This is the code repository for Malware Development for Ethical Hackers, published by Packt.
Learn how to develop various types of malware to strengthen cybersecurity
This book covers the following exciting features:
- Familiarize yourself with the logic of real malware developers for cybersecurity
- Get to grips with the development of malware over the years using examples
- Understand the process of reconstructing APT attacks and their techniques
- Design methods to bypass security mechanisms for your red team scenarios
- Explore over 80 working examples of malware
- Get to grips with the close relationship between mathematics and modern malware
If you feel this book is for you, get your copy today!
All of the code is organized into folders. For example,
The code will look like the following:
pVirtualAlloc = GetProcAddress(GetModuleHandle("kernel32.dll"), "VirtualAlloc");
payload_mem = pVirtualAlloc(0, payload_len, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);
Following is what you need for this book: This book is for penetration testers, exploit developers, ethical hackers, red teamers, and offensive security researchers. Anyone interested in cybersecurity and ethical hacking will also find this book helpful. Familiarity with core ethical hacking and cybersecurity concepts will help you understand the topics discussed in this book more easily.
With the following software and hardware list you can run all code files present in the book (Chapter 1-16).
Chapter | Software required | OS required |
---|---|---|
1-16 | Mingw for Linux (GCC) | Kali Linux or Parrot Security OS |
1-16 | Oracle VirtualBox 7.0 | Linux or Windows |
1-16 | Microsoft Sysinternals Suite | Windows 7, Windows 10 |
1-16 | Process Hacker 2 | Windows 7, Windows 10 |
1-16 | x64dbg debugger | Windows 10 |
1-16 | PE-bear | Windows 7, Windows 10 |
Zhassulan Zhussupov is a professional who wears many hats: software developer, cybersecurity enthusiast, and mathematician. He has been developing products for law enforcement for over ten years. Professionally, Zhasulan shares his experience as a malware analyst and threat hunter at the MSSP Research Lab in Kazakhstan, a cybersecurity researcher at Websec B.V. in the Netherlands, and Cyber5W in the USA. He has also actively contributed to the Malpedia project. Zhassulan's literary achievements include writing the popular ebooks "MD MZ Malware Development" and "Malwild: Malware in the Wild," details of which can be found on his personal Github page. He is the author and co-author of numerous articles on cybersecurity blogs and has also spoken at various international conferences like Black Hat, DEFCON, BSides, Standoff, and many others. His love for his family is reflected in his role as a loving husband and caring father.
If you have already purchased a print or Kindle version of this book, you can get a DRM-free PDF version at no cost.
Simply click on the link to claim your free PDF.