#Malware #Development #redteam
Pork is airborne and hell hath frozen over; MALDEV PART 2 IS FINALLY OUT! Thank you, guys, so much for bearing with my RNG upload schedules (I don’t even know if the word “schedule“ can even be associated with me). Please enjoy the newest installment of our ongoing Malware Development series. As always, you can find more on my blog here:
In the next video, we’ll be taking a look at the lower-level NTAPI from NTDLL, and perhaps some system calls! I am going to be taking a bit of a break since this video almost obliterated my soul; I’m a one-man team and this takes forever, especially when it’s an hour long. I sincerely hope you guys found some use for this video, and once again, thank you for being here and watching. I will catch you guys later :)
I love you guys, enjoy.
⚠️ Disclaimer:
The information presented in this video is for educational purposes only. It is not intended to be used for illegal or malicious activities. The creator and any individuals involved in the production of this video are not responsible for any misuse of the information provided. It is the responsibility of the viewer to ensure that they comply with all relevant laws and regulations in their jurisdiction.
🔖 My Socials:
avatar/mascot made with picrew:
- full credits to the artist:
- visit her shop:
official discord server:
💖 Support My Work:
🎵 Music/Videos Used:
@KronoMuzik =
@SuperLofiWorld =
@jonathanwebster1452 =
❤️ Websites Featured:
The images and music used in this video are used under the principle of fair use for the purpose of criticism, comment, news reporting, teaching, scholarship, and research. I do not claim ownership of any of the images/music and they are used solely for the purpose of enhancing the content of the video. I respect the rights of the creators and owners of these images and will remove any image upon request by the rightful owner.
Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing.
🕰️ Timestamps:
00:00 - Intro
01:18 - Prerequisites
03:52 - Small Disclaimer
04:44 - What is Process Injection?
06:58 - Shellcode Injection
38:37 - Generating Shellcode
41:05 - Starting The Listener
41:36 - Performing The Injection
42:36 - Next Step
43:12 - What is a DLL?
45:03 - Creating a DLL
50:42 - DLL Injection
1:01:20 - Performing The Injection II
1:03:53 - Common Pitfalls
1:05:11 - Outro
1 view
557
145
3 months ago 00:17:36 1
Red Team | HACKING GOOGLE | Documentary EP003
3 months ago 00:08:28 3
secret backdoor found in open source software (xz situation breakdown)
4 months ago 00:01:30 1
Comparison Antivirus Developed by Country
4 months ago 00:42:54 1
Becoming a Dark Knight: Adversary Emulation Demonstration for ATT&CK Evaluations
6 months ago 02:01:29 1
Ultimate Mr. Robot Original TV-Series Score Music Mix for Hacking, Coding & Programming
6 months ago 00:31:29 1
Malware Development: Processes, Threads, and Handles
6 months ago 01:06:21 1
Malware Development II: Process Injection
7 months ago 00:47:43 1
Pegasus Spyware: so dangerous that it should be banned? OTW explains...
7 months ago 00:03:54 1
Cybersecurity Spotlight: Visa Training Program, Countries Pledge No Ransoms, WA Website Attacked
8 months ago 00:02:13 1
C vs C++ vs C# [перевод на русский]
8 months ago 00:04:46 1
🔒 How To Add a Malware Scanner, Cleaner & Security Firewall in WordPress Websites For Free
8 months ago 00:05:49 1
✋ How to Stop Spam Registrations on your WordPress Membership Site?
8 months ago 00:12:04 2
Secret FREE Windows Tools Nobody Is Talking About
8 months ago 00:17:44 1
Reverse Shell UNDETECTED by Microsoft Defender (hoaxshell)
8 months ago 00:32:36 1
#HITB2023HKT D1T1 - Extracting Info From Automotive Internet Units - A. Kondikov & Y. Serdyuk
10 months ago 00:11:25 1
Hacking with ChatGPT: Five A.I. Based Attacks for Offensive Security
10 months ago 00:01:33 1
DESTRUCTOR | ANDROID | GAME
10 months ago 00:05:42 1
why do hackers love strings?
11 months ago 00:17:50 1
“Please Hack My Computer“
11 months ago 00:03:31 1
❤️Есть ли жизнь на Windows Vista SP2 в 2023 году?
1 year ago 00:02:51 1
Como Remover, Ativar ou Desativar a Assinatura da Avast em Emails Enviados?
1 year ago 00:01:03 4
Киркоров как настоящий путинист, приехал отдыхать в Монако Но встретили его совсем не ласково
1 year ago 00:41:57 1
Hunting Russia FSB’s Most Sophisticated “Snake“ Malware | Threat SnapShot
1 year ago 00:13:56 1
everything is open source if you can reverse engineer (try it RIGHT NOW!)