Malware Development In Go: Bypassing Windows Defender - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Malware Development In Go: Bypassing Windows Defender (/Thread-Malware-Development-In-Go-Bypassing-Windows-Defender) |
Malware Development In Go: Bypassing Windows Defender - AD-TEAM - 01-28-2025 Malware Development In Go: Bypassing Windows Defender Published 1/2025 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 1.12 GB | Duration: 2h 1m Simple Shellcode Loader in Go What you'll learn Create a loader in Go that bypasses Windows Defender Call the Windows API in Go Use Msfvenom Understand shellcode Xor shellcode in Go Allocate Memory in Windows Change Memory Protection in Go Create Threads using the Windows API Understand Threat Intelligence Use msfvenom reverse tcp Requirements Basic linux usage Basic C programming will be a plus Description This course is designed to provide a comprehensive foundation for anyone interested in learning malware development. The primary objective is clear yet impactful: bypassing Windows Defender by creating a fully functional shellcode loader using the Go programming language. By the end of this course, you will have the essential knowledge and skills to build on, setting the stage for further exploration into offensive security and advanced malware techniques.We begin by exploring the Windows API, a critical toolkit for low-level interaction with the Windows operating system. You'll learn how to use these APIs to execute shellcode, allocate memory, and create loaders. Each step is broken down into practical, hands-on lessons that demonstrate how simple Go code can evolve into a powerful executable capable of manipulating and navigating the Windows environment.In addition to technical insights, this course emphasizes practical learning through demonstrations and exercises, ensuring a solid grasp of the material. From understanding memory allocation to mastering thread creation, you'll gain invaluable skills for creating efficient and effective programs.Join our supportive Discord Group, where you can ask questions, collaborate, and stay connected with both peers and experts. The Discord link is provided in the first lecture attachment and will be sent to you again when you buy this course. Overview Section 1: Introduction Lecture 1 Mindset of a whitehat Lecture 2 Presenting the Course Lab Lecture 3 Notes on installing Go inside Kali Linux Lecture 4 Demonstration of Windows Defender Actually Defending Lecture 5 Creating your first helloworld.exe Section 2: The Windows API Lecture 6 Introduction to the Windows API Lecture 7 Calling the Windows API in Go - Method 1 Lecture 8 Calling the Windows API in Go - Method 2 Lecture 9 Calling the Windows API in Go - Method 3 Section 3: Introduction to Loaders and Shellcode Lecture 10 Introduction to Shellcode Lecture 11 Introduction to Loaders Lecture 12 Steps to bypass Defender Section 4: Preparing the shellcode Lecture 13 Xoring the shellcode Lecture 14 Decrypting the Shellcode Section 5: Allocating Memory Lecture 15 Allocation Memory in own process space - VirtualAlloc Lecture 16 Other Method to Allocate Memory Section 6: Copying Shellcode to Allocated Memory Lecture 17 Copying Shellcode to own process Lecture 18 Making the memory executable Section 7: Triggering the thread Lecture 19 Creating a thread in current process - CreateThread Lecture 20 Others ways of launching the thread Section 8: Putting the Pieces together Lecture 21 Loader that bypasses defender Section 9: Conclusion Lecture 22 Some notes - Threat Intelligence People wanting to learn about malware development,People willing to learn for fun,Offensive Security Enthusiast RapidGator AlfaFile TurboBit |