Are you curious how malware is written? and other red team tradecraft tools are written?
Dont know where to start? No worries. This Offensive C# course teaches you from c# basics
to developing AD toolset, winapi, malware, C2 development.Improve your skills with this course
Brief details on what you will learn in this course:
- C# basics
- Writing a simple C2 Server
- Enumerating Active Directory with C#
- Automating Active Directory attacks with C#
- Writing .NET Loader
- Persistence techniques
- WinAPI
- Token Enumeration
- Shellcode and DLL Injections
- Backdooring PE's
- Writing a PE Parser
- Writing our own PE64 Loader
- Process HollowingÂ
- Thread Queue APC Injections
- API Hashing
- API Hooking
Example Curriculum
Introduction
Available in
days
days
after you enroll
C# Basics
Available in
days
days
after you enroll
Python C2 Server
Available in
days
days
after you enroll
C# Reverse Shell
Available in
days
days
after you enroll
LDAP Enumeration
Available in
days
days
after you enroll
Privilege Escalation
Available in
days
days
after you enroll
Automating Active Directory Enumeration
Available in
days
days
after you enroll
.NET Loader
Available in
days
days
after you enroll
Persistence
Available in
days
days
after you enroll
WinAPI with C#
Available in
days
days
after you enroll
- WinAPI with C# - MessageBoxW, GetUserNameW (18:57)
- C# Structures and Unions (15:30)
- WinAPI with C# - NetShareEnum - Enumerating Network Shares (22:44)
- WinAPI with C# - GetTokenInformation - Checking our elevated privilege (17:54)
- WinAPI with C# - Getting Token Privileges (7:51)
- WinAPI with C# - Enabling Privileges with AdjustTokenPrivilege (10:39)
- WinAPI with C# - Enabling Privileges with AdjustTokenPrivilege (1) (10:39)
- WinAPI with C# - Simple Shellcode Runner (12:32)
- WinAPI with C# - Injecting shellcode in remote process (16:08)
- WinAPI with C# - DLL Injection (14:53)
- WinAPI with C# - Find DLLs and their base address (8:49)
- WinAPI with C# - Checking if Process is being debugged (13:56)
- WinAPI with C# - Detach the debugger from process (6:46)
- backdooring pe (21:50)
- C2 Server - Taking Screenshots with C# Client (11:27)
- Obfuscate function names using Delegates C# (7:05)
LSA API
Available in
days
days
after you enroll
PE File Format
Available in
days
days
after you enroll
Reflective PE64 Injection
Available in
days
days
after you enroll
Process Hollowing
Available in
days
days
after you enroll
DLL Injection via SetWindowsHookExA
Available in
days
days
after you enroll
Shellcode Injection via Mapping Sections
Available in
days
days
after you enroll
Thread Queue APC Injections
Available in
days
days
after you enroll
Evasion Techniques
Available in
days
days
after you enroll
AMSI Bypassing techniques
Available in
days
days
after you enroll
API Hooking
Available in
days
days
after you enroll
API Hashing
Available in
days
days
after you enroll
Walkthroughs
Available in
days
days
after you enroll