[Livestream] Malware Development - Enumerating Processes, Persistence, Reading from Registry
Consider a one-time tip on Ko-Fi, or become a monthly supporter of my research!
https://ko-fi.com/valhalla_dev
Hey, let's develop some malware!
Today we're going to work on process enumeration, getting useful information from the registry and establishing persistence. We're going to dig deep on the Windows API and leave that annoying PowerShell nonsense behind us for a bit!
-- Books and Resources --
Kernigan and Ritchie's book on C (affiliate link):
https://amzn.to/3ffh85F
Windows Internals (affiliate link):
https://amzn.to/3Wbw4Cl
Theo's video on Tutorial Hell:
https://www.youtube.com/watch?v=EkUuXQUByuw
My blog on moving to Mastodon:
https://www.valhallaresearch.net/why-im-moving-to-the-fediverse/
Follow me on Mastodon:
https://kolektiva.social/web/@valhalla_dev
--
You can find me on Twitter here:
https://twitter.com/valhalla_dev
You can also join my weekly newsletter, Valhalla Research, where I talk all things software, entrepreneurship, politics and finance:
https://valhallaresearch.substack.com/subscribe
My research blog:
https://valhallaresearch.net
--
#malware #reverseengineering #malwareanalysis