protectaccount
Advanced Member
- Joined
- December 27, 2025
- Messages
- 354
- Reaction score
- 272
- Points
- 63
- Thread Author
- #1
The course covers advanced cryptography techniques, protocol customization, process injection techniques, obfuscation, how to abuse internal Windows mechanisms to elevate privileges and escape defenses, programming command and control servers for exfiltration in multiple protocols, polymorphism and programming malware in multiple stages for each “nature” of malware, such as ransomware, worms, stealers, etc…
I would like to emphasize that this course is for more technical users who already have an idea about the topics covered, however, the main objective is to arouse a certain curiosity for research on the topics as well.
My microphone is also not one of the best, so if a class is poorly explained in a technical way or has very very very bad audio, please do not hesitate to comment so that I can re-record it, unfortunately I do not have much time for video editing, but the idea is to be technical and objective. I hope you enjoy the content, I will be doing my best.
To see this hidden content, you must reply and react with one of the following reactions :
Like