Dragon Training Logo

MALWAREDEVELOPMENTWITHC++

Most developers write software to make systems run. In this course… we’ll write code that shows how systems can break and get compromised. Hi, my name is Hicham El Aaouad, and I’m the creator of Red Saiyan—a platform where I teach practical hacking in a way that’s clear, direct, and focused on how things actually work. Here’s what we cover in this course : First we begin by explaining How Windows works under the hood: processes, memory, and system calls. Then we move on into Understanding the PE file format, and how imports are resolved. also Navigating internal structures like the thread and Process environment blocks. and after that we move on into some C++ fundamentals. Then we get a little bit deeper— by manually build a shellcode, step by step, We’ll write a custom reverse shell using pure assembly — which teaches us how to manually parse a DLL’s export table to resolve function addresses without relying on imports. This gives us a clear understanding of what happens at every stage, from shellcode injection all the way to successful execution. Also, this course is designed to grow over time. It’s not static. As new techniques, tools, and ideas emerge, we will keep adding new content and updates — so you’ll always be learning something relevant. And I know that not everyone prefers video content. That’s why you’ll also find a written article version below each video — so you can follow along with the format that works best for you. See in the red saiyans universe.

> Initializing training sequence...

> Loading combat modules...

> Accessing power level database...

Course Chapters

INTRODUCTION

INTRODUCTION

DIFFICULTY

WINDOWS ARCHITECTURE

WINDOWS ARCHITECTURE

DIFFICULTY

PE FILE STRUCTURE

PE FILE STRUCTURE

DIFFICULTY

IAT ILT TABLE

IAT ILT TABLE

DIFFICULTY

C++ FOR HACKERS

C++ FOR HACKERS

DIFFICULTY

PEB TEB

PEB TEB

DIFFICULTY

CREATING SHELLCODE MANUALLY PART 1

CREATING SHELLCODE MANUALLY PART 1

DIFFICULTY

CREATING SHELLCODE MANUALLY PART 2

CREATING SHELLCODE MANUALLY PART 2

DIFFICULTY

CREATING SHELLCODE MANUALLY PART 3

CREATING SHELLCODE MANUALLY PART 3

DIFFICULTY

CREATING SHELLCODE MANUALLY PART 4

CREATING SHELLCODE MANUALLY PART 4

DIFFICULTY

Building the C++ version of the shell code

Building the C++ version of the shell code

DIFFICULTY

Malware dev | Lsass Dumper with C++

Malware dev | Lsass Dumper with C++

DIFFICULTY

Token impersonation with C++

Token impersonation with C++

DIFFICULTY
SYSTEM.ONLINE

What you’ll learn

  • INTRODUCTION
  • WINDOWS ARCHITECTURE
  • PE FILE STRUCTURE
  • IAT ILT TABLE
  • C++ FOR HACKERS
  • PEB TEB
  • CREATING SHELLCODE MANUALLY PART 1
  • CREATING SHELLCODE MANUALLY PART 2
  • CREATING SHELLCODE MANUALLY PART 3
  • CREATING SHELLCODE MANUALLY PART 4
  • Building the C++ version of the shell code
  • Malware dev | Lsass Dumper with C++
  • Token impersonation with C++

TOP WARRIORS

Join our leaderboard and prove your skills in real labs.