Madhan HACKER
Madhan HACKER
  • 12
  • 13 556
How to safe from looper malware.
How to safe from looper malware. step-by-step guide on how to create malware and how to disable the malware on your pc
Source Links:
GitHub: github.com/madhanmaaz/marlowe-malwares/
Go Programming Language: go.dev/
Find Me:
Website : madhanmaaz.netlify.app
GitHub : github.com/madhanmaaz
What You'll Learn:
1. How to create looper malware?
2. What is looper malware?
3. Malware safety tips
Chapters:
00:00 - Introduction
00:47 - What is looper malware?
01:09 - Create looper malware in golang
02:21 - Build process in virtual machine
02:45 - Running malware in virtual machine
03:15 - To disable malware
05:00 - Outro
If you enjoyed this video, please like, share, and subscribe for more cybersecurity and programming tutorials. Let us know in the comments what topics you'd like us to cover next! Stay safe and secure!
DISCLAIMER: This video is for educational purposes only. Unauthorized use of this information is illegal and unethical. Always use your knowledge responsibly.
มุมมอง: 85

วีดีโอ

Destroying windows with malware
มุมมอง 14314 วันที่ผ่านมา
Destroying windows with malware. how to create malware step-by-step-guide for cybersecurity and ethical hacking Source Links: GitHub: github.com/madhanmaaz/marlowe-malwares/tree/master/Wiper/01_GO-simple-malware Find Me: Website : madhanmaaz.netlify.app GitHub : github.com/madhanmaaz What You'll Learn: 1. what is wiper malware? 2. how to create wiper malware? 3. the potential risks and dangers ...
How to crack a software | Reverse engineering tutorial | Cybersecurity Tutorial
มุมมอง 57721 วันที่ผ่านมา
➡ DISCLAIMER: This video is for educational purposes only. Unauthorized use of this information is illegal and unethical. Always use your knowledge responsibly. Subscribe: th-cam.com/channels/JHWu-YQfxB1ak8r-up5A_Q.html Description: Curious about how hackers crack software or want to learn the basics of reverse engineering? In this video, we dive into the fascinating world of reverse engineerin...
How to hack accounts | python tool | cybersecurity | python for cybersecurity
มุมมอง 53628 วันที่ผ่านมา
➡ DISCLAIMER: This video is for educational purposes only. Unauthorized use of this information is illegal and unethical. Always use your knowledge responsibly. Subscribe: th-cam.com/channels/JHWu-YQfxB1ak8r-up5A_Q.html Description: Welcome to a deep dive into the creation of a Cookie Stealer malware using Python! In this video, we’ll walk you through every step of building a seemingly innocent...
how to Hide Files in Images | Python Tool | Cybersecurity tool
มุมมอง 3Kหลายเดือนก่อน
➡ DISCLAIMER: This video is for educational purposes only. Unauthorized use of this information is illegal and unethical. Always use your knowledge responsibly. Subscribe: th-cam.com/channels/JHWu-YQfxB1ak8r-up5A_Q.html Description: Hello everyone! Today, we're exploring a powerful tool called EnigmaScope, perfect for those interested in cybersecurity and ethical hacking. This open-source proje...
Python Keylogger 101: How to Build a Keylogger #keylogger #ethicalhacking #malware #cyberattacks
มุมมอง 3Kหลายเดือนก่อน
➡ DISCLAIMER: This video is for educational purposes only. Unauthorized use of this information is illegal and unethical. Always use your knowledge responsibly. Subscribe: th-cam.com/channels/JHWu-YQfxB1ak8r-up5A_Q.html Description: Learn how to create a basic keylogger in Python! This tutorial will guide you through the process step-by-step, explaining what a keylogger is, how it works, and th...
How to create reverse shell in golang | Go Reverse Shell Tutorial
มุมมอง 1.1Kหลายเดือนก่อน
➡ DISCLAIMER: This video is for educational purposes only. Unauthorized use of this information is illegal and unethical. Always use your knowledge responsibly. Subscribe: th-cam.com/channels/JHWu-YQfxB1ak8r-up5A_Q.html Description: you'll learn about reverse shells-a crucial concept in cybersecurity. We'll explore how attackers use reverse shells to remotely control compromised systems. You'll...
Python Malware 101: How to Create an Information Stealer #cybersecurity #trendingethicalhacking
มุมมอง 4.4K2 หลายเดือนก่อน
➡ DISCLAIMER: This video is for educational purposes only. Unauthorized use of this information is illegal and unethical. Always use your knowledge responsibly. Welcome to this comprehensive tutorial on creating a simple information stealer in Python! In this video, we'll explore what information stealer malware is, how it works, and walk you through coding a basic example using Python. ➡ Sourc...
take control of any Windows // demo
มุมมอง 3245 หลายเดือนก่อน
➡ DISCLAIMER: This video is for educational purposes only. Unauthorized use of this information is illegal and unethical. Always use your knowledge responsibly. Description: ➡ Source Links: github.com/madhanmaaz/cyrix86 ➡ Follow Me: Website : madhanmaaz.netlify.app GitHub : github.com/madhanmaaz Instagram : madhanmaaz Twitter : x.com/madhanthehacker LinkedIn : www.linkedin.com/in/...
White Spikes Tool | madhan hacker | madhanmaaz
มุมมอง 21110 หลายเดือนก่อน
white spikes tool github madthan hacker madhanmaaz GITHUB: github.com/madhanmaaz/white-spikes/ Hackerland by Twin Musicom is licensed under a Creative Commons Attribution 4.0 license. creativecommons.org/licenses/by/4.0/ Source: www.twinmusicom.org/song/292/hackerland Artist: www.twinmusicom.org

ความคิดเห็น

  • @AkiiiMatcha
    @AkiiiMatcha 5 วันที่ผ่านมา

    Blur isn’t destructive

  • @hsprince14
    @hsprince14 11 วันที่ผ่านมา

    After running the code, will Anti-virus or Windows Defender automatically stop it??

  • @lewisfriend1705
    @lewisfriend1705 12 วันที่ผ่านมา

    you can also gather the users Environment Variables, if they are into developing software, this is where you may find an API Key of two ahaha

  • @OpinionatedReviewer
    @OpinionatedReviewer 12 วันที่ผ่านมา

    Was 'fake_explorer.exe' added to the Windows Defender whitelist, or did it bypass detection?

    • @madhanmaaz
      @madhanmaaz 12 วันที่ผ่านมา

      No, it bypassed Windows Defender. Check this out: github.com/madhanmaaz/cyrix86

  • @ynycu
    @ynycu 13 วันที่ผ่านมา

    Should use the C or the batch script with the win32 API

  • @ynycu
    @ynycu 13 วันที่ผ่านมา

    Btw Gboard in your phone is also a keylogger.

  • @Saurias
    @Saurias 13 วันที่ผ่านมา

    This works only if the user has Windows OS right? As systeminfo is executed only on windows machines. What would be the alternatives with other OS?

    • @madhanmaaz
      @madhanmaaz 13 วันที่ผ่านมา

      Yes, systeminfo is specific to Windows. For other OS, we would need to modify the script. Don’t worry, I’ll upload a separate video on an advanced stealer that works across different systems. Feel free to check out my other videos in the meantime!

  • @hackwrld1895
    @hackwrld1895 13 วันที่ผ่านมา

    I did something like this back then when I was at college. I made the restart to be done after every 10 seconds, and that was in one of the machines in the schools computer lab. I had a break of sweat when I could not reach the startup folder in less than 10 seconds. Luckilly CTRL + R saved me, so I could get to the startup folder and delete the file in less than 10 seconds after startup. Thanks for the video, I would love to have one on how to make a tunnel with cloud flare and open vpn.

  • @uuganerdene-mc4lc
    @uuganerdene-mc4lc 14 วันที่ผ่านมา

    man can you make "file stealer malware" next?

  • @uuganerdene-mc4lc
    @uuganerdene-mc4lc 14 วันที่ผ่านมา

    such an amazing video

  • @timecop1983Two
    @timecop1983Two 14 วันที่ผ่านมา

    Thanks as always! Always support this channel

  • @paranthaman102
    @paranthaman102 17 วันที่ผ่านมา

    Could you upload the same video in python language plz 😢

    • @madhanmaaz
      @madhanmaaz 17 วันที่ผ่านมา

      @@paranthaman102 sure, don't worry

  • @timecop1983Two
    @timecop1983Two 18 วันที่ผ่านมา

    Would you please cover python ransomware that works on windows and ubuntu? I am busy making my own version but it would be very interesting to see your version. For example the ransomware detects which OS to run the ransomware on.

  • @timecop1983Two
    @timecop1983Two 18 วันที่ผ่านมา

    Every time you upload a video I am like yay! This is like I am always waiting for people Like Loi Liang and you to upload a video! Keep up the very good work :)

  • @uuganerdene-mc4lc
    @uuganerdene-mc4lc 18 วันที่ผ่านมา

    thanks bro ,always interesting video

  • @temmiesaidhoi-5530
    @temmiesaidhoi-5530 19 วันที่ผ่านมา

    it says pyinstaller is not recognized as an internal or external command what should i do?

    • @madhanmaaz
      @madhanmaaz 19 วันที่ผ่านมา

      Before starting the build process, make sure to install PyInstaller. You can do this by running the command: pip install pyinstaller

    • @temmiesaidhoi-5530
      @temmiesaidhoi-5530 19 วันที่ผ่านมา

      @@madhanmaaz thankyouuu

    • @temmiesaidhoi-5530
      @temmiesaidhoi-5530 19 วันที่ผ่านมา

      @@madhanmaaz im kinda new to coding lol

  • @uuganerdene-mc4lc
    @uuganerdene-mc4lc 20 วันที่ผ่านมา

    hey can i do that alll in kali linux ?

    • @madhanmaaz
      @madhanmaaz 20 วันที่ผ่านมา

      yes, you can!

  • @uuganerdene-mc4lc
    @uuganerdene-mc4lc 22 วันที่ผ่านมา

    its so lucky for me to find you. your videos are so interesting keep up!!! ~ *** THANK YOU ***

    • @madhanmaaz
      @madhanmaaz 22 วันที่ผ่านมา

      Thank you so much for the kind words! 😊 I’m glad you’re enjoying the content. more interesting videos are on the way!

    • @uuganerdene-mc4lc
      @uuganerdene-mc4lc 22 วันที่ผ่านมา

      @@madhanmaaz thank you sir make more content about malware like this one its so easy to understand and amazing. again thank you so much for making this kind of content.

  • @hackwrld1895
    @hackwrld1895 22 วันที่ผ่านมา

    Bro you are strong, like really powerfull. Wait how does your channels be so underrated ?? Thanks for the amazing content please kepp up, have been sleeping on your projects. Really amazing

    • @madhanmaaz
      @madhanmaaz 22 วันที่ผ่านมา

      Wow, thanks so much. More awesome projects and videos are on the way-stay tuned! 💪😊

  • @rccli
    @rccli 24 วันที่ผ่านมา

    would you be willing to crack a real piece of software for a more in-depth example of this?

    • @madhanmaaz
      @madhanmaaz 24 วันที่ผ่านมา

      I focus on ethical hacking and security education. Cracking real software isn't something I'd promote, but I’ll continue creating content that helps you learn and grow in a responsible way!

    • @robsterot9101
      @robsterot9101 22 วันที่ผ่านมา

      @@madhanmaazmaby ask them if you are allowed to do it :D Or to harmfull still?

    • @_____666______
      @_____666______ 17 วันที่ผ่านมา

      software name ?. here is a piece of advice just disable patchguard and driver signature enforcement, it will do lot more than you think lmao

  • @CyberMan-g2z
    @CyberMan-g2z 24 วันที่ผ่านมา

    Nice content

  • @ytg6663
    @ytg6663 25 วันที่ผ่านมา

    But this exe ask Smartscreen alert at victim. Gow to bypass it

  • @timecop1983Two
    @timecop1983Two 25 วันที่ผ่านมา

    Always the best ethical hacking and cyber security channel! Just wanted to let you know that I think your really talents and should not stop making videos!

    • @madhanmaaz
      @madhanmaaz 25 วันที่ผ่านมา

      Thank you so much for your support! I'm glad you're enjoying the content.

  • @gamingtweaks3065
    @gamingtweaks3065 27 วันที่ผ่านมา

    yo

  • @IshakeZghari
    @IshakeZghari 28 วันที่ผ่านมา

    Thx man 👍

    • @madhanmaaz
      @madhanmaaz 22 วันที่ผ่านมา

      you're welcome

  • @Thechadshirts
    @Thechadshirts 29 วันที่ผ่านมา

    THANKS. People like you are more needed in this world, new sub

    • @madhanmaaz
      @madhanmaaz 22 วันที่ผ่านมา

      Thanks! Glad you liked it! 🗿

  • @whoam4is
    @whoam4is 29 วันที่ผ่านมา

    This channel very underrated, THANKS FOR THIS VIDEO

    • @madhanmaaz
      @madhanmaaz 22 วันที่ผ่านมา

      Thank you so much for the support!

  • @timecop1983Two
    @timecop1983Two 29 วันที่ผ่านมา

    It's always your underrated channels that make the most educated people

  • @timecop1983Two
    @timecop1983Two 29 วันที่ผ่านมา

    Thanks man your the bst!

    • @madhanmaaz
      @madhanmaaz 22 วันที่ผ่านมา

      You're welcome! Glad I could help! You're the best too! 😄🙌

  • @Wobblypals
    @Wobblypals หลายเดือนก่อน

    why is mine not turning into a pdf file

  • @Kichijoji_Abiko
    @Kichijoji_Abiko หลายเดือนก่อน

    yo what side of python is this how they didn't teach this

    • @chersymale
      @chersymale 16 วันที่ผ่านมา

      because people will use the information to do illegal things?

  • @HumpaLumpaBiriBam
    @HumpaLumpaBiriBam หลายเดือนก่อน

    nice, but please add honeypot support! I want to create secret.txt with my secret data, and another secret.txt with fake information. while hiding files I want to store both files. If I'm forced to give up password I want faked secret.txt to be returned... only if I enter correct password the true secret.txt is returned.

  • @55BLOCKS
    @55BLOCKS หลายเดือนก่อน

    After opening the notepad the connection is established

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      It's not the actual Notepad application. The malware is disguised with a Notepad icon to make it look harmless.

    • @55BLOCKS
      @55BLOCKS หลายเดือนก่อน

      @@madhanmaaz quick question I'm using Ubuntu can it work

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      @@55BLOCKS The Go script works on all OS, but in this video, I'm targeting Windows. You can compile it for Linux, and it should work just fine, or you can run the Go script directly with the Linux Go runtime.

  • @holyyqurann
    @holyyqurann หลายเดือนก่อน

    I have google photos unlimited, I was curious If I can transfer all my 500gb data to 1 image and than upload that image to google photos?

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      You're misunderstanding-the image size would also become 500GB if you tried to hide that much data in it, which isn't practical for uploading to Google Photos. The tool is meant for hiding secrets, not for storing huge amounts of data.

    • @holyyqurann
      @holyyqurann หลายเดือนก่อน

      @@madhanmaaz yeah google may detect it, cause it won't be a good encryption in front of a tech giant like google you are right

  • @phamloc6792
    @phamloc6792 หลายเดือนก่อน

    I though when you click on pdf file, it must open the pdf as normal and the malware still running. but it shows nothing.

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      I apologize for the confusion-I was planning to cover that in a separate video. No worries, I'll update the code to work as you need it to.

  • @srisriram6093
    @srisriram6093 หลายเดือนก่อน

    This script is not running bro its throwing error

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      you can rise the issue on github.

  • @aphenoudo3016
    @aphenoudo3016 หลายเดือนก่อน

    Can you do a video on how to grab someone session cookies ?

    • @zricoo
      @zricoo 27 วันที่ผ่านมา

      nah it's illegal

  • @aphenoudo3016
    @aphenoudo3016 หลายเดือนก่อน

    I have subscribed

  • @namelessmonster2166
    @namelessmonster2166 หลายเดือนก่อน

    hi can u make a telegram grpup

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      Sure :)

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      Telegram Group: t.me/+BwXNxOSOc_5hMTc1

  • @Anon2310_
    @Anon2310_ หลายเดือนก่อน

    Just out of curiosity. I guess that this method only works to secure information, but not to, for example, send malware via images?

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      Yes, malware can be hidden in images, but it won't execute just by viewing the image. It needs to be extracted and run separately.

    • @oioio-yb9dw
      @oioio-yb9dw หลายเดือนก่อน

      ​@madhanmaaz Hi! I am no expert. Is there a way in which we can install the dependencies using pacman instead of pip? Would that require a script?

  • @IshakeZghari
    @IshakeZghari หลายเดือนก่อน

    Keep it up 🗣️

  • @IshakeZghari
    @IshakeZghari หลายเดือนก่อน

    Nice tutorials man 🗿

  • @madhanmaaz
    @madhanmaaz หลายเดือนก่อน

    This video is just a demo. I will upload a comprehensive video tutorial soon.

  • @mo_afr
    @mo_afr หลายเดือนก่อน

    This is perfect , but how do I like actually do it , is it a tool , hoe do I open , does it use Linux , what do I do like how to install and use ?? Also is this for like anywhere like if I send this to someone they open will it work or is it only in my local area network ?

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      @@mo_afr This video is just a demo. I will upload a comprehensive video tutorial soon. :)

    • @mo_afr
      @mo_afr หลายเดือนก่อน

      @@madhanmaaz ok thxx is the video coming soon l. Cuz I need the tutorial plzzzz

  • @PinkArmor999
    @PinkArmor999 หลายเดือนก่อน

    nice

  • @AbuBakkarRaihan
    @AbuBakkarRaihan หลายเดือนก่อน

    Brother Please Use C or C++ To Creating Malware.

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      sure :)😀

  • @16ode
    @16ode หลายเดือนก่อน

    startup": "False (:

  • @gr33nDestiny
    @gr33nDestiny หลายเดือนก่อน

    I havnt checked the code yet, what the bootloader I saw when your compiling?

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      The bootloader you saw isn't a system bootloader. It's part of PyInstaller, which I'm using to compile the script. This bootloader initializes the environment and starts the Python interpreter for the standalone executable.

  • @Nova_rg_4452
    @Nova_rg_4452 หลายเดือนก่อน

    Should they connect to the same wifi ?

    • @madhanmaaz
      @madhanmaaz หลายเดือนก่อน

      @@Nova_rg_4452 In the video, both Kali and Windows machines are connected to the same network. If you want to receive data from outside your local network, you'll need to use techniques like tunneling, obtaining a static IP address, port forwarding, or hosting your own server in the cloud. These methods allow external devices to communicate with your local machines

  • @hackeronthego8016
    @hackeronthego8016 หลายเดือนก่อน

    how do i convert the keylogger data into a vim file or a later readable file...??