# Malware Development

How can you understand the movements of malware? The answer is so simple. It would help if you learned how you could develop malware. You should think like an attacker! I'm comparing malware analysis with penetration testing. So, if you know how to develop an application in the target technology, you can analyze the behavior of a system, and you can find vulnerabilities in a system.

Every time I start to learn or test new technology, I'm practicing to build a basic application in the target language.

Useful knowledge might be found inside the below links about malware development.

A mix of everything: :)

{% embed url="<https://github.com/rootkit-io/awesome-malware-development>" %}

Step by step and technic by technic, Cocomelonc is giving wonderful details about malware development and analysis in his blog with a good perspective.

{% embed url="<https://cocomelonc.github.io>" %}

Thanks to [@aas\_s3curity](https://twitter.com/aas_s3curity) 's tweet I found a valuable malware development blog series in [0xpat's blog](https://0xpat.github.io/).&#x20;

{% embed url="<https://twitter.com/aas_s3curity/status/1481196766485749762?s=21>" %}

0xpat's first post to track others:

{% embed url="<https://0xpat.github.io/Malware_development_part_1/>" %}

Online training:<br>

{% embed url="<https://www.udemy.com/course/malware-development-beginner-level/>" %}

{% embed url="<https://www.udemy.com/course/ehf-maldev-in-windows/>" %}

{% embed url="<https://institute.sektor7.net/red-team-operator-malware-development-essentials>" %}

Both might be more specific than the above but I like them:

{% embed url="<https://training.zeropointsecurity.co.uk/courses/offensive-driver-development>" %}

{% embed url="<https://training.zeropointsecurity.co.uk/courses/c2-development-in-csharp>" %}

​ Also, I found a continuing playlist on YouTube made by ActiveXsploit that hasn't finished yet.

{% embed url="<https://youtube.com/playlist?list=PL-aDiCywOtNXxR8EGzp773K3sgKQlAlG0>" %}

These are my resources to understand malware development. Also, I'm trying to cosubstrate with Red Teaming technics besides working only on Malware development. Because; malware is a coded version of the Red Teaming technics in order from my perspective. So, I'll make a rich list for Red Teaming later.

<br>

-EOF


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://lookbook.cyberjungles.com/random-research-area/malware-analysis-and-development/malware-development.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
