MalDev Academy
@MalDevAcademy
Followers
18K
Following
345
Media
98
Statuses
450
Providing specialized, module-based security training and resources designed for cyber security professionals
Joined April 2023
The Offensive Phishing Operations Course has been released. 81 modules are included in the initial launch, with the first update already being worked on. More information: https://t.co/Jza6kUSb4W Syllabus:
115
179
464
Our Black Friday sale will be live all week! Apply the coupon code BLKFRIDAY at checkout to receive 25% off your purchase.
1
24
130
Last week we pushed out update 5 of the Offensive Phishing Operations course. Syllabus: https://t.co/SotB46YmMX - MFA Bypass: Building An Invisible Proxy Via Cloudflare Workers - Illicit Consent Grant - Microsoft Device Code Phishing - GitHub Device Code Phishing -
2
16
122
Module 29: Deleting Shadow Copies And Restore Points This module explores 4 different programmatic techniques to delete shadow copies. These techniques are seen in real-world ransomware, and studying them helps detect similar behaviours in the wild. Full syllabus:
2
33
176
Module 33: Ransomware Detection Mechanisms - File Operations (2) More info: https://t.co/Z6LMx0haZE This module introduces several methods used to detect ransomware. In the same module, we build a simulation that works around some of these methods, highlighting their
1
26
219
Today marks the 20th update to the Malware Development Course! Huge shout out to @GigelV41464 Updated Syllabus: https://t.co/P6qCbpbTa0 This update focuses on credential dumping on Firefox & Chrome. - Dumping Browser Cookies: Firefox - Dumping Saved Logins: Firefox -
3
25
167
MaldevAcademyLdr.2: https://t.co/P3joCJU3Rs Key Features: - Steganography - Thread stack spoofing - Hiding PE payload in GPU memory - Syscall tampering using the Trap Flag - Full list of features available in the README
github.com
RunPE implementation with multiple evasive techniques - Maldev-Academy/MaldevAcademyLdr.2
Next week we are releasing a RunPE implementation which has been tested thoroughly against several EDRs. The demonstration video shows the implementation running Mimikatz and successfully evading Pe-seive.
3
73
438
Next week we are releasing a RunPE implementation which has been tested thoroughly against several EDRs. The demonstration video shows the implementation running Mimikatz and successfully evading Pe-seive.
3
70
420
The Maldev DB has been updated with 60 new snippets. With this latest update, we've officially surpassed 1,000 snippets! Database:
0
2
27
Earlier this week we launched our new training Ransomware Internals, Simulation & Detection. More info: https://t.co/Z6LMx0haZE This training is intended for cyber security professionals that need an in-depth understanding of ransomware internals, their behaviour, and detection
1
19
139
Malware development course update coming soon. Dump browser credentials, cookies and more on various browsers.
8
51
520
Howdy, all! Hack O' Lantern CTF 2025 is just around the corner and @MalDevAcademy has been incredibly generous in donating subscriptions to their learning platform. If you've got what it takes to win, sign up at https://t.co/PRWlLoKX2F and get ready for a wicked fun CTF!
0
2
6
We’re excited to announce that we are sponsoring Cyber Info's Hack O’Lantern CTF 2025. The team at Cyber Info is putting together a challenging CTF and participants will have the chance to win Maldev Academy subscriptions. Register now at https://t.co/gMsm22u7eg and get ready
0
12
70
Our Hall of Thanks is dedicated to individuals that have made a meaningful contribution to Maldev Academy & its community. Thank you! https://t.co/db1EY57CLd
5
9
74
I finally finished the main modules of the malware development course provided by @MalDevAcademy. It was a great experience and can't wait to dig even deeper into malware development and research.
1
2
20
TrapFlagForSyscalling - Evading userland hooks through indirect tampered syscalls with the Trap Flag. https://t.co/raJjbzKyos
github.com
Bypass user-land hooks by syscall tampering via the Trap Flag - Maldev-Academy/TrapFlagForSyscalling
0
47
248
there are actually a ton of ClickFix variant types out there for Windows. new ones pop up all the time https://t.co/RN1dSgNTrY
Offensive Phishing Operations - ClickFix: Run Dialog Alternatives Utilizing Windows Search and WebDAV to trick the user into unknowingly executing a remote binary.
0
2
22
In the latest Malware Development course update, we walk through the development of a SAM dumping tool that is capable of creating local and remote SAM dumps. Sample usage: - SamDump.exe local - SamDump.exe remote \\MachineName User@DnsDomainName:Password - SamDump.exe file
0
32
240
The output below showcases two variants of the Metasploit calc shellcode, both constructed using different opcodes:
0
1
9
“AlphabeticalPolyGen” - generates and executes a polymorphic shellcode variant of a specified shellcode file: https://t.co/EvUxjniGlS
github.com
Generate an Alphabetical Polymorphic Shellcode. Contribute to Maldev-Academy/AlphabeticalPolyShellGen development by creating an account on GitHub.
1
28
140
New Malware Development course update: https://t.co/QCsKdmofYd - Dumping The SAM Database - Dumping The SAM Remotely - Dumping The SAM From Disk - Domain Enumeration Using MS-SAMR Huge shoutout to @GigelV41464 for his help with these awesome modules 🔥
1
31
256