- Joined
- Jan 8, 2019
- Messages
- 56,608
- Solutions
- 2
- Reputation
- 32
- Reaction score
- 100,454
- Points
- 2,313
- Credits
- 32,600
6 Years of Service
76%

Advanced Ransomware Development.
What you'll learn
The student will have the knowledge to develop advanced malware
The complete course has 14 theoretical and practical modules, starting with the introduction to Ransomware through to the complete development of the malware.
The course teaches theoretically and practically the development and operation of a Ransowmare
With the knowledge from this course, a student will have knowledge about how the most famous software currently available works.
Course content
10 sections • 55 lectures • 11h 9m total length
Requirements
You don't need knowledge, just a desire to learn.
Description
1. PRESENTATION
Here we will begin to teach the history of Ransomware, how it
emerged, first reports, groups, victims and much more.
2. Golang Logic
Finishing the theoretical knowledge, we move on to practice, we
start by learning the basics of the Golang language, variables,
functions, modules, channel, etc
3. File Manipulation
Now that we know the basics of Golang, let's dive in and learn
about file manipulation, reading, writing, listing, permissions, etc.
Since this is a Ransomware course, it's important to know about
files, don't you agree?
4. Hash
Here we will learn a little about Hash, md5, base64, sha256
among others.
5. Advanced encryption
In this module, we will start to make the content more difficult, the
student will learn in depth the basic and advanced knowledge
about symmetric and asymmetric cryptography, many used in
famous Ransomware, AES, RSA, CHACHA20.
6. Sandbox
Let's learn a little about sandbox environments for evasion
processes, creating several functions that we can detect if our
malware is running in test environments.
7. Running processes
In real ransomware, there is a list of running processes, this step
is important, the objective is to know which processes we must kill
for the malware to run.
8. Infosystem
In this module, we will talk about collecting information from our
“Targets”, hostname, username, addresses, permission, OS.9. About Logs
In this module, we will learn about logs stored on our targets and
how we can “eliminate” them, an important process in the attack
to erase traces.
10. README
Here we will learn how to create our famous warning banner, the
one that all ransomware has: “All your files have been encrypted,
do not attempt to recover them………”
Who this course is for:
Malware Developers, Red Team, Pentesters, Reverse Engineers.
https://www.udemy.com/course/course-malware-development
To see this hidden content, you must like this content.