Maldev Academy

Maldev Academy

Computer and Network Security

Malware Development and offensive security educational content

About us

Advanced malware development training

Industry
Computer and Network Security
Company size
2-10 employees
Type
Privately Held

Updates

  • Maldev Academy reposted this

    View profile for Faran Siddiqui, graphic

    Security Researcher @FireCompass | CARTP | Speaker at @Vulncon

    Developed a small POC tool called "HellsHazzard" which utilizes an indirect syscall technique called HellsHall to bypass userland NTAPIs EDR hooking. The tool consists of the following features - - HellsHall implementation of indirect syscall bypass by Maldev Academy - Mechanism to detect the presence of InetSim sandbox, if detected halts the execution of the malware. - API hashing. - IPv6 shellcode obfuscation. - IAT Obfuscation to evade static analysis. This tool is just a POC and not been tested against commercial EDRs, will update and add more features in future. https://lnkd.in/dPpyhyA8

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • Maldev Academy reposted this

    View profile for Noel Carrasco, graphic

    Incident Response Pentester at SEAT S.A.

    When I was just 16, our family PC fell victim to a bootkit. That bootkit slipped past our antivirus, disabled it and got persistence in our MBR. Then it just transformed our PC to a Trojan party. It was a relentless experience; the malware took control, crashed our system repeatedly, and even cut off our internet access for a week. I had to contact to our AV support to get rid of that tediuos piece of software. Despite that, I was fascinated. Its ability to seize control without permission left me both frustrated and intrigued. It was one of the driving forces behind my decision to pursue studies in computer engineering. It has been more than a year since I first heard about the launch of Maldev Academy. The community was very excited about it and so was I. A well explained and structured course about malware development. All that I wanted. Six months later, I enrolled the course and I think was one of the best decisions I have ever made. The amount of projects and knowledge that can be extracted from it is astonishing. Its all well written with examples and they keep the material up date, releasing new modules every couple of months. Worth mentioning the community is exceptional too, always ready to assist, share tools, and collaborate on projects. I've completed 91 modules so far, each covering diverse topics that inspired me to create my own projects, solidifying my understanding. Happily for me (and for my readers, I guess) there are more modules waiting. I will keep making those blog posts about the techniques or topics I learn about. By now I feel more motivating to read about bootkits, the malware type that embraced my journey, so I may talk about them in future posts. I'm grateful to Maldev Academy for providing such a comprehensive and practical learning experience, and all the community to make such good content and share it to the world. Happy hacking! #Cybersecurity #MalwareDevelopment #MaldevAcademy #ContinuousLearning

    • No alternative text description for this image
  • Maldev Academy reposted this

    View profile for Bradley Wolfenden, graphic

    Elevating cyber awareness and talent via competitions. Cyber + eSports + Athletics. Find me on X (Twitter) at @pwnsolvewin.

    A handful of fresh new challenges were just introduced into the Season IV, US Cyber Open's Competitive #CTF! And it's not too late to get registered! Sign up for FREE, and jump in... Plus, shout out to Maldev Academy for donating a LIFETIME subscription to our OVERALL CHAMPION! Happy hacking, <3 the US Cyber Games. 🤺

    Register to Play | US Cyber Games Open

    Register to Play | US Cyber Games Open

    uscybergames.com

  • Maldev Academy reposted this

    After weeks of continuous testing finally this memory leak is solved. It’s bad if the agent will slowly chew up all the memory (during testing it ran for two days, reached 6gigs of mem) and stand out of the crowd then is killed or investigated. Live long is the current sub-goal. This also brings up another take away, thanks to Steve S. from Maldev Academy, I get to know Drmemory (https://lnkd.in/gCrC9YeJ). It will detect potential memory leaks in target executable and save tons of time. Few things to keep in mind when using it. 1. Compile your executable with debug symbols, in mingw this can be accomplished with the "-g" flag; otherwise you'll see the error as shown in image 1; 2. Normally, drmemory.exe will error because symbols are not found, as shown in image 2, and it will download the symbols after clicking OK; 3. To skip the symbol download part, specify "-ignore_kernel" flag, as in image 3, just accept the error, that's fine; 4. Be careful about "INVALID HEAP ARGUMENT to free" error, it may indicate memory leak where there's a missed call to free or its variants; should double check the lines reported; 5. Final recommended command line for leaks detection: "-check_leaks -count_leaks -possible_leaks -leaks_only -batch -ignore_kernel -- \path\to\exe arg1 arg2"; not guaranteed to work in every case; full flags refer to "-h"; Hope it helps and time to move on.

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image

Similar pages