Malware
44 videos • 118,085 views • by John Hammond
1
Hackers Use Github For Malware
John Hammond
Download
2
Government Unveils Malware Analysis Tool, But...
John Hammond
Download
3
How Hackers Can Hide PowerShell in Environment Variables
John Hammond
Download
4
Hackers Hide with Clever Alternate Data Streams
John Hammond
Download
5
Malware Analysis & Threat Intel: UAC Bypasses
John Hammond
Download
6
Hackers Can Phish with PLAINTEXT QR Codes
John Hammond
Download
7
Don't Use CyberChef. Use This Instead.
John Hammond
Download
8
Can a PDF File be Malware?
John Hammond
Download
9
I Made Malware In Under 20 Minutes
John Hammond
Download
10
Free Coding Tool Distributes Malware
John Hammond
Download
11
Notepad.exe Will Snitch On You (full coding project)
John Hammond
Download
12
Malware Analysis Made Easy: Cloud Investigations
John Hammond
Download
13
PikaBot Malware Analysis: Debugging in Visual Studio
John Hammond
Download
14
Make Malware Analysis FASTER with Binary Emulation
John Hammond
Download
15
i BACKDOORED a Desktop Shortcut (to run malware)
John Hammond
Download
16
Writing Custom Malware: Import Address Table Hooking
John Hammond
Download
17
How Hackers Hide From Memory Scanners
John Hammond
Download
18
Detect Hackers & Malware on your Computer (literally for free)
John Hammond
Download
19
How Hackers Exploit Vulnerable Drivers
John Hammond
Download
20
Hackers Are Exploiting Critical Vulnerabilities in File Transfer Software
John Hammond
Download
21
Is this Spyware? Telegram Data Exfiltration - DELETE
John Hammond
Download
22
Fake OnlyFans MALWARE: Remcos Infostealer VBScript Stager
John Hammond
Download
23
Raspberry Pi Malware uses IRC Remote Access Trojan (RAT)
John Hammond
Download
24
Unraveling Discord Token Stealer (python MALWARE)
John Hammond
Download
25
Strange File in Downloads Folder? Gootloader Malware Analysis
John Hammond
Download
26
Internet Explorer Forced to Run Malware
John Hammond
Download
27
Fake OBS Studio Hack Targeting YouTubers
John Hammond
Download
28
Unraveling the IcedID Malware Stager & Phishing Email
John Hammond
Download
29
Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation)
John Hammond
Download
30
Uncovering NETWIRE Malware - Discovery & Deobfuscation
John Hammond
Download
31
KOVTER Malware Analysis - Fileless Persistence in Registry
John Hammond
Download
32
TARGETED Phishing - Fake Outlook Password Harvester
John Hammond
Download
33
Information Stealer - Malware Analysis (PowerShell to .NET)
John Hammond
Download
34
HTA JScript to PowerShell - Novter Malware Analysis
John Hammond
Download
35
$2 MILLION DOLLARS STOLEN in Bitcoin/Ethereum - JScript Malware Analysis
John Hammond
Download
36
Rick & Morty MALWARE!? - sLoad - PowerShell & VBScript
John Hammond
Download
37
VBScript & ILSpy Analysis of a RAT
John Hammond
Download
38
Cryptocoin Miner - Unpeeling Lemon Duck Malware
John Hammond
Download
39
Discord Malware - "i hacked MYSELF??"
John Hammond
Download
40
HAFNIUM - Post-Exploitation Analysis from Microsoft Exchange
John Hammond
Download
41
Mozi Malware - Finding Breadcrumbs...
John Hammond
Download
42
FAKE Antivirus? Malware Analysis of Decoy 'kaspersky.exe'
John Hammond
Download
43
Is THIS a VIRUS? Finding a Remcos RAT - Malware Analysis
John Hammond
Download
44
MALWARE ANALYSIS - VBScript Decoding & Deobfuscating
John Hammond
Download