MALWARE1. Модуль приветствия2. Введение в разработку вредоносных программ3. Необходимые инструменты4. Основы кодирования5. Архитектура Windows6. Управление памятью в Windows7. Введение в Windows API8. Переносимый исполняемый формат9. Динамические библиотеки10. Механизмы обнаружения11. Процессы Windows12. Недокументированные структуры13. Размещение полезной нагрузки - секции .data & .rdata14. Размещение полезной нагрузки - секция .text15. Размещение полезной нагрузки - секция .rsrc16. Введение в шифрование полезной нагрузки17. Payload Encryption - XOR18. Payload Encryption - RC419. Payload Encryption - AES Encryption20. Evading Microsoft Defender Static Analysis21. Payload Obfuscation - IPv4/IPv6Fuscation22. Payload Obfuscation - MACFucscation23. Payload Obfuscation - UUIDFuscation24. Maldev Academy Tool - HellShell25. Maldev Academy Tool - MiniShell26. Local Payload Execution - DLL27. Local Payload Execution - Shellcode28. Process Injection - DLL Injection29. Process Injection - Shellcode Injection30. Payload Staging - Web Server31. Payload Staging - Windows Registry32. Malware Binary Signing33. Process Enumeration - EnumProcesses34. Process Enumeration - NtQuerySystemInformation35. Thread Hijacking - Local Thread Creation36. Thread Hijacking - Remote Thread Creation37. Thread Hijacking - Local Thread Enumeration38. Thread Hijacking - Remote Thread Enumeration39. APC Injection40. Early Bird APC Injection41. Callback Code Execution42. Local Mapping Injection43. Remote Mapping Injection44. Local Function Stomping Injection45. Remote Function Stomping Injection46. Payload Execution Control47. Spoofing PPID48. Process Argument Spoofing (1)49. Process Argument Spoofing (2)50. Parsing PE Headers51. String Hashing52. IAT Hiding & Obfuscation - Introduction53. IAT Hiding & Obfuscation - Custom GetProcAddress54. IAT Hiding & Obfuscation - Custom GetModuleHandle55. IAT Hiding & Obfuscation - API Hashing56. IAT Hiding & Obfuscation - Custom Pseudo Handles57. IAT Hiding & Obfuscation - Compile Time API Hashing58. API Hooking - Introduction59. API Hooking - Detours Library60. API Hooking - Minhook Library61. API Hooking - Custom Code62. API Hooking - Using Windows APIs63. Syscalls - Introduction64. Syscalls - Userland Hooking65. Syscalls - SysWhispers66. Syscalls - Hell's Gate67. Syscalls - Reimplementing Classic Injection68. Syscalls - Reimplementing Mapping Injection69. Syscalls - Reimplementing APC Injection70. Anti-Analysis - Introduction71. Anti-Debugging - Multiple Techniques72. Anti-Debugging - Self-Deletion73. Anti-Virtual Environments - Multiple Techniques74. Anti-Virtual Environments - Multiple Delay Execution Techniques75. Anti-Virtual Environments - API Hammering76. Binary Entropy Reduction77. Brute Force Decryption78. MalDev Academy Tool - KeyGuard79. CRT Library Removal & Malware Compiling80. IAT Camouflage81. Bypassing AVs82. Introduction To EDRs83. NTDLL Unhooking - Introduction84. NTDLL Unhooking - From Disk85. NTDLL Unhooking - From KnownDlls Directory86. NTDLL Unhooking - From a Suspended Process87. NTDLL Unhooking - From a Web Server88. Updating Hell's Gate89. Indirect Syscalls - HellsHall90. Block DLL Policy91. Diving Into NtCreateUserProcess