ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Malware Development: Native API

crow

hacking

maldev

winapi

c++

programming

malware development

malware

virus

tutorial

how to

pentesting

penetration testing

kali

windows

win32 api

security

hack

hacked

developing malware

making malware

making viruses

pentester

red teaming

red team

offsec

oscp

certification

research

developing

hacker

active directory

blue team

ad hacking

ad

binexp

binary exploitation

compsci

computer science

computer

pc

linux

os

operating system

2023

minecraft

fun

live

memes

ntapi

nt

Автор: crow

Загружено: 2023-10-31

Просмотров: 52348

Описание: #Malware #Development

🦠 Use code "CROW10" for 10% OFF your order when you checkout at Maldev Academy! https://maldevacademy.com/?ref=crow

⚠️ Disclaimer
The information presented in this video is for educational purposes only. It is not intended to be used for illegal or malicious activities. The creator and any individuals involved in the production of this video are not responsible for any misuse of the information provided. It is the responsibility of the viewer to ensure that they comply with all relevant laws and regulations in their jurisdiction.

💖 Support My Work
  / cr0w  
https://ko-fi.com/cr0ww
https://www.buymeacoffee.com/cr0w
Join this channel to get access to perks:
   / @crr0ww  

🔖 My Socials
  / discord  
https://www.crow.rip/
https://github.com/cr-0w
  / cr0ww_  

📹 Videos/Channels Featured
Spongebob bruh video:    • Oh Brother, This Guy STINKS  
   • Malware Development: Process Injection  
   • Malware's LAST Stand: SELF-DELETION  

❤️ Websites Featured
Kernel32 Functions: https://www.geoffchappell.com/studies...
Inside the Native API: https://web.archive.org/web/201212240...
PHNT GitHub Repository: https://github.com/winsiderss/phnt
NtDoc: https://ntdoc.m417z.com/
Vergilius: https://www.vergiliusproject.com/

The images and music used in this video are used under the principle of fair use for the purpose of criticism, comment, news reporting, teaching, scholarship, and research. I do not claim ownership of any of the images/music and they are used solely for the purpose of enhancing the content of the video. I respect the rights of the creators and owners of these images and will remove any image upon request by the rightful owner.

Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing.

🕰️ Timestamps:
00:00 - Intro
01:40 - Learn Malware Development
03:58 - Recap
08:25 - Introducing: The Native API
09:38 - User-mode and Kernel-mode
13:42 - Function Flow Path
16:25 - Dissecting a Program (Reverse Engineering)
24:46 - Short Intermission
25:01 - Making an NTAPI Injector
43:00 - Running The Shellcode Injector
44:08 - Outro

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Malware Development: Native API

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Malware Development: System Calls

Malware Development: System Calls

Malware Development: Process Injection

Malware Development: Process Injection

Buffer Overflows: A Symphony of Exploitation

Buffer Overflows: A Symphony of Exploitation

Fake CAPTCHA Runs Malware

Fake CAPTCHA Runs Malware

Malware Development #-1 Process & Thread | Complete Course

Malware Development #-1 Process & Thread | Complete Course

The Black Magicks of Malware: Function Call Obfuscation

The Black Magicks of Malware: Function Call Obfuscation

An Introduction to Malware Analysis

An Introduction to Malware Analysis

The Hack That Made China a Superpower: Operation Shady Rat

The Hack That Made China a Superpower: Operation Shady Rat

Malware Development: Processes, Threads, and Handles

Malware Development: Processes, Threads, and Handles

Malware's LAST Stand: SELF-DELETION

Malware's LAST Stand: SELF-DELETION

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]