Softwarez.Info - Software's World!
Malware Development In Go: Bypassing Windows Defender - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials)
+--- Thread: Malware Development In Go: Bypassing Windows Defender (/Thread-Malware-Development-In-Go-Bypassing-Windows-Defender)



Malware Development In Go: Bypassing Windows Defender - AD-TEAM - 01-28-2025

[Image: 32c7a40fe2e915a9dc8422d8f742fb0e.jpg]
Malware Development In Go: Bypassing Windows Defender
Published 1/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.12 GB | Duration: 2h 1m

Simple Shellcode Loader in Go

What you'll learn

Create a loader in Go that bypasses Windows Defender

Call the Windows API in Go

Use Msfvenom

Understand shellcode

Xor shellcode in Go

Allocate Memory in Windows

Change Memory Protection in Go

Create Threads using the Windows API

Understand Threat Intelligence

Use msfvenom reverse tcp

Requirements

Basic linux usage

Basic C programming will be a plus

Description

This course is designed to provide a comprehensive foundation for anyone interested in learning malware development. The primary objective is clear yet impactful: bypassing Windows Defender by creating a fully functional shellcode loader using the Go programming language. By the end of this course, you will have the essential knowledge and skills to build on, setting the stage for further exploration into offensive security and advanced malware techniques.We begin by exploring the Windows API, a critical toolkit for low-level interaction with the Windows operating system. You'll learn how to use these APIs to execute shellcode, allocate memory, and create loaders. Each step is broken down into practical, hands-on lessons that demonstrate how simple Go code can evolve into a powerful executable capable of manipulating and navigating the Windows environment.In addition to technical insights, this course emphasizes practical learning through demonstrations and exercises, ensuring a solid grasp of the material. From understanding memory allocation to mastering thread creation, you'll gain invaluable skills for creating efficient and effective programs.Join our supportive Discord Group, where you can ask questions, collaborate, and stay connected with both peers and experts. The Discord link is provided in the first lecture attachment and will be sent to you again when you buy this course.

Overview

Section 1: Introduction

Lecture 1 Mindset of a whitehat

Lecture 2 Presenting the Course Lab

Lecture 3 Notes on installing Go inside Kali Linux

Lecture 4 Demonstration of Windows Defender Actually Defending

Lecture 5 Creating your first helloworld.exe

Section 2: The Windows API

Lecture 6 Introduction to the Windows API

Lecture 7 Calling the Windows API in Go - Method 1

Lecture 8 Calling the Windows API in Go - Method 2

Lecture 9 Calling the Windows API in Go - Method 3

Section 3: Introduction to Loaders and Shellcode

Lecture 10 Introduction to Shellcode

Lecture 11 Introduction to Loaders

Lecture 12 Steps to bypass Defender

Section 4: Preparing the shellcode

Lecture 13 Xoring the shellcode

Lecture 14 Decrypting the Shellcode

Section 5: Allocating Memory

Lecture 15 Allocation Memory in own process space - VirtualAlloc

Lecture 16 Other Method to Allocate Memory

Section 6: Copying Shellcode to Allocated Memory

Lecture 17 Copying Shellcode to own process

Lecture 18 Making the memory executable

Section 7: Triggering the thread

Lecture 19 Creating a thread in current process - CreateThread

Lecture 20 Others ways of launching the thread

Section 8: Putting the Pieces together

Lecture 21 Loader that bypasses defender

Section 9: Conclusion

Lecture 22 Some notes - Threat Intelligence

People wanting to learn about malware development,People willing to learn for fun,Offensive Security Enthusiast

[Image: JzlVp4Lv_o.jpg]

RapidGator

[To see links please register or login]

AlfaFile

[To see links please register or login]

TurboBit

[To see links please register or login]