Are you interested in cybersecurity and/or developing your offensive tools in ethical hacking purposes ?
In this course, we will dive deep into the malwares and control panels by creating an actual one. You will learn how to develop your own custom malware from scratch with step-by-step detailed instructions for beginners. You will also learn how to enhance your malware’s capabilities by developing special methods such as gathering host information, gaining persistance, uploading files to victim computer and executing commands via Command Line. After developing your own malware, you will then develop a custom attacker server software to control multiple victims at the same time from a web panel like professional C2 servers using PHP and MySQL.
This course will provide you with everything you need to know in terms of malware and command-control server in beginner level. After this course you will feel more confident in your skills as a penetration tester, ethical hacker and red teamer. You will also have a fundamental understanding of offensive tools. If you are a blue teamer, threat hunter or incident responder, you can also benefit from this course by knowing how threat actors and APT’s develope their malwares and command control structures.
All of the captions are reviewed so feel free to use it for better learning experience.
Who this course is for:
- Anyone interested in developing custom malwares.
- Penetration testers
- Red Teamers
- System / Network Admins
- Blue Teams / Threat Hunters
- Cyber security enthusiasts
- Basic TCP/IP knowledge.
- Basic programming knowledge.
- Basic GNU/Linux knowledge.
- Basic object oriented programming language knowledge will be a plus.
Last Updated 2/2021