Welcome, Guest!

Let's emphasize the most important rules of this community: advertising is forbidden, data related to Pakistan is forbidden, and we do not and will not have a trading platform.

You can share your leaks and earn credits. To use the forum without restrictions, you need to upgrade your profile. Before creating new topics and posts, please read the possible errors and rules in the "Help" section.

Beginner to Malware Development

Ey3

Divine
Divine User
Community
LV
0
 
Joined
Jun 6, 2024
Messages
22
EvilCoin
227
Crypto
0
Points
86
You must be registered for see images
1)LEARN C this pretty much rosseta stone of computer programming languages from javascript to perl are built on top of C.

>
You must be registered for see medias
>
>

2)Reverse Engineering is next part of process
> begin
The Nightmare course is our main binary exploitation track, but the first 4 chapters are about learning the tools and RE. Work throught the first 4 sections until you get to the overflows section, then come on back to RE.
>work back through h0mbre C using GDB and Ghidra for every assignment. This takes a while, but is a really good way to get familar with how to do Linux reverse engineering and become comfortable with disassembly:

3)MALWARE RE once you have become apt in reverse engineering you can start reverse engineering malware
>
>
4)Build your own malware and exploits
 
Back
Top
AdBlock Detected

We get it, advertisements are annoying!

Sure, ad-blocking software does a great job at blocking ads, but it also blocks useful features of our website. For the best site experience please disable your AdBlocker.

I've Disabled AdBlock    No Thanks