Not specific to this video but you have helped me a lot. I've gotten burnt out many times trying to make big projects. just sitting down and watching a video for a break or in the background while im thinking really helps
I'm currently working through maldev academy and A) its awesome and B) these videos really help with learning the subtle things so thank you for doing them
Not paying that much for content that is freely available on UA-cam and google. The only thing they've done is curated all the topics together so it's easy to figure out what to learn next, but that doesn't amount to $500. Hoping the entire course will be leaked on PirateBay at some point.
@@The_Ticket44 i ended up having to purchase sektor7's priv esc, persistence, and defense evasion courses to get a full understanding of what malware can do. i strongly advise anyone to just pay for the cheapest option for maldev academy and move on.
Don't worry if you don't understand it because 1) John is not explaining anything hes just rambling and 2) Even if this was a tutorial, John is not really a teacher (Nothing against John hes just not good at explaining and simplifying things)
Can C or C# be used for malware development? Since C can be used for embedded systems. You'd think it'd be possible to write some kind of malware, right?
Every piece of malware code getting on the internet is being added to the antivirus databases, so it's not a good practice to rely on things like maldev.
It doesn't seem to be for master malware writers. Just for beginners to learn. Also, don't many databases just relay on hash values and signatures? Change 1 bit, you change the hash, change a few aspects of its functionality (which may or may not work), it won't be flagged by its signature.
@@theErockonian But actually good antiviruses are much more sophisticated. I would take a more legit snippet, lets say i want to make a ransomware, then i would search for snippets to quickly encrypt large amount of data.
@@kidnamedfinger.productions Not to be mean, but this is a confusing response that doesn't address any of my points. It's a training academy, so obviously you can't rely on it. That's like saying: "I did the tryhackme boxes and now I'm ready to hack microsoft". It's for learning, not real world malware development. Also, can you give specifics on how AV techniques are more sophisticated? Like behavioral analysis? And yes, I am aware you can search for malware snippets, but that has nothing to do with what we are talking about lol.
Crypto note - don't use standard RNG for cryptographic purposes. :) Also, it would be interesting to see how the various Defenders and other products react to various "obvious examples". Good stuff - I hope I can convince my CofC to let me use Maldev Academy :)
does anyone have a tutorial on how to complete the rest of the file? im brand spankin to c, where ive only coded in python and powershell. any help would be great.
john, can you please drop a link to at least your main function, i have a maldev subscription, and just learned some c, and learned process hollowing. im trying to launch an instance of svchost.exe (which idk if thats what you used) with blockdll policy and it just errors out. im really confused with all this c, anything helps!
This is the way AI will be working with code in the future. Instead of generating code it will use existing code. Put it all together like some script kiddie and off to the races.
Not specific to this video but you have helped me a lot. I've gotten burnt out many times trying to make big projects. just sitting down and watching a video for a break or in the background while im thinking really helps
he always gets me stoked about cybersecurity. esp when I am burnt out or have my attention elsewhere
Fantastic job done this "website container". Amazing.
I'm currently working through maldev academy and A) its awesome and B) these videos really help with learning the subtle things so thank you for doing them
Highly recommend MalDev Academy
We need mooooooooore malware development.
Great video, really cool way to rapidly develop poc code etc
What if the detection service providers uses this feature as well to write the signature/detections for it 🤔
If he can write malware as well as he screams he's definitely the best at it.
Legit never reached for the volume button faster.
I can listen to music on the volume i'm at rn and it's smooth, but playing john's video I have to lower the video's volume down to 25%..@@lerrz8969
i just spend $499 on the lifetime course. the code search site is about an extra $180 on top of that, and its a separate logon.
really? And didn't you use the discount code? :)
@@itzlue3965 i bought it before this video came out, i suspect the new cost would have been $449.
Not paying that much for content that is freely available on UA-cam and google. The only thing they've done is curated all the topics together so it's easy to figure out what to learn next, but that doesn't amount to $500. Hoping the entire course will be leaked on PirateBay at some point.
This was a month ago, what's your opinion on it?
@@The_Ticket44 i ended up having to purchase sektor7's priv esc, persistence, and defense evasion courses to get a full understanding of what malware can do. i strongly advise anyone to just pay for the cheapest option for maldev academy and move on.
More mal dev content please 😍🔥
Me not understanding any of this makes me feel like I'm sooo far away from this knowledge :)
Don't worry bro, with time and effort you'll get stronger for sure 🦾
Don't worry if you don't understand it because 1) John is not explaining anything hes just rambling and 2) Even if this was a tutorial, John is not really a teacher
(Nothing against John hes just not good at explaining and simplifying things)
the way I don't understand C/C++ code but enjoying the video.
this is the worst comment
thanks, now I can be a real cyber criminal jippiee !
How is it signature and entropy-wise?
Can C or C# be used for malware development? Since C can be used for embedded systems. You'd think it'd be possible to write some kind of malware, right?
Every piece of malware code getting on the internet is being added to the antivirus databases, so it's not a good practice to rely on things like maldev.
There's also likely gonna be a lot of python garbage code from script kiddies
It doesn't seem to be for master malware writers. Just for beginners to learn. Also, don't many databases just relay on hash values and signatures? Change 1 bit, you change the hash, change a few aspects of its functionality (which may or may not work), it won't be flagged by its signature.
@@theErockonian But actually good antiviruses are much more sophisticated. I would take a more legit snippet, lets say i want to make a ransomware, then i would search for snippets to quickly encrypt large amount of data.
@@kidnamedfinger.productions Not to be mean, but this is a confusing response that doesn't address any of my points. It's a training academy, so obviously you can't rely on it. That's like saying: "I did the tryhackme boxes and now I'm ready to hack microsoft". It's for learning, not real world malware development. Also, can you give specifics on how AV techniques are more sophisticated? Like behavioral analysis? And yes, I am aware you can search for malware snippets, but that has nothing to do with what we are talking about lol.
Superuser has been coming in clutch lately tbh
You are the best Sir
Crypto note - don't use standard RNG for cryptographic purposes. :) Also, it would be interesting to see how the various Defenders and other products react to various "obvious examples". Good stuff - I hope I can convince my CofC to let me use Maldev Academy :)
Eyes closed, you sound like a nerdy Seth Rogen! Big fan!
Damn this is freaking great malware is so interesting
This has to be an alphabet company honey pot lol
I tend to avoid chatgpt because they're a language model so their info is dated.
good work dude
maldev doesnt allow me with a paid vpn.. no thanks 100%
John Hammond is my Hero
does anyone have a tutorial on how to complete the rest of the file? im brand spankin to c, where ive only coded in python and powershell. any help would be great.
john, can you please drop a link to at least your main function, i have a maldev subscription, and just learned some c, and learned process hollowing.
im trying to launch an instance of svchost.exe (which idk if thats what you used) with blockdll policy and it just errors out.
im really confused with all this c, anything helps!
Finally said educational purposes only
did it bypassed Defender ?
might want to blur your keyboard, too
Edit: keys pressed are not that interesting.
Love your videos, but I just realised what a monster you are at typing haha!
Is cpp necessary for cyber security
No, but it can help you understand what happens closer to bare metal, with pointers, memory management, and stuff
thanks Jon Computer
I might be naïve, but what is the legitimate reason to want to develop malware?
Yeah of course we need more malware developers... How much did they pay you to make this video? Must be a lot.
Never clicked a video this fast (LOL)
Script kiddie🤡
@@robertommmin5 Yeahh
@@robertommmin5 I wouldn't call script kiddie a person who develops their own malware
Never videoed a click this fast (LOL)
@@robertommmin5a
this is also advertisement. This guy seems only to do advertisement videos
He types with 2 fingers faster than me using my 10 😅
Is this an ad?
yes
Clearly
not bad for a 20min ad.
Maldev academy is blocked by Cloudfare for me for some reason :( Nothing helps
Use a vpn
NICE!😃👍
Be hacker but don't hack anybody 🤟
I call chatgpt Mr.GPT. The best teacher.
Cool, thanks for the video
Gah, Click baited again, I need to find a different tutorial
(this is a joke)
is it safe to assume most of these malwares will get caught by most modern AV's?
yes
No, malware with known signatures will get caught only.
@@data_eng_tutsonly the case for signature base AV
maldev academy's stuff evades modern av's, as long as you understand the entire chain.
Also under 20 min
This is the way AI will be working with code in the future. Instead of generating code it will use existing code. Put it all together like some script kiddie and off to the races.
John, you're not a hacker. Stop talking about something you don't know about.
0:58 ye bla bla bla. youre letting people to be a cyber criminal
u can say the same about metasploit tutorials
@@N3CRXSYS bro. his fudding the payload.
nasil ya? gercek mi?
Who is under 18 here?
Me 😅
Lessss gooo 🎉
Ok writing nothing
1st