Not specific to this video but you have helped me a lot. I've gotten burnt out many times trying to make big projects. just sitting down and watching a video for a break or in the background while im thinking really helps
Can C or C# be used for malware development? Since C can be used for embedded systems. You'd think it'd be possible to write some kind of malware, right?
I'm currently working through maldev academy and A) its awesome and B) these videos really help with learning the subtle things so thank you for doing them
Not paying that much for content that is freely available on RUclips and google. The only thing they've done is curated all the topics together so it's easy to figure out what to learn next, but that doesn't amount to $500. Hoping the entire course will be leaked on PirateBay at some point.
@@The_Ticket44 i ended up having to purchase sektor7's priv esc, persistence, and defense evasion courses to get a full understanding of what malware can do. i strongly advise anyone to just pay for the cheapest option for maldev academy and move on.
Don't worry if you don't understand it because 1) John is not explaining anything hes just rambling and 2) Even if this was a tutorial, John is not really a teacher (Nothing against John hes just not good at explaining and simplifying things)
john, can you please drop a link to at least your main function, i have a maldev subscription, and just learned some c, and learned process hollowing. im trying to launch an instance of svchost.exe (which idk if thats what you used) with blockdll policy and it just errors out. im really confused with all this c, anything helps!
Every piece of malware code getting on the internet is being added to the antivirus databases, so it's not a good practice to rely on things like maldev.
It doesn't seem to be for master malware writers. Just for beginners to learn. Also, don't many databases just relay on hash values and signatures? Change 1 bit, you change the hash, change a few aspects of its functionality (which may or may not work), it won't be flagged by its signature.
@@theErockonian But actually good antiviruses are much more sophisticated. I would take a more legit snippet, lets say i want to make a ransomware, then i would search for snippets to quickly encrypt large amount of data.
@@kidnamedfinger.productions Not to be mean, but this is a confusing response that doesn't address any of my points. It's a training academy, so obviously you can't rely on it. That's like saying: "I did the tryhackme boxes and now I'm ready to hack microsoft". It's for learning, not real world malware development. Also, can you give specifics on how AV techniques are more sophisticated? Like behavioral analysis? And yes, I am aware you can search for malware snippets, but that has nothing to do with what we are talking about lol.
does anyone have a tutorial on how to complete the rest of the file? im brand spankin to c, where ive only coded in python and powershell. any help would be great.
Crypto note - don't use standard RNG for cryptographic purposes. :) Also, it would be interesting to see how the various Defenders and other products react to various "obvious examples". Good stuff - I hope I can convince my CofC to let me use Maldev Academy :)
This is the way AI will be working with code in the future. Instead of generating code it will use existing code. Put it all together like some script kiddie and off to the races.
Not specific to this video but you have helped me a lot. I've gotten burnt out many times trying to make big projects. just sitting down and watching a video for a break or in the background while im thinking really helps
he always gets me stoked about cybersecurity. esp when I am burnt out or have my attention elsewhere
Fantastic job done this "website container". Amazing.
Can C or C# be used for malware development? Since C can be used for embedded systems. You'd think it'd be possible to write some kind of malware, right?
We need mooooooooore malware development.
What if the detection service providers uses this feature as well to write the signature/detections for it 🤔
Highly recommend MalDev Academy
I'm currently working through maldev academy and A) its awesome and B) these videos really help with learning the subtle things so thank you for doing them
If he can write malware as well as he screams he's definitely the best at it.
Legit never reached for the volume button faster.
I can listen to music on the volume i'm at rn and it's smooth, but playing john's video I have to lower the video's volume down to 25%..@@lerrz8969
i just spend $499 on the lifetime course. the code search site is about an extra $180 on top of that, and its a separate logon.
really? And didn't you use the discount code? :)
@@itzlue3965 i bought it before this video came out, i suspect the new cost would have been $449.
Not paying that much for content that is freely available on RUclips and google. The only thing they've done is curated all the topics together so it's easy to figure out what to learn next, but that doesn't amount to $500. Hoping the entire course will be leaked on PirateBay at some point.
This was a month ago, what's your opinion on it?
@@The_Ticket44 i ended up having to purchase sektor7's priv esc, persistence, and defense evasion courses to get a full understanding of what malware can do. i strongly advise anyone to just pay for the cheapest option for maldev academy and move on.
Me not understanding any of this makes me feel like I'm sooo far away from this knowledge :)
Don't worry bro, with time and effort you'll get stronger for sure 🦾
Don't worry if you don't understand it because 1) John is not explaining anything hes just rambling and 2) Even if this was a tutorial, John is not really a teacher
(Nothing against John hes just not good at explaining and simplifying things)
How is it signature and entropy-wise?
Great video, really cool way to rapidly develop poc code etc
john, can you please drop a link to at least your main function, i have a maldev subscription, and just learned some c, and learned process hollowing.
im trying to launch an instance of svchost.exe (which idk if thats what you used) with blockdll policy and it just errors out.
im really confused with all this c, anything helps!
More mal dev content please 😍🔥
This has to be an alphabet company honey pot lol
thanks, now I can be a real cyber criminal jippiee !
did it bypassed Defender ?
I tend to avoid chatgpt because they're a language model so their info is dated.
the way I don't understand C/C++ code but enjoying the video.
this is the worst comment
Every piece of malware code getting on the internet is being added to the antivirus databases, so it's not a good practice to rely on things like maldev.
There's also likely gonna be a lot of python garbage code from script kiddies
It doesn't seem to be for master malware writers. Just for beginners to learn. Also, don't many databases just relay on hash values and signatures? Change 1 bit, you change the hash, change a few aspects of its functionality (which may or may not work), it won't be flagged by its signature.
@@theErockonian But actually good antiviruses are much more sophisticated. I would take a more legit snippet, lets say i want to make a ransomware, then i would search for snippets to quickly encrypt large amount of data.
@@kidnamedfinger.productions Not to be mean, but this is a confusing response that doesn't address any of my points. It's a training academy, so obviously you can't rely on it. That's like saying: "I did the tryhackme boxes and now I'm ready to hack microsoft". It's for learning, not real world malware development. Also, can you give specifics on how AV techniques are more sophisticated? Like behavioral analysis? And yes, I am aware you can search for malware snippets, but that has nothing to do with what we are talking about lol.
does anyone have a tutorial on how to complete the rest of the file? im brand spankin to c, where ive only coded in python and powershell. any help would be great.
might want to blur your keyboard, too
Edit: keys pressed are not that interesting.
I might be naïve, but what is the legitimate reason to want to develop malware?
maldev doesnt allow me with a paid vpn.. no thanks 100%
Is cpp necessary for cyber security
No, but it can help you understand what happens closer to bare metal, with pointers, memory management, and stuff
Eyes closed, you sound like a nerdy Seth Rogen! Big fan!
Never clicked a video this fast (LOL)
Script kiddie🤡
@@robertommmin5 Yeahh
@@robertommmin5 I wouldn't call script kiddie a person who develops their own malware
Never videoed a click this fast (LOL)
@@robertommmin5a
Finally said educational purposes only
John Hammond is my Hero
You are the best Sir
Crypto note - don't use standard RNG for cryptographic purposes. :) Also, it would be interesting to see how the various Defenders and other products react to various "obvious examples". Good stuff - I hope I can convince my CofC to let me use Maldev Academy :)
good work dude
Damn this is freaking great malware is so interesting
Superuser has been coming in clutch lately tbh
thanks Jon Computer
Love your videos, but I just realised what a monster you are at typing haha!
Maldev academy is blocked by Cloudfare for me for some reason :( Nothing helps
Use a vpn
is it safe to assume most of these malwares will get caught by most modern AV's?
yes
No, malware with known signatures will get caught only.
@@data_eng_tutsonly the case for signature base AV
maldev academy's stuff evades modern av's, as long as you understand the entire chain.
Is this an ad?
yes
Clearly
Be hacker but don't hack anybody 🤟
I call chatgpt Mr.GPT. The best teacher.
He types with 2 fingers faster than me using my 10 😅
not bad for a 20min ad.
Also under 20 min
Yeah of course we need more malware developers... How much did they pay you to make this video? Must be a lot.
Cool, thanks for the video
this is also advertisement. This guy seems only to do advertisement videos
Gah, Click baited again, I need to find a different tutorial
(this is a joke)
NICE!😃👍
This is the way AI will be working with code in the future. Instead of generating code it will use existing code. Put it all together like some script kiddie and off to the races.
0:58 ye bla bla bla. youre letting people to be a cyber criminal
u can say the same about metasploit tutorials
@@N3CRXSYS bro. his fudding the payload.
nasil ya? gercek mi?
John, you're not a hacker. Stop talking about something you don't know about.
Who is under 18 here?
Me 😅
Ok writing nothing
Lessss gooo 🎉
1st