Jump to content
View in the app

A better way to browse. Learn more.

DecodeHub - Reverse Engineering, Crackmes, Software & Coding

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (â‹®) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

[UDEMY] Advanced Ransomware Development Course

Featured Replies

  • Founder

udemy9.thumb.png.b2a12cc76d0eb7b391fd9f667e54f2a7.png

 Requirements

You don't need knowledge, just a desire to learn.

Description1. PRESENTATION
Here we will begin to teach the history of Ransomware, how it
emerged, first reports, groups, victims and much more.
2. Golang Logic
Finishing the theoretical knowledge, we move on to practice, we
start by learning the basics of the Golang language, variables,
functions, modules, channel, etc
3. File Manipulation
Now that we know the basics of Golang, let's dive in and learn
about file manipulation, reading, writing, listing, permissions, etc.
Since this is a Ransomware course, it's important to know about
files, don't you agree?
4. Hash
Here we will learn a little about Hash, md5, base64, sha256
among others.
5. Advanced encryption
In this module, we will start to make the content more difficult, the
student will learn in depth the basic and advanced knowledge
about symmetric and asymmetric cryptography, many used in
famous Ransomware, AES, RSA, CHACHA20.
6. Sandbox
Let's learn a little about sandbox environments for evasion
processes, creating several functions that we can detect if our
malware is running in test environments.
7. Running processes
In real ransomware, there is a list of running processes, this step
is important, the objective is to know which processes we must kill
for the malware to run.
8. Infosystem
In this module, we will talk about collecting information from our
“Targets”, hostname, username, addresses, permission, OS.9. About Logs
In this module, we will learn about logs stored on our targets and
how we can “eliminate” them, an important process in the attack
to erase traces.
10. README
Here we will learn how to create our famous warning banner, the
one that all ransomware has: “All your files have been encrypted,
do not attempt to recover them………”
Who this course is for:

Malware Developers, Red Team, Pentesters, Reverse Engineers.

link.txt

PROFESSIONAL

6d538d11ecfced46f459ee300b5e80ec_ChatGPT_Image_25_Kas_2025_00_57__c0451a.png

  • Replies 3
  • Views 144
  • Created
  • Last Reply

Top Posters In This Topic

Posted Images

  • 4 months later...
  • 2 weeks later...

Create an account or sign in to comment

Recently Browsing 0

  • No registered users viewing this page.

Important Information

Terms of Use

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.