01-28-2025, 07:34 PM
Malware Development In Go: Bypassing Windows Defender
Published 1/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.12 GB | Duration: 2h 1m
Simple Shellcode Loader in Go
What you'll learn
Create a loader in Go that bypasses Windows Defender
Call the Windows API in Go
Use Msfvenom
Understand shellcode
Xor shellcode in Go
Allocate Memory in Windows
Change Memory Protection in Go
Create Threads using the Windows API
Understand Threat Intelligence
Use msfvenom reverse tcp
Requirements
Basic linux usage
Basic C programming will be a plus
Description
This course is designed to provide a comprehensive foundation for anyone interested in learning malware development. The primary objective is clear yet impactful: bypassing Windows Defender by creating a fully functional shellcode loader using the Go programming language. By the end of this course, you will have the essential knowledge and skills to build on, setting the stage for further exploration into offensive security and advanced malware techniques.We begin by exploring the Windows API, a critical toolkit for low-level interaction with the Windows operating system. You'll learn how to use these APIs to execute shellcode, allocate memory, and create loaders. Each step is broken down into practical, hands-on lessons that demonstrate how simple Go code can evolve into a powerful executable capable of manipulating and navigating the Windows environment.In addition to technical insights, this course emphasizes practical learning through demonstrations and exercises, ensuring a solid grasp of the material. From understanding memory allocation to mastering thread creation, you'll gain invaluable skills for creating efficient and effective programs.Join our supportive Discord Group, where you can ask questions, collaborate, and stay connected with both peers and experts. The Discord link is provided in the first lecture attachment and will be sent to you again when you buy this course.
Overview
Section 1: Introduction
Lecture 1 Mindset of a whitehat
Lecture 2 Presenting the Course Lab
Lecture 3 Notes on installing Go inside Kali Linux
Lecture 4 Demonstration of Windows Defender Actually Defending
Lecture 5 Creating your first helloworld.exe
Section 2: The Windows API
Lecture 6 Introduction to the Windows API
Lecture 7 Calling the Windows API in Go - Method 1
Lecture 8 Calling the Windows API in Go - Method 2
Lecture 9 Calling the Windows API in Go - Method 3
Section 3: Introduction to Loaders and Shellcode
Lecture 10 Introduction to Shellcode
Lecture 11 Introduction to Loaders
Lecture 12 Steps to bypass Defender
Section 4: Preparing the shellcode
Lecture 13 Xoring the shellcode
Lecture 14 Decrypting the Shellcode
Section 5: Allocating Memory
Lecture 15 Allocation Memory in own process space - VirtualAlloc
Lecture 16 Other Method to Allocate Memory
Section 6: Copying Shellcode to Allocated Memory
Lecture 17 Copying Shellcode to own process
Lecture 18 Making the memory executable
Section 7: Triggering the thread
Lecture 19 Creating a thread in current process - CreateThread
Lecture 20 Others ways of launching the thread
Section 8: Putting the Pieces together
Lecture 21 Loader that bypasses defender
Section 9: Conclusion
Lecture 22 Some notes - Threat Intelligence
People wanting to learn about malware development,People willing to learn for fun,Offensive Security Enthusiast