Online course teaching malware development and analysis skills. Includes modules on malware techniques, initial access, credential access, and persistence. Offers yearly and lifetime access with updates and support. Planned features include red teaming projects and Active Directory exploitation.
Includes features such as Intrust Syscalls, API Obfuscation, and Anti-syscalls to build malware.
Techniques like DLL Sideloading and LNK Dropper for gaining initial system access.
Features like Dumping LSASS and Custom Credential Stealer for accessing and extracting credentials.
Provides Custom C2 framework and Using a YAML as C2 for developing custom tools.
Techniques include App Init DLL and APT Persistence techniques for maintaining access to systems.
Technique for unhooking NTLM for stealth and sophistication.
Methods to hide files and processes for evading detection.
Thread-hijacking techniques for sophisticated malware execution.
Hands-on experience with operation-ready red team incidents.
Training in Active Directory exploitation using various tools.
Focus on developing malware for Unix systems.