Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Malware Development
Showing:
14
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
SyScan360
The Birth of a Complete IE11 Exploit Under New Exploit Mitigations
0
rewiews
Explore advanced techniques for developing a full IE11 exploit, navigating modern security measures and mitigation strategies.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Splinter the RAT Attack: Creating Custom RATs to Exploit Networks
0
rewiews
Explore custom Remote Access Trojans (RATs) for network exploitation, learning techniques to create and deploy these tools for penetration testing and security analysis.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Malware Automation: Techniques and Advantages - BSidesLV 2013
0
rewiews
Explore malware automation techniques, attacker arsenals, and DIY kits. Learn about armoring tools, AV scanners, and the advantages of automated malware creation in cybersecurity.
Add to list
18
Lesons
1 hour 1 minute
On-Demand
Free-Video
DefCamp
Stage 1 C2 in 3 Days - DefCamp Cluj-Napoca 2024
0
rewiews
Explore rapid C2 infrastructure setup for penetration testing in this DefCamp presentation. Learn efficient techniques for Stage 1 Command and Control deployment within tight timeframes.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Windows Agentless C2 - Abusing the MDM Client Stack
0
rewiews
Unveils innovative research on exploiting Windows MDM stack for agentless C2 systems. Explores vulnerabilities, custom C2 server creation, and remote device control techniques, inspiring new defensive strategies.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
BruCON Security Conference
PIC Your Malware
0
rewiews
Explore advanced techniques for building and hiding custom malware, including position independent code and automated payload generation, to evade detection by security products and analysts.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Practical Techniques for AV Bypass
0
rewiews
Explore practical techniques for bypassing antivirus software, covering various scenarios, tools, and programming languages to enhance your cybersecurity skills.
Add to list
33
Lesons
1 hour 5 minutes
On-Demand
Free-Video
RSA Conference
Cyberespionage - Targeted Attacks Abusing Third-Party Cloud Services
0
rewiews
Explore how APT groups exploit cloud services for cyberespionage, examining real-world cases, attack strategies, and implications for defenders and researchers across Windows and Android platforms.
Add to list
9
Lesons
28 minutes
On-Demand
Free-Video
Black Hat
Writing Badass Malware for OS X
0
rewiews
Explore advanced OS X malware techniques, persistence methods, and security bypasses. Learn to create sophisticated threats and enhance Mac protection against current and future malware.
Add to list
57
Lesons
52 minutes
On-Demand
Free-Video
BSidesLV
Building an Empire with PowerShell
0
rewiews
Explore advanced PowerShell techniques for red teaming, including Empire framework, malware motivations, and offensive strategies. Learn about extensibility, staging, and detection methods.
Add to list
25
Lesons
51 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
The Work of Cyber in the Age of Mechanical Reproduction
0
rewiews
Explore how advanced threat actors systematize and scale malware operations, and learn to analyze relationships between campaigns, malware families, and threat actors in this cybersecurity deep dive.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Writing Malware While the Blue Team Is Staring at You
0
rewiews
Explore techniques for creating malware while evading detection, focusing on red team strategies, tools, and priorities during cybersecurity competitions like CCDC.
Add to list
23
Lesons
38 minutes
On-Demand
Free-Video
Malware Development as the Evolution of Parasites - Adam Hogan
0
rewiews
Explore malware development through the lens of parasitic evolution, drawing parallels to improve cybersecurity strategies and predict future threats.
Add to list
32
Lesons
58 minutes
On-Demand
Free-Video
x33fcon
Hiding C2 Communications in Plain Sight Using Windows Memory Page Permissions
0
rewiews
Discover advanced techniques for hiding C2 communications by exploiting Windows memory page permissions, with practical approaches to building modular and stealthy command-and-control systems.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
load more...