JustForFun
  • Hello World
  • AI/ML/LLM Security
    • 🐣What is this AREA?
    • 📚Self-Study AI/ML/LLM Roadmap for Security Folks
    • 🌟AI/ML Dictionary
    • 🌰Generative AI in a Nutshell
    • 👹(WIP) AI/ML/LLM Application Security Testing
      • 💉(WIP) Offensive Approach for Prompt Injection Attacks
      • 👾Standard Input: Prompt Injection
      • ⚠️(WIP) Training Issues
      • 🎑(WIP) Multi-Modal LLM Application Security Testing
      • ✨(WIP) Resources
  • Random Research Area
    • What is this AREA?
    • Phishing with MS Office Docs
      • VSTO and Malicious Office Docs
    • Malware Analysis & Development
      • Malware Development
  • AppSecNotes
    • 3rd Party Recon with Javascript - Part1
    • DAV Methods and Old Features
    • API Security Notes
  • OSEP Preperation Notes
    • OSEP Journey Begin!
    • Basics and More
    • Payload Types (Staged vs. Non-Staged)
    • File Smuggling with HTML & JS
    • VBA Basics
    • Basic Phishing Macro Creation Tricks
  • Somethings and Past
    • HackTheBox Lab – Invite Code Write-Up
    • OSCP Yolculuğum
    • VulnHub – SkyTower CTF Walkthrough
    • Markdown Syntax
    • Web Uygulama Güvenliği Ve Güvenli Kod Geliştirme LYK-2014 Notlarım
    • Yalnızca Eğlenmek İçin
Powered by GitBook
On this page

Was this helpful?

  1. Random Research Area
  2. Malware Analysis & Development

Malware Development

These are the voyages of a security enthusiast. Its continuing mission: to explore strange new knowledge. To seek out new ideas and new technics. To boldly go where no one has gone before!

PreviousMalware Analysis & DevelopmentNext3rd Party Recon with Javascript - Part1

Last updated 2 years ago

Was this helpful?

How can you understand the movements of malware? The answer is so simple. It would help if you learned how you could develop malware. You should think like an attacker! I'm comparing malware analysis with penetration testing. So, if you know how to develop an application in the target technology, you can analyze the behavior of a system, and you can find vulnerabilities in a system.

Every time I start to learn or test new technology, I'm practicing to build a basic application in the target language.

Useful knowledge might be found inside the below links about malware development.

A mix of everything: :)

Step by step and technic by technic, Cocomelonc is giving wonderful details about malware development and analysis in his blog with a good perspective.

0xpat's first post to track others:

Online training:

Both might be more specific than the above but I like them:

​ Also, I found a continuing playlist on YouTube made by ActiveXsploit that hasn't finished yet.

These are my resources to understand malware development. Also, I'm trying to cosubstrate with Red Teaming technics besides working only on Malware development. Because; malware is a coded version of the Red Teaming technics in order from my perspective. So, I'll make a rich list for Red Teaming later.

-EOF

Thanks to 's tweet I found a valuable malware development blog series in .

@aas_s3curity
0xpat's blog
GitHub - rootkit-io/awesome-malware-development: Organized list of my malware development resourcesGitHub
cocomelonccocomelonc
Logo
Malware development part 1 - basics
Malware Development Course 2020: From Zero to HeroUdemy
Ethical Hacking Foundations: Malware Development in WindowsUdemy
RED TEAM Operator: Malware Development Essentials CourseSEKTOR7 Institute
Offensive Driver DevelopmentZero-Point Security
Logo
C2 Development in C#Zero-Point Security
Logo
Logo
Logo
Logo
Logo