker strategies. Empower yourself with both defensive and offensive cybersecurity skills.

Contents

Introduction

00-Introduction.mp4
Preview
MalwareAnalysisAndDevelopmentLabs.pdf
MalwareAnalysisAndDevelopment.pdf
Labs.zip
Demos.zip
Malware Samples.zip
Malware Samples Zip Password

Windows Internals Overview

1-Processes.mp4
Preview
2-Task Manager.mp4
3-Process Explorer.mp4
Preview
4-Virtual Memory.mp4
5-Threads.mp4
6-System Architecture.mp4
7-APIs.mp4
8-Objects and Handles.mp4
9-Labs Intro.mp4

Windows Application Development Fundamentals

1-Application Development Fundamentals.mp4
2-Working with Strings.mp4
3-System Information.mp4
4-Working with Handles.mp4
Preview
5-Sharing Objects by Name.mp4
6-Duplicating Handles.mp4
7-Object Names and Sessions.mp4
8-Sessions.mp4
9-Private Object Namespace.mp4

Processes, Memory and Threads

1-Process Creation.mp4
2-The CreateProcess API.mp4
3-Process Termination.mp4
4-Labs Solution Walkthrough.mp4
5-DllMain.mp4
Preview
6-Process and Thread Attributes.mp4
7-Process Enumeration.mp4
8-PEB and Other Details.mp4
9-Process Memory.mp4
10-Reserving and Committing Memory.mp4
11-Heaps.mp4
12-Threads Basics.mp4
13-Creating Threads.mp4
14-Odds and Ends.mp4

Dynamic Link Libraries

1-Building DLLs.mp4
2-Consuming DLLs.mp4
3-Reducing Dependencies.mp4
4-DLL Injection with a Remote Thread.mp4
5-DLL Injection with an APC.mp4
6-Odds and Ends.mp4

x86/x64 Fundamentals

1-Operating Modes.mp4
2-Assembling with Visual Studio.mp4
3-x86/x64 Basics.mp4
4-Operands and Address Modes.mp4
5-Fundamental Instructions.mp4
6-Calling External Functions.mp4
7-Calling Conventions.mp4
8-Bitwise Operations.mp4
9-Branch Instructions.mp4
10-The Stack.mp4
11-Shellcode.mp4
12-Injecting Shellcode.mp4
13-Odds and Ends.mp4

.NET Fundamentals

.NET Fundamentals.mp4

COM Fundamentals

1-COM Basics.mp4
2-COM Concepts, Clients and Servers.mp4
3-Creating and Using a COM Object.mp4
4-Smart Pointers.mp4
5-OLE/COM Object Viewer.mp4
6-COM Activation in Detail.mp4

The Native API

1-Native API Basics.mp4
2-Object Manager and Native APIs.mp4
3-Registry APIs.mp4
4-Enumerating Processes and Handles.mp4

Introduction to Malware Analysis and Lab Setup

1 - The Importance of Understanding and Dissecting TTPs.mp4
2 - Introduction to Malware Analysis.mp4
3 - Understanding AV-EDR Vendor Detection Names.mp4
4 - Installing Flare-VM.mp4
5 - PE 101 - Part 1.mp4
6 - PE 101 - Part 2.mp4
7 - Strings.mp4
8 - Packing Detection - Part 1.mp4
Preview
9 - Packing Detection - Part 2.mp4
10 - Packing Detection - Part 3.mp4
11 - Detecting Malicious Functionality.mp4

Reverse Engineering .NET, VBA and Shellcode Malware

1 - Introduction to the SolarWinds Sunburst Attack.mp4
2 - Sunburst Backdoor Initial Analysis.mp4
Preview
3 - Sunburst Backdoor Backtracking (Function Call Tree Analysis).mp4
4 - Sunburst Backdoor Reverse Engineering - Part 1.mp4
5 - Sunburst Backdoor Reverse Engineering - Part 2.mp4
6 - Sunburst Backdoor Reverse Engineering - Part 3.mp4
7 - Sunburst Backdoor Reverse Engineering - Part 4.mp4
8 - Sunburst Backdoor Reverse Engineering - Part 5.mp4
9 - VBA Macro Shellcode Analysis - Part 1.mp4
10 - VBA Macro Shellcode Analysis - Part 2.mp4
11 - VBA Macro Shellcode Analysis - Part 3.mp4

Reverse Engineering C/C++ Malware

1 - DarkSide Ransomware Initial Analysis.mp4
2 - Runtime Code Unpacking - Part 1.mp4
3 - Runtime Code Unpacking - Part 2.mp4
4 - Runtime Code Unpacking - Part 3.mp4
5 - Dynamic API Resolve.mp4
6 - Rebuilding the IAT (Import Address Table).mp4
Preview
7 - DarkSide Ransomware TTPs Dissection - Part 1.mp4
8 - DarkSide Ransomware TTPs Dissection - Part 2.mp4

Malware Development

1-Minimal Executables.mp4
2-DarkSide Malware Techniques.mp4
3-Simple Memory Sharing.mp4
4-Memory Mapped Files.mp4
5-Payload in Resources.mp4
6-More Techniques.mp4

Bonus Content

One Electron to Rule Them All.mp4
For serious people only - MAoS - Malware Analysis on Steroids.mp4
Preview

Exclusive for TrainSec students, 20% discount:

Ever wanted to work with Threat.Zone? The time is now!

20% off for Malware analyst professional students.

With features like MemProcFS for analyzing memory dumps, CDR for sanitizing files, and CSI tools for digital forensics, Threat.Zone provides a powerful environment for malware analysis and security investigations.