I've always had a huge admiration and love for Malware Analysis/RE. So, to better immerse myself, I've created a new series dedicated to learning it and sharing my journey. Check out the first episode here:
lots o' luv, homies <3
🎉 NEW VIDEO OUT! In it, we take a look at some anti-debugging techniques and implement self-deletion in our malware! A HUGE thank you to
@MalDevAcademy
for sponsoring this video.
SAVE 10% OFF your order with code “CROW10” for a limited time! ❤️
We're SO BACK 🤩In this video, we'll be looking at using the NTAPI and dissecting a program to get an intuition for what happens in the dank and musty parts of our computers. Thank you to
@MalDevAcademy
for sponsoring the video! Check it out here, homie <3
ey, you! 🫵😠 MALDEV 4 is out NOW! 😊 We'll *finally* take a look at syscalls and get a very brief introduction to some kernel internals and API Hooking.
anyways, time to run away and ret2sleep.
lots o' luv, nerds. hope you enjoy💖
I really wish I had access to something like
@MalDevAcademy
when I started my maldev journey. It removes so much hassle by providing such a linear path. Thank you so much to
@mrd0x
and
@NUL0x4C
for such an incredible platform. I would recommend it to anyone; beginner to advanced.
made it to 24! extremely grateful for all the friends made along the way, my incredible community, the infosec community, and every single one of you — for giving such a huge platform to arguably the least worthy/deserving to have it. i can't thank you enough.
here's to 25 ♥
i seriously can’t believe the growth that the youtube channel has been getting the last couple of days. it’s so sudden and overwhelming but i’m trying my best to keep up. thank you guys so much for subscribing and giving me the opportunity to teach/make videos for you all! ❤️🥲
📌 Thank you so much to
@MalDevAcademy
for sponsoring the video and continuing to be great friends of the channel!
You can get 10% OFF your purchase by using my code "CROW10" at checkout or by using the referral link here:
💖 Major shoutout to the incredible SquareX (
@getsquarex
) platform, founded by the LEGENDARY
@vivekramac
, for sponsoring the video!
You can use my referral code: to sign up for free and start using a REALLY COOL disposable browser/sandboxed platform.
i apologize in advance for my absence, life's been suffocating lately and there's still a lot of work left to do, but i'll try to get back to everyone asap. lots o' luv.
🐦⬛
first time using lower-level API (NTAPI/NTDLL) to do some shellcode injections! i'm going to experiment with some shellcode encryption, anti-static/dynamic techniques, and syscalls after this 🫡 cya!
find the source code (and more) here in my MALDEV repo:
@lolzareverser
@MalDevAcademy
i appreciate that so much <3 :D don't discount maldev academy tho, they definitely seem like an amazing resource, if you decide to sign up for it! i'd 100% recommend it, based on what I'm hearing in and around these dark alleys :P
@VirtualAllocEx
@RedTeamVillage_
@defcon
this is huge!! congratulations <33
(incredible blog post btw; 729 meterpreter sessions, that's DEDICATION LOL) can't wait to see the talk! : )
EVERYONE! My Official Discord server is up and running, huge thanks to
@lil_skeletonn
; couldn't have done it without you! Consider joining for
#IT
&
#cybersecurity
stuff! (+ some hidden secrets that you can uncover ;)):
@seclilc
dude… i still remember the good old caendra days, with the old school forums, and the AMAZING hera labs :’( we all expected eLearnSecurity to reach unfathomable heights in the cybersec scene, never imagined that it would’ve come to this tho. such a damn shame.
Learning super simple Win32 API calls from "theForger's Win32 API Tutorial." It's a really great read for beginners starting out with Win32 API; and it was created in 2003!
Link to PDF:
@fajj4r
thank you! technically, you don't HAVE to. STARTUPINFO is just a struct that holds some info about our process at creation time. when we do "STARTUPINFO si = {0};" we're just initializing all the members in this struct to 0. it's just good practice to do this to avoid problems :P
I might be late to this, but if any of you that might be reading would like to get a list of the Win32 APIs which are commonly used for malware development, the following site (created by
@mrd0x
) is insanely useful: