Building an Advanced Ransomware
Learn the basics of ransomware attacks and notorious hacker groups in this comprehensive Python programming course. Explore file manipulation, cryptography, and more. Perfect for anyone interested in understanding the TTPs of a ransomware attack.
What you’ll learn
- Python programming for file manipulation
- Cryptography
- About Ransomware and Notorious Groups
- Post exploration basics
- phishing
- Creating Symmetrical and Hybrid Ransomware
Thank you very much
I took the initiative to create this course to teach a landing on what a real ransomware attack process looks like, using well-known tools used by notorious groups, let’s learn about the most famous groups,
by accessing websites where stolen data is put for download by several different groups, let’s access forums famous for Russian hackers.
After the steps of ransomware history and notorious groups, let’s move on to the more practical step, learning to create our python scripts, programming logic as an introduction and then, let’s start manipulating files, moving on to AES, RSA encryption, etc., these classes will help us to create our ransomware
let’s learn to use tools that are used by these groups, a technique that is becoming very famous, called Living-off-the-Land for dazzling movement
and we are also going to create our own automated tools for mass data theft, ransomware, fake email pages to download malicious files, using as an example a page created by the North Korean APTs.
With this course you will be able to learn the most important steps for a ransomware attack with the main processes, starting with initial access and ending with encryption of the entire disk. The entire course process is based on the MITER ATT&CK methodology
Who this course is for:
- This course is intended for all those who want to learn the basics of the TTPs of a Ransomware attack.
User Reviews
Be the first to review “Building an Advanced Ransomware”
You must be logged in to post a review.


There are no reviews yet.