What I also found very good was its video editing along with its narrative. I can imagine how much work it took. Congratulations. If one day you can share the tools you use to edit your videos... awesome!
Hello Mr. FBI agent, I am purely watching this video for educational purposes and do not have any malicious or ill intent. I am simply here to learn about a subject that has interested me for a while. Thanks for reading.
Hello Mr. FBI agent, I am purely watching this video for malicious purposes and absolutely have ill intentions. I am here to learn new ways to illegally get access to computers and servers. Thanks for reading.
Holy shit dude, I recently got laterally promoted from SOC Lead Analyst to Digital Forensics/Malware analyst at my job and this video is a fucking God send. Learned so much already and can't wait to get back to work this weekend to try some new things out. Thanks a lot man, earned a new sub today!
Please please do more of these mal dev stuff I really loved the way you present it No waste of time just pure information And it's not boring i can watch this for hours and never get bored ❤❤
@uMonstr0 it is way easier to crack, and also alot more easy to detect and know that its malware, because pyinstaller always leaves strings of itself in the exes
I am eagerly waiting for the next part to drop, please make it a series because I understood every single thing that I had doubts about. Thank you so much. You gained a lifelong follower :)
First thing, if you are in a classroom, that isn't run by a hacker, with 20+ years experience, convictions, badges of honour... leave. Second thing, nothing beats experience, like experience. Start out with Debian, System76 Pop! OS, work up to Cubes OS. Learn Metasploit, dig deep on OS API's (windows is a start, your going to want to jump to BSD next, Linux simultaneously), learn about CHROOT Jails. Permissions, ATL/STL/MFC and Win Blows... your teacher, probably has more hackers, watching what he's doing, messing with him for jokes, than he does hours in the day. Learn the stack. C/C++ is insecure by default (has no TYPE SAFETY), number 1 exploitable.
The way you explain is really great, I really liked your humor and the lyrics (since I have trouble understanding English). We would have really liked it if you made us a playlist brother.
Nice video, reminds me of creating one for fun back in the MSN Messenger days on WinXP (in 2008 or so). It was pretty harmless and just closed MSN chat windows if any were opened by the user but didn't close if someone else started a conversation. Random but was a fun little project, wish I still had the source code but oh well. Never shared it either, except tested it with my friend
I really like your approach of explaining things. Keep it simple while digging deep. Thanks alot. It made Process Injection really clear for me. Looking forward to watch more of your stuff
man great and fun content. Ive been in the comp sci field since 2017 and i havent mastered the "junior level". Im doing SE right now and there is a thought back in my head, that one day i could try the path in IT-SEC. This video is a great introduction, thank you! Imagine im in the .NET field but no one told me to play around a bit with the Windows API.
Great piece of information with easily understandable illustrations. Much much appreciation to you. Please do more videos like this on all types of malware variants.
Incredible content. Very informative and entertaining. More content like this and you could easily be one of the top infosec content creators on UA-cam, period.
Great video! You seem very knowledgeable and have a good way of presenting the information without boring the audience :) To all the budding hackers/reverse engineers etc.: writing malware is a fun exercise, but don't forget the other parts of being a professional, which is avoiding detection and getting the user to execute your malware ;)
This video is both entertaining and informative. Thanks, not a video editor but the cuts from memes back to info are a tad quick. Good stuff either way!!!!
Such a comprehensive video done at a young age. I remembered one time I tried to use win32 API to do some hacking but eventually give up on the complexity of the documentation itself 😅. Simple thing like HANDLE is really complex for me, whereas it is actually an unsigned long if not mistaken. In the end, I was able to do some basic thing with windows API such as writing to a file and create a window. And that is thanks to AI.
This was awesome. The explanation is just superb, I am learning reverse engineering and such explanation some points goes into my notebook, thanks Bro.
Bro, the way you present and explain each parameter is gold, keep creating these valuable content I subscribed I'm a newbie so I'll keep watching this to fully understand
Great video! Thanks for breaking down malware development. For a beginner like me, should I start learning Python or C++ for malware development ? Appreciate your insights!
while watching this video i noted that he did not obfuscate the shell-code. In a real scenario you will need to obfuscate it. Don't use a real encryption algorithm, since AV/EDR can detect if your program uses AES (yes, really). This is just for obfuscation, so something like hex decode > xor with 12 byte key is plenty
This is incredibly good content, entertaining,high quality and also the explanation is extremely easy understand!Hope to see more such videos soon!You earned a new sub:D
This was such a dam good video. I want to say a genuine thank you for taking the time to make it. You did an awesome job. I tip my hat to you my good sir.
Amazing Video! I cannot wait to start writing my own ones. I love does kinda deep dive stuff. It feels like I can learn much when programming malware! I hope you won't stop making these Videos. Thank you for your hard work :)
what an Explanation sir, loving your videos. Keep it up ♥ (One Request, please upload the videos quickly/soon, now it has been 3 months of this video and still waiting for the second part of this video, please make it quick)
really well made, but more casually interested rather than formally studying, it might of helped get a preliminary handle on it had there been a brief explanation of the objective/example scenario and steps, followed by running it in that scenario, after that the mechanics of the process would have better contextual foundations for the information to land on. it'd help the casual know nothings, like me, to gain more from it.
This is an amazing video. Now, I know malware is no magic, just some simple, very simple C code 👍🏻👍🏻 Also, how can we get process hacker? Just share the link in description. And can you tell more on how to get shell code from shellstorm or exploitdb and how to edit or change it?
Always wanted to know how malware works or even build one and this video just gave me detailed insight of the basics. Cant wait for more on this topic!
I, today, got a certification in cybersecurity and I have seen the video at night, while having my dinner. It's so interesting and I understood everything. Very well explained. Got a new sub - an probably a new (un)ethical hacker, lel. Just messing... Unless 👀 Keep on going, man!
Very cool. A lot of tutorials like this dont go into detail about the functions and their parameters. They usually say just call this and pass in this value and it works so proceed haha. I'm personally trying to understand injection better in particular because I want to find out if someone is injecting into an online game I'm making. Tired of having to make so many things server-side to prevent people from manipulating memory. So if I can detect it, just cause it to crash. At least it will stop the script kiddies 😁! But no match for someone who knows what they're doing really well. I assume there's kernel level injection, which sounds very difficult to prevent...
Need a vid on message box using Assembly. I love this video please make more like this. I m a CS student and have an interest in cyber security. Please make more vids like this
With a background in software engineering, I'm currently persuing cybersecurity. Just novice stuff with sec+, net+, az900, splunk and home labs. I'm hoping to land a role that will put my engineering skills to work but feel utterly overwhelmed by it all as I haven't yet figured out where exactly i fit. This seems right up my alley! What are some of the roles I can look to get Into and where can I find such gigs.. Say reverse engineering gigs etc? Thanks for the video, subbed, hoping to see more.
You guys have to appreciate my great taste of memes and sense of humor 🤣
🤣Very important good approach to putting humor into learning
yes! made this unskippable
we didnt, thank you for your service
What I also found very good was its video editing along with its narrative. I can imagine how much work it took. Congratulations. If one day you can share the tools you use to edit your videos... awesome!
How did you learn all of this and how can one reach your level
Hello Mr. FBI agent, I am purely watching this video for educational purposes and do not have any malicious or ill intent. I am simply here to learn about a subject that has interested me for a while. Thanks for reading.
I'm with you on this
Hello Mr. FBI agent, I am purely watching this video for malicious purposes and absolutely have ill intentions. I am here to learn new ways to illegally get access to computers and servers. Thanks for reading.
@@blaze4lifedog greetings from the FBI! We would like to hire you for the totally not evil best interests of us.....I mean the citizens of America!
Excuse me mr,officer.
I’m gonna do this in Minecraft
Ingame
Holy shit dude, I recently got laterally promoted from SOC Lead Analyst to Digital Forensics/Malware analyst at my job and this video is a fucking God send. Learned so much already and can't wait to get back to work this weekend to try some new things out. Thanks a lot man, earned a new sub today!
How long were you SOC Analyst
Eros451p, similar situation on my end as well.
An SOC Lead Analyst who does not know basic concepts like the ones in this video and gets promoted? What a crap business do u work for lol
@@karestonia9124 A good org that knows training employees is the best way to retain them (;
@@karestonia9124 as rude as this sounds i cnat imagine a soc lead not knowing basic malware techniques like wtf..
Please please do more of these mal dev stuff
I really loved the way you present it
No waste of time just pure information
And it's not boring i can watch this for hours and never get bored ❤❤
As someone who studies computer engineering AND is broke, your content is a god send. Please, keep it up 🙏🙏
Thank You. I appreciate that
props to this guy for not being a skid and teaching people how to make malwares in python or just letting people copy from pastebin
Appreciate your words, bro. Thanks 👍
I’m a Java dev not even sure how I got here but it’s interesting 😂 might play around with the windows api after watching this it seems useful
@uMonstr0 it is way easier to crack, and also alot more easy to detect and know that its malware, because pyinstaller always leaves strings of itself in the exes
@@worlddddddddddd moreover you don't have direct access to system apis
I am eagerly waiting for the next part to drop, please make it a series because I understood every single thing that I had doubts about. Thank you so much. You gained a lifelong follower :)
I was like “This is awesome, let’s got to the next part” and then I cried a little. But still man good job, everything was really well explained.
The fluidity and the amount of knowledge delivered casually is just mind blowing ! Thanks mate. Please continue uploading
Excellent video. I’m a cyber security student and I feel like this video is more useful than most of the stuff I have learned in my degree.
First thing, if you are in a classroom, that isn't run by a hacker, with 20+ years experience, convictions, badges of honour... leave.
Second thing, nothing beats experience, like experience. Start out with Debian, System76 Pop! OS, work up to Cubes OS. Learn Metasploit, dig deep on OS API's (windows is a start, your going to want to jump to BSD next, Linux simultaneously), learn about CHROOT Jails. Permissions, ATL/STL/MFC and Win Blows... your teacher, probably has more hackers, watching what he's doing, messing with him for jokes, than he does hours in the day. Learn the stack. C/C++ is insecure by default (has no TYPE SAFETY), number 1 exploitable.
I've been trying to learn this for A LOT of time, and this helped a lot while learning, I really thank you!
I abosolutely love the way presentation. Memes, jokes, acts and information.
Thank you ❤️
thanks to your video im now in prison
Don't worry, bro, I'll talk to scofield and we'll get you out of there.
😅
😂😅
Next challenge: Hack your way out of prison. (Hint: social engineering) 😜
Not available
He is captain cool now@@LeetCipher
This video was incredibly detailed and entertaining. I learned a lot about how a malware works!
Great vid & way more better than paid courses ...Thanks for the animation & hard working bro . can't for part two.
Glad you enjoyed it. Thanks for watching ❤️
The way you explain is really great, I really liked your humor and the lyrics (since I have trouble understanding English). We would have really liked it if you made us a playlist brother.
i like your way of teaching and your sense of humor
احمد ياسر هل انت هاكر؟
@@shadimoussa-e4d why
Masterfully explained. You explained all the essential areas so that anyone can understand without making it too long and boring. Instant sub.
This is the best educational C video I've ever seen
Appreciate that. Thank you.
Nice video, reminds me of creating one for fun back in the MSN Messenger days on WinXP (in 2008 or so). It was pretty harmless and just closed MSN chat windows if any were opened by the user but didn't close if someone else started a conversation. Random but was a fun little project, wish I still had the source code but oh well. Never shared it either, except tested it with my friend
I really like your approach of explaining things. Keep it simple while digging deep. Thanks alot. It made Process Injection really clear for me. Looking forward to watch more of your stuff
man great and fun content. Ive been in the comp sci field since 2017 and i havent mastered the "junior level". Im doing SE right now and there is a thought back in my head, that one day i could try the path in IT-SEC. This video is a great introduction, thank you! Imagine im in the .NET field but no one told me to play around a bit with the Windows API.
Great piece of information with easily understandable illustrations. Much much appreciation to you. Please do more videos like this on all types of malware variants.
Whowww! I can't remember the last time I spent 30m watching a single youtube video. I learned more today than all week! Congratulations!
Thanks for the video. I was interested in reverse engineering and was learning C . Now that i see how it is useful makes me wanna learn more.
Incredible content. Very informative and entertaining. More content like this and you could easily be one of the top infosec content creators on UA-cam, period.
this is lowkey the best tutorial i have seen
Man Sed deserves a rise since the video almost got 100K views, thanks for sharing this content too
ur way of teaching and the presentation are incredible. thanks for this
You broke these concepts down so well with your explanations and illustrations.
One of my favourite channels still. Upload more frequently my guy❤️
This is the real gem !!, loved it, i hope you stay regular on uploading this series..
For sure. Thanks for watching 👍
❤❤❤ bro you are the only person i understand how maldev work i hope to explain more for free
Great video! You seem very knowledgeable and have a good way of presenting the information without boring the audience :)
To all the budding hackers/reverse engineers etc.: writing malware is a fun exercise, but don't forget the other parts of being a professional, which is avoiding detection and getting the user to execute your malware ;)
Finally I found a tutorial that fully explains everything, ON UA-cam.
At least before I die lol
If i have teaching company i will hire you you explained this simply and effectively even beginners can understand I think
Keep it up please! we need more videos of malware development ASAP!.
Certainly.
We want more content like this plz
This video is both entertaining and informative. Thanks, not a video editor but the cuts from memes back to info are a tad quick.
Good stuff either way!!!!
Such a comprehensive video done at a young age.
I remembered one time I tried to use win32 API to do some hacking but eventually give up on the complexity of the documentation itself 😅.
Simple thing like HANDLE is really complex for me, whereas it is actually an unsigned long if not mistaken.
In the end, I was able to do some basic thing with windows API such as writing to a file and create a window.
And that is thanks to AI.
This was awesome. The explanation is just superb, I am learning reverse engineering and such explanation some points goes into my notebook, thanks Bro.
Bro, the way you present and explain each parameter is gold, keep creating these valuable content I subscribed I'm a newbie so I'll keep watching this to fully understand
really interesting stuff, I didn't know you can inject code like this, that's pretty cool
Thanks for sharing. No one teach these things . Especially on UA-cam
amazing video good editing and not boring at all can make me learn easily
This actually taught me a ton and was very easy to follow along. Great vid.
Great video! Thanks for breaking down malware development. For a beginner like me, should I start learning Python or C++ for malware development ? Appreciate your insights!
Start with C programming fundamentals. It will help you understand everything at a low level.
Please make more, this Video was so great at explaning an already complex topic
a young confident genius, happy to find your channel. Keep it coming bro
Thanks for teaching us os , microprocessor, c and computer architecture ❤
My guy you are killing it! keep up the good work
while watching this video i noted that he did not obfuscate the shell-code. In a real scenario you will need to obfuscate it. Don't use a real encryption algorithm, since AV/EDR can detect if your program uses AES (yes, really). This is just for obfuscation, so something like hex decode > xor with 12 byte key is plenty
Please keep uploading some videos! This is funny and educational at the same time!
Awesome vid mate keep up the good work!
I always explained a struct like they are a Cookie cutter, so and u put it over a part of memory
This is incredibly good content, entertaining,high quality and also the explanation is extremely easy understand!Hope to see more such videos soon!You earned a new sub:D
This was such a dam good video. I want to say a genuine thank you for taking the time to make it. You did an awesome job. I tip my hat to you my good sir.
Amazing Video! I cannot wait to start writing my own ones. I love does kinda deep dive stuff. It feels like I can learn much when programming malware! I hope you won't stop making these Videos. Thank you for your hard work :)
this is insanely well made. thanks for the vid
Much appreciated 👍
Thanks bro.. looking forward for the next video
what an Explanation sir, loving your videos. Keep it up ♥
(One Request, please upload the videos quickly/soon, now it has been 3 months of this video and still waiting for the second part of this video, please make it quick)
really well made, but more casually interested rather than formally studying, it might of helped get a preliminary handle on it had there been a brief explanation of the objective/example scenario and steps, followed by running it in that scenario, after that the mechanics of the process would have better contextual foundations for the information to land on. it'd help the casual know nothings, like me, to gain more from it.
Loved this video thankyou please make a whole series ❤
Absolutely. Thanks for watching ❤️
Thanks by this video I learned that I'm shit at programming and I know nothing about assembly
Love the way you teach...keep posting videos on this topic❤
Keep it up, and guarantee you that you will have millions of subscribers over time. You are really good at this. Thanks
thanks, trying this out on my school's library computers tmrw
i'm grateful that you shared so much valuable info. i'm new to this and genuinely thankful
This is an amazing video. Now, I know malware is no magic, just some simple, very simple C code 👍🏻👍🏻
Also, how can we get process hacker? Just share the link in description.
And can you tell more on how to get shell code from shellstorm or exploitdb and how to edit or change it?
Bout to learn all this for educational purposes 🙏🏼
Great video love to watch ❤❤
Waiting for the next part please make a full series on it 🙌🙌
Great presentation, and video style. Much appreciated and very simplified.
Perfect video: full of informations, explained well, down-to-earth
Always wanted to know how malware works or even build one and this video just gave me detailed insight of the basics. Cant wait for more on this topic!
Bro high quality content here. Apreciate it 👌
I, today, got a certification in cybersecurity and I have seen the video at night, while having my dinner. It's so interesting and I understood everything. Very well explained. Got a new sub - an probably a new (un)ethical hacker, lel. Just messing... Unless 👀
Keep on going, man!
one maldev youtuber to another, this video is super well done. props 😁
Looking forward to the asm shellcode vid!!
PLEAAAASE continue making these types of videos!!!
excited to see the DLL video! great work and dammit SETH!!
Best Maldev video ever for starters.
Thanks for the great video, man! Please do more.
it's much easier and direct to create a malware than to code a larger-scale project
Basically watched this so that I won't fail my cybersecurity class requirement.
Wow! Great quality! subscribed immediately!
love the way you explain everything, looking forward inj on dll too :D
Very cool. A lot of tutorials like this dont go into detail about the functions and their parameters. They usually say just call this and pass in this value and it works so proceed haha. I'm personally trying to understand injection better in particular because I want to find out if someone is injecting into an online game I'm making. Tired of having to make so many things server-side to prevent people from manipulating memory. So if I can detect it, just cause it to crash. At least it will stop the script kiddies 😁! But no match for someone who knows what they're doing really well. I assume there's kernel level injection, which sounds very difficult to prevent...
Anything from ntdll to syscalls can be really challenging to detect if used with good obfuscation techniques.
This is insane. Can't wait for more !
Certainly :D
Im just watching to have fun. Education is DOPE
Damn you are underrated!
I will definitely take a deeper look into your channel
Please continue this series 🙏
Need a vid on message box using Assembly. I love this video please make more like this.
I m a CS student and have an interest in cyber security. Please make more vids like this
I was ready to see the next video than realized this is the only video lol
Amazing explanation. Keep making such videos!
very well done, nice explanation! we want more of this! when next chapter?
man where is the part 2 to this? just excellent content
With a background in software engineering, I'm currently persuing cybersecurity. Just novice stuff with sec+, net+, az900, splunk and home labs. I'm hoping to land a role that will put my engineering skills to work but feel utterly overwhelmed by it all as I haven't yet figured out where exactly i fit. This seems right up my alley! What are some of the roles I can look to get Into and where can I find such gigs.. Say reverse engineering gigs etc? Thanks for the video, subbed, hoping to see more.
You are a pretty damn good teacher
great job dude :) lots and lots of knowledge . nice touch with the animation...and the editing is not so bad either :) hehe ..keep up the good work..
you are really great, i don't know that learning is much funnier
Very nice explanation!