Udemy - Advanced Ransomware Development Course 2025
Navigation X

[Big Banner Ad Space Available]
[Big Banner Ad Space Available]

Udemy - Advanced Ransomware Development Course 2025

posted by Sauron and Last Post: 3 months ago


Udemy - Advanced Ransomware Development Course 2025  836
Sauron Moderator
3.684
Posts
3.561
Threads
Moderator
#1
[Image: bFlspcWy_t.png]
Requirements
  • You don't need knowledge, just a desire to learn.
Description
1.​ PRESENTATION
Here we will begin to teach the history of Ransomware, how it
emerged, first reports, groups, victims and much more.
2.​ Golang Logic
Finishing the theoretical knowledge, we move on to practice, we
start by learning the basics of the Golang language, variables,
functions, modules, channel, etc
3.​ File Manipulation
Now that we know the basics of Golang, let's dive in and learn
about file manipulation, reading, writing, listing, permissions, etc.
Since this is a Ransomware course, it's important to know about
files, don't you agree?
4.​ Hash
Here we will learn a little about Hash, md5, base64, sha256
among others.
5.​ Advanced encryption
In this module, we will start to make the content more difficult, the
student will learn in depth the basic and advanced knowledge
about symmetric and asymmetric cryptography, many used in
famous Ransomware, AES, RSA, CHACHA20.
6.​ Sandbox
Let's learn a little about sandbox environments for evasion
processes, creating several functions that we can detect if our
malware is running in test environments.
7.​ Running processes
In real ransomware, there is a list of running processes, this step
is important, the objective is to know which processes we must kill
for the malware to run.
8.​ Infosystem
In this module, we will talk about collecting information from our
“Targets”, hostname, username, addresses, permission, OS.9.​ About Logs
In this module, we will learn about logs stored on our targets and
how we can “eliminate” them, an important process in the attack
to erase traces.
10.​ README
Here we will learn how to create our famous warning banner, the
one that all ransomware has: “All your files have been encrypted,
do not attempt to recover them………”
Who this course is for:
  • Malware Developers, Red Team, Pentesters, Reverse Engineers.


Hidden Content
You must register or login to view this content.

 Password:  LeakForum.io
Contact other staff members for help im no longer as active!
  Reply
xali1996 Member
25
Posts
0
Threads
Member
#2
thanks a lot ma bro
Reply
hexadev89 Member
23
Posts
0
Threads
Member
#3
thanks allat
Reply
Thatguybro Member
28
Posts
0
Threads
Member
#4
(4 months ago)Sauron Wrote:
[Image: bFlspcWy_t.png]
Requirements
  • You don't need knowledge, just a desire to learn.
Description
1.​ PRESENTATION
Here we will begin to teach the history of Ransomware, how it
emerged, first reports, groups, victims and much more.
2.​ Golang Logic
Finishing the theoretical knowledge, we move on to practice, we
start by learning the basics of the Golang language, variables,
functions, modules, channel, etc
3.​ File Manipulation
Now that we know the basics of Golang, let's dive in and learn
about file manipulation, reading, writing, listing, permissions, etc.
Since this is a Ransomware course, it's important to know about
files, don't you agree?
4.​ Hash
Here we will learn a little about Hash, md5, base64, sha256
among others.
5.​ Advanced encryption
In this module, we will start to make the content more difficult, the
student will learn in depth the basic and advanced knowledge
about symmetric and asymmetric cryptography, many used in
famous Ransomware, AES, RSA, CHACHA20.
6.​ Sandbox
Let's learn a little about sandbox environments for evasion
processes, creating several functions that we can detect if our
malware is running in test environments.
7.​ Running processes
In real ransomware, there is a list of running processes, this step
is important, the objective is to know which processes we must kill
for the malware to run.
8.​ Infosystem
In this module, we will talk about collecting information from our
“Targets”, hostname, username, addresses, permission, OS.9.​ About Logs
In this module, we will learn about logs stored on our targets and
how we can “eliminate” them, an important process in the attack
to erase traces.
10.​ README
Here we will learn how to create our famous warning banner, the
one that all ransomware has: “All your files have been encrypted,
do not attempt to recover them………”
Who this course is for:
  • Malware Developers, Red Team, Pentesters, Reverse Engineers.
Thanks big boss boss boss
Reply
grootkitd Member
22
Posts
0
Threads
Member
#5
(4 months ago)Sauron Wrote:
[Image: bFlspcWy_t.png]
Requirements
  • You don't need knowledge, just a desire to learn.
Description
1.​ PRESENTATION
Here we will begin to teach the history of Ransomware, how it
emerged, first reports, groups, victims and much more.
2.​ Golang Logic
Finishing the theoretical knowledge, we move on to practice, we
start by learning the basics of the Golang language, variables,
functions, modules, channel, etc
3.​ File Manipulation
Now that we know the basics of Golang, let's dive in and learn
about file manipulation, reading, writing, listing, permissions, etc.
Since this is a Ransomware course, it's important to know about
files, don't you agree?
4.​ Hash
Here we will learn a little about Hash, md5, base64, sha256
among others.
5.​ Advanced encryption
In this module, we will start to make the content more difficult, the
student will learn in depth the basic and advanced knowledge
about symmetric and asymmetric cryptography, many used in
famous Ransomware, AES, RSA, CHACHA20.
6.​ Sandbox
Let's learn a little about sandbox environments for evasion
processes, creating several functions that we can detect if our
malware is running in test environments.
7.​ Running processes
In real ransomware, there is a list of running processes, this step
is important, the objective is to know which processes we must kill
for the malware to run.
8.​ Infosystem
In this module, we will talk about collecting information from our
“Targets”, hostname, username, addresses, permission, OS.9.​ About Logs
In this module, we will learn about logs stored on our targets and
how we can “eliminate” them, an important process in the attack
to erase traces.
10.​ README
Here we will learn how to create our famous warning banner, the
one that all ransomware has: “All your files have been encrypted,
do not attempt to recover them………”
Who this course is for:
  • Malware Developers, Red Team, Pentesters, Reverse Engineers.

Reply
EPHAK Member
18
Posts
0
Threads
Member
#6
(4 months ago)Sauron Wrote:
[Image: bFlspcWy_t.png]
Requirements
  • You don't need knowledge, just a desire to learn.
Description
1.​ PRESENTATION
Here we will begin to teach the history of Ransomware, how it
emerged, first reports, groups, victims and much more.
2.​ Golang Logic
Finishing the theoretical knowledge, we move on to practice, we
start by learning the basics of the Golang language, variables,
functions, modules, channel, etc
3.​ File Manipulation
Now that we know the basics of Golang, let's dive in and learn
about file manipulation, reading, writing, listing, permissions, etc.
Since this is a Ransomware course, it's important to know about
files, don't you agree?
4.​ Hash
Here we will learn a little about Hash, md5, base64, sha256
among others.
5.​ Advanced encryption
In this module, we will start to make the content more difficult, the
student will learn in depth the basic and advanced knowledge
about symmetric and asymmetric cryptography, many used in
famous Ransomware, AES, RSA, CHACHA20.
6.​ Sandbox
Let's learn a little about sandbox environments for evasion
processes, creating several functions that we can detect if our
malware is running in test environments.
7.​ Running processes
In real ransomware, there is a list of running processes, this step
is important, the objective is to know which processes we must kill
for the malware to run.
8.​ Infosystem
In this module, we will talk about collecting information from our
“Targets”, hostname, username, addresses, permission, OS.9.​ About Logs
In this module, we will learn about logs stored on our targets and
how we can “eliminate” them, an important process in the attack
to erase traces.
10.​ README
Here we will learn how to create our famous warning banner, the
one that all ransomware has: “All your files have been encrypted,
do not attempt to recover them………”
Who this course is for:
  • Malware Developers, Red Team, Pentesters, Reverse Engineers.
 

Reply
ki291756 Junior Member
3
Posts
0
Threads
Junior Member
#7
(4 months ago)Sauron Wrote:
[Image: bFlspcWy_t.png]
Requirements
  • You don't need knowledge, just a desire to learn.
Description
1.​ PRESENTATION
Here we will begin to teach the history of Ransomware, how it
emerged, first reports, groups, victims and much more.
2.​ Golang Logic
Finishing the theoretical knowledge, we move on to practice, we
start by learning the basics of the Golang language, variables,
functions, modules, channel, etc
3.​ File Manipulation
Now that we know the basics of Golang, let's dive in and learn
about file manipulation, reading, writing, listing, permissions, etc.
Since this is a Ransomware course, it's important to know about
files, don't you agree?
4.​ Hash
Here we will learn a little about Hash, md5, base64, sha256
among others.
5.​ Advanced encryption
In this module, we will start to make the content more difficult, the
student will learn in depth the basic and advanced knowledge
about symmetric and asymmetric cryptography, many used in
famous Ransomware, AES, RSA, CHACHA20.
6.​ Sandbox
Let's learn a little about sandbox environments for evasion
processes, creating several functions that we can detect if our
malware is running in test environments.
7.​ Running processes
In real ransomware, there is a list of running processes, this step
is important, the objective is to know which processes we must kill
for the malware to run.
8.​ Infosystem
In this module, we will talk about collecting information from our
“Targets”, hostname, username, addresses, permission, OS.9.​ About Logs
In this module, we will learn about logs stored on our targets and
how we can “eliminate” them, an important process in the attack
to erase traces.
10.​ README
Here we will learn how to create our famous warning banner, the
one that all ransomware has: “All your files have been encrypted,
do not attempt to recover them………”
Who this course is for:
  • Malware Developers, Red Team, Pentesters, Reverse Engineers.

Reply


Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)