👋 Welcome to Our Community!

Connect, share insights, and earn credits while following our community guidelines.
Advertising and Pakistan-related data are strictly prohibited and we do not host a trading platform.
Upgrade your profile for unrestricted access and explore the "Help" section for rules and tips.

From Cracking, Stealer logs, ULP, Database, Clouds, Mail Access, Spamming, Carding, and Hacking — we've got it all.
Everything you need, all in one place.

Beginner to Malware Development

Ey3

Member
Joined
Jun 6, 2024
Messages
50
Reaction score
13
Points
8
X Coines
198
Crypto
0
You must be registered for see images
1)LEARN C this pretty much rosseta stone of computer programming languages from javascript to perl are built on top of C.

>
You must be registered for see medias
>
>

2)Reverse Engineering is next part of process
> begin
The Nightmare course is our main binary exploitation track, but the first 4 chapters are about learning the tools and RE. Work throught the first 4 sections until you get to the overflows section, then come on back to RE.
>work back through h0mbre C using GDB and Ghidra for every assignment. This takes a while, but is a really good way to get familar with how to do Linux reverse engineering and become comfortable with disassembly:

3)MALWARE RE once you have become apt in reverse engineering you can start reverse engineering malware
>
>
4)Build your own malware and exploits
 

63,340
Threads
105,155
Messages
3,931
Members
Latest member
Back
Top