MALWAREDEVELOPMENTWITHC++
Most developers write software to make systems run. In this course… we’ll write code that shows how systems can break and get compromised. Hi, my name is Hicham El Aaouad, and I’m the creator of Red Saiyan—a platform where I teach practical hacking in a way that’s clear, direct, and focused on how things actually work. Here’s what we cover in this course : First we begin by explaining How Windows works under the hood: processes, memory, and system calls. Then we move on into Understanding the PE file format, and how imports are resolved. also Navigating internal structures like the thread and Process environment blocks. and after that we move on into some C++ fundamentals. Then we get a little bit deeper— by manually build a shellcode, step by step, We’ll write a custom reverse shell using pure assembly — which teaches us how to manually parse a DLL’s export table to resolve function addresses without relying on imports. This gives us a clear understanding of what happens at every stage, from shellcode injection all the way to successful execution. Also, this course is designed to grow over time. It’s not static. As new techniques, tools, and ideas emerge, we will keep adding new content and updates — so you’ll always be learning something relevant. And I know that not everyone prefers video content. That’s why you’ll also find a written article version below each video — so you can follow along with the format that works best for you. See in the red saiyans universe.
> Initializing training sequence...
> Loading combat modules...
> Accessing power level database...
Course Chapters
INTRODUCTION
INTRODUCTION
WINDOWS ARCHITECTURE
WINDOWS ARCHITECTURE
PE FILE STRUCTURE
PE FILE STRUCTURE
IAT ILT TABLE
IAT ILT TABLE
C++ FOR HACKERS
C++ FOR HACKERS
PEB TEB
PEB TEB
CREATING SHELLCODE MANUALLY PART 1
CREATING SHELLCODE MANUALLY PART 1
CREATING SHELLCODE MANUALLY PART 2
CREATING SHELLCODE MANUALLY PART 2
CREATING SHELLCODE MANUALLY PART 3
CREATING SHELLCODE MANUALLY PART 3
CREATING SHELLCODE MANUALLY PART 4
CREATING SHELLCODE MANUALLY PART 4
Building the C++ version of the shell code
Building the C++ version of the shell code
Malware dev | Lsass Dumper with C++
Malware dev | Lsass Dumper with C++
Token impersonation with C++
Token impersonation with C++
What you’ll learn
- INTRODUCTION
- WINDOWS ARCHITECTURE
- PE FILE STRUCTURE
- IAT ILT TABLE
- C++ FOR HACKERS
- PEB TEB
- CREATING SHELLCODE MANUALLY PART 1
- CREATING SHELLCODE MANUALLY PART 2
- CREATING SHELLCODE MANUALLY PART 3
- CREATING SHELLCODE MANUALLY PART 4
- Building the C++ version of the shell code
- Malware dev | Lsass Dumper with C++
- Token impersonation with C++
TOP WARRIORS
Join our leaderboard and prove your skills in real labs.