- 46
- 20 980
KLAYTON ACADEMIC LABS
Uganda
Приєднався 25 кві 2020
Welcome to our channel dedicated to all things software! From programming tutorials to IT support tips and even malware development insights, we cover a wide range of topics for tech enthusiasts. Join us as we delve into the world of offensive security and red team tactics. Subscribe now to stay updated on our latest videos! #malware #ITsupport #programming #offensivesecurity #redteam.
MALWARE DEVELOPMENT IN C FULL COURSE PART 1 2025:ROADMAP TO MASTERY
🔐 **MALWARE DEVELOPMENT IN C: FULL COURSE PART 1 2025 - ROADMAP TO MASTERY!** 🚀
Welcome to the ultimate guide on MALWARE DEVELOPMENT! In this first part of our groundbreaking series, we dive deep into creating offensive tools using the C programming language. Uncover fundamental concepts of malware architecture, explore evasions and obfuscation techniques to outsmart detection systems, and lay a solid foundation for your cybersecurity journey. 🛡️ Whether you're a student, researcher, or aspiring developer, this course offers you the tools and knowledge to master the craft safely and ethically. Don’t forget to like, comment, and subscribe for upcoming lessons! #MalwareDevelopment #cprogramming
/SOCIAL NETWORKS
TWITTER ►► bit.ly/48prBTh
GITHUB ►►bit.ly/4finzhF
LINKEDIN ►► bit.ly/4fnYkut
/WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
Welcome to the ultimate guide on MALWARE DEVELOPMENT! In this first part of our groundbreaking series, we dive deep into creating offensive tools using the C programming language. Uncover fundamental concepts of malware architecture, explore evasions and obfuscation techniques to outsmart detection systems, and lay a solid foundation for your cybersecurity journey. 🛡️ Whether you're a student, researcher, or aspiring developer, this course offers you the tools and knowledge to master the craft safely and ethically. Don’t forget to like, comment, and subscribe for upcoming lessons! #MalwareDevelopment #cprogramming
/SOCIAL NETWORKS
TWITTER ►► bit.ly/48prBTh
GITHUB ►►bit.ly/4finzhF
LINKEDIN ►► bit.ly/4fnYkut
/WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
Переглядів: 206
Відео
Malware development in c/c++ part 3b: socket programming in c/c++
Переглядів 168Місяць тому
🚨 Unlocking the World of Malware Development in C/C ! 🚨 Are you ready to dive into the dark side of coding? In this eye-opening video, we unravel the malware essentials that every aspiring dev or cybersecurity enthusiast must know. From the basics of C/C coding to advanced techniques used in malicious software, we cover it all! 🤖🛠️ Learn crucial terminologies that shape the landscape of malware...
Malware development in c/c++ part 3: socket programming in c/c++
Переглядів 1812 місяці тому
🚨 Unlocking the World of Malware Development in C/C ! 🚨 Are you ready to dive into the dark side of coding? In this eye-opening video, we unravel the malware essentials that every aspiring dev or cybersecurity enthusiast must know. From the basics of C/C coding to advanced techniques used in malicious software, we cover it all! 🤖🛠️ Learn crucial terminologies that shape the landscape of malware...
Malware development in c/c++ part 2: essentials
Переглядів 6192 місяці тому
Malware development in c/c part 2: essentials
Malware development in c/c++ part 1: essentials
Переглядів 1 тис.2 місяці тому
Malware development in c/c part 1: essentials
Python malware development:creating a reverseShell part 2
Переглядів 1282 місяці тому
Python malware development:creating a reverseShell part 2
Python malware development: creating a reverseShell part 1
Переглядів 1282 місяці тому
Python malware development: creating a reverseShell part 1
A-Z of malware development part 22:networking for professionals_wi fi hacking part 3
Переглядів 1895 місяців тому
A-Z of malware development part 22:networking for professionals_wi fi hacking part 3
A-Z of malware development part 21:networking for professionals_wi fi hacking part 2
Переглядів 645 місяців тому
A-Z of malware development part 21:networking for professionals_wi fi hacking part 2
A-Z of malware development part 20:networking for professionals_wi fi hacking
Переглядів 935 місяців тому
A-Z of malware development part 20:networking for professionals_wi fi hacking
A-Z of malware development part 19 :networking for professionals_creating _iptables_rules
Переглядів 825 місяців тому
A-Z of malware development part 19 :networking for professionals_creating _iptables_rules
A-Z of malware development part 18 :networking for professionals_iptables
Переглядів 875 місяців тому
A-Z of malware development part 18 :networking for professionals_iptables
A-Z of malware development part full course part 2
Переглядів 1655 місяців тому
A-Z of malware development part full course part 2
A-Z of malware development part full course part 1
Переглядів 1,8 тис.5 місяців тому
A-Z of malware development part full course part 1
A-Z of malware development part 17 :networking for professionals_intro_to_firewalls
Переглядів 375 місяців тому
A-Z of malware development part 17 :networking for professionals_intro_to_firewalls
A-Z of malware development part 16 :networking for professionals_wireshark_following_streams
Переглядів 315 місяців тому
A-Z of malware development part 16 :networking for professionals_wireshark_following_streams
A-Z of malware development part 15 :networking for professionals_iwireshark_filters
Переглядів 365 місяців тому
A-Z of malware development part 15 :networking for professionals_iwireshark_filters
A-Z of malware development part 14 :networking for professionals_intro_to_wireshark
Переглядів 1316 місяців тому
A-Z of malware development part 14 :networking for professionals_intro_to_wireshark
A-Z of malware development part 13:networking for professionals_tcpdum_commands
Переглядів 406 місяців тому
A-Z of malware development part 13:networking for professionals_tcpdum_commands
A-Z of malware development part 12:networking for professionals_tcpdump
Переглядів 1426 місяців тому
A-Z of malware development part 12:networking for professionals_tcpdump
A-Z of malware development part 11:networking for professionals_Network analysis_introduction
Переглядів 996 місяців тому
A-Z of malware development part 11:networking for professionals_Network analysis_introduction
A-Z of malware development part 10:networking for professionals_Network analysis_introduction
Переглядів 896 місяців тому
A-Z of malware development part 10:networking for professionals_Network analysis_introduction
A-Z of malware development part 9:networking for professionals_OSI_MODEL
Переглядів 846 місяців тому
A-Z of malware development part 9:networking for professionals_OSI_MODEL
A-Z of malware development part 8:networking for professionals_Network topologies
Переглядів 756 місяців тому
A-Z of malware development part 8:networking for professionals_Network topologies
A-Z of malware development part 7:networking for professionals_TCP_ threeway_handshake
Переглядів 3716 місяців тому
A-Z of malware development part 7:networking for professionals_TCP_ threeway_handshake
A-Z of malware development part 6:networking for professionals_TCP protocal
Переглядів 956 місяців тому
A-Z of malware development part 6:networking for professionals_TCP protocal
A-Z of malware development part 5: networking for professionals_IP header
Переглядів 726 місяців тому
A-Z of malware development part 5: networking for professionals_IP header
A-Z of malware development part 4:networking for professionals_TCP/IP protocals
Переглядів 896 місяців тому
A-Z of malware development part 4:networking for professionals_TCP/IP protocals
A-Z of malware development part 3:networking for professionals_Ports
Переглядів 966 місяців тому
A-Z of malware development part 3:networking for professionals_Ports
A-Z of malware development part 2: networking for professionals_DHCP and NAT
Переглядів 1266 місяців тому
A-Z of malware development part 2: networking for professionals_DHCP and NAT
To the CIA agent watching this, I promise im watching this for educational reasons
🤣🤣🤣🤣
Is one of the solutions to the malware problem is to stop using Windows/Linux
@@AnonymousAccount514 actually I don't think it can be a solution
@@AnonymousAccount514 the only solution is to promote awareness like the videos am creating so as to understand how malware is created and in return learn how to fight it
Hey, I followed your backdoor code but where did you develop and explain about the server?
@@RonHalfon no worries am updating everything and plz on first Jan am dropping a full course .sry for the delay so technical issues
what is name of the OS you are using?
it's linux ubuntu 22.4
A real heckER
@@Wakpinside haha
Sir please i want to be a malware developer.... How can i get started
@@SanchezLuto thnks 4 D qtn, first of all which platform do want to target
Is t windows,linux,android,scada, iot
What is your programming experience as of now
learn c, learn os design architecture
❤ continuation for the last video
@@JosiahAyogu actually I think part 2 had sound problems but still I apologise
@@JosiahAyogu am going to add more it's about 30hour series
Am curious o, why is your file disappearing
@@JosiahAyogu which file exactly plz
@@Abram_ITI think at the end of the video, the server file
@@JosiahAyogu let me check bro and am doing updates to every thing
@@JosiahAyogu so don't worry everything z going to be fine just have been fixing the studio setup
Am going to start doing lives once I finish setting up
4:48:48 pls why did you use #unsigned for the port number and instead of using " #char ?
doing very very great job bro thanks very much
@@vedpan-g9p welcome bro
Nice Playlist
Jesus who uses Light mode in 2024 ?
Me,
and it has no effect on code efficiency
@@Abram_IT monster
light mode is based bro
@@Abram_IT its okay Abram those who use dark mode have weak eyes and those who use light have strong eyes :)
audio too bad
sry am trying to fix that
Audio is too low can't hear what are you saying 😔
//HEY GUYS CHECK OUT MY CHEAP COURSES ON PATREON ►► bit.ly/4eX24TD MALWARE DEVELOPMENT OFFENSIVE TOOLS DEVELOPMENT RED TEAM OPERATIONS APT SIMULATIONS EDR EVASION
//HEY GUYS CHECK OUT MY CHEAP COURSES ON PATREON ►► bit.ly/4eX24TD MALWARE DEVELOPMENT OFFENSIVE TOOLS DEVELOPMENT RED TEAM OPERATIONS APT SIMULATIONS EDR EVASION
Very nice!!! Where a file this code?
@@jonhjonh3002 have uploaded now
Brother can you use dark theme for vs code, better for most of the people i think 😅
okay bro let mi do that
why are you whispering
Because am whispering🙃
if i dont whisper my drunk dad beats the shit out of me :/
So the FBI agent can't listen to what he's saying.
Thank You so much. On 1:00 you have a part of a nice list on the desktop BG, that could be a great study plan... What kind of list is this? Could you share it please?
(2 > 5) ? printf("Yes, that's true") : printf("No, that's false"); - the exercise you gave on 1:47:50
@Abram_IT man, you are a wise professional, but you have to stay positive when you teach to be a good teacher. No mutter what shit is happening to you - if you feel not positive enough to give a lesson - it is better to teach it on another day. I know this stuff, I was a teacher and I thought a lot of people. Don't waste my energy on your whining and you will get your subscribers multiple times faster.
would this work on a mac?
@@AnonymousAccount514 nope
Bro can you put time stamps. It would be really helpful.
okay bro am going to this time
@@Abram_IT They can be done automatically. I don't need them usually, I watch the whole vid
@@j18040-u that is great to knw
I love this video, ❤ Can you do another using Python this time
Thank you bro for that great video❤
Doing God's work 🙏🏻
Bro make more series for malware devlopment
okay am making more until the end as i said in the raod map
thanks man
welcome
Wow thanks for this great information
wow thanks bro
thanks man
welcome my friend and thnks for watching
Great content bro!
easy bro
thanks man
welcom bro
thanks , keep it up
thank you man
thanks man, you're doing great.
welcome my friend
thank youu
welcome my friend
Thank you
is this free?
ofcourse bro it's free
Hey bro! I saw ur post in hacker forums, i’ll start to rush into ur videos! You’re doing a great job to the comunnity! All the best to you!
Can u provide link of the post?
eisy bro thnks to for watching
check 0x00sec
oh my god , this is full party for me , thanks brother uploading this videos , i so glad 🥰🥰😍❤🥳
welcome dear also watchout for the next remaining five parts each 5-7 hours long because am going to teach everything about malware , i will give a final project where we are gong to create an advanced malware together and then 3 real world scenarios using the laboratory am working on now
Thanks brother 🤓♥♥@@Abram_IT
welcome bro thanks for subscribing too
Guys am waiting for all your comments, areas to improve what to add in the next video but just am dropping it in two days from now
Really excited to dive into this, just waiting for some free time.
@@funniestusernameever welcome dear and we shall try our best to edutain you
@@Abram_IT Can you develop an exe payload generated by rats to make it bypass the run time and execution time window OS protection.
Naturally,you think my perspective is darkful but i illustrate my passion and enthusiasm for this filed if you interested i wants a training but comprehensive what do you think about this offer ?
i love to provide my expertise to you dear and am ready to corporate.
Nice and big thanks how am i contact you about the training ?
lhabert95@gmail.com
because we are in this together, make some suggestions how we can do it either, zoom, youtube live, chatroom style.
@@Rzayev65 best would be zoom style class r
Additionally,i want to be a spyware developer especially on ios/macos how i can be ? it is for gain the highest bug bounties prizes award and i really wants to publish cve include my name ?
Thanks for a second question dear and that is my plan to make a long video about spyware so just wait for it, it's coming and don't forget to tell your friends about us
Hi dear Author you really impressed me about how to get into and deep dive to the malware dev side but,can you give me more detailed info how the government nation/state based apt group hackers find 0 click exploit and turn it into spyware
Thanks dear for the question, let me make a video about that very soon
Nice bro
Welcome and that gives energy
Dope brother.. game on
thanks brother