📌 Use code "CROW10" for 10% off your order when you checkout at Maldev Academy or use this link: maldevacademy.com/?ref=crow Font: Terminess Nerd Font Mono Colourscheme: Zero (Dark Theme) I sincerely hope you enjoyed watching this installment of our ongoing malware development series. I know the kernel debugging portion was a bit rushed, and for that, I apologize. I had an entire segment dedicated to kernel debugging, the intricacies of MSRs as well as the incredible CPUID instruction, and all of that planned out for this video but as you could imagine, had I included that, the video would be a month-long. So instead, I'm working on a blog post that will take you into harrowing depths of that entire process, so make sure you look out for it here: www.crow.rip/ ERRATA: - I just realized after rewatching this that I was doing "CONST LPCSTR" when that's not necessary at all since LPCSTR is literally: "typedef const char* LPCSTR;" HAHAHAH LOSING MY MIND tysm for watching, nerds. luv u all terribly
@C5pider9 ай бұрын
Oh mom look i made it into a crow video.
@mohammadalihanfi82379 ай бұрын
Yeah as expected 😅
@crr0ww9 ай бұрын
:blushing_emoji:
@b3twiise8539 ай бұрын
Ohh look it is spider
@Dnsx_plus8 ай бұрын
Aren’t you one of the contributors to Maldev Academy?
@bamboooz32019 ай бұрын
I am a web developer, i don't understand anything, but i love these videos, keep it up!
@crr0ww9 ай бұрын
aw thank you
@gato49209 ай бұрын
Have not even made it this far in the series, but I had to show support. Keep it up, we appreciate you.
@crr0ww9 ай бұрын
i really appreciate that! thank you so much
@user-ik4px2cu1l9 ай бұрын
I literally just finished watching your Native API video and now you upload this, - literally GOD.
@gamerkarir3069 ай бұрын
omg you gave me a hart attack with the fear and hunger sound 1:25
@crr0ww9 ай бұрын
XDD
@sxmourai68979 ай бұрын
I'm currently making an os and it's great to see the point of view of the userland people on the other side =) + I've learned some stuff, it's grealty explained, continue like that !
@crr0ww9 ай бұрын
thank you so much! :)
@jaitjacob9 ай бұрын
babe wake up crow just uploaded a new malware video
@crr0ww9 ай бұрын
WAKE BABE UP, WE HAVE MALWARE TO MAKE
@Raxis9 ай бұрын
Hell yes another crow video! Still need to go back and catch up on the previous vid but it's great seeing more stuff from you!
@Ale_Dev9 ай бұрын
Man!!! Finally a new video :D Didn't still watched it entirely but it's obviously gonna be fantastic. Ik doing this videos takes time and commitment but please do them more often ahah!
@crr0ww9 ай бұрын
thank you so much!! yeah it's a ton of work but your response(s) make all of the grey hairs super worth it :)
@t32prod.989 ай бұрын
just came across your page by pure chance and watched your processes, handles, and threads video. headed over to your website and your statement in the faq section was very wholesome and encouraging. thank you for documenting your journey and having a positive outlook for newcomers :) deff earned my sub and a bookmark to your blog.
@Babachick3n2 ай бұрын
Literally the Dale Philip of the hacking world
@deleted_account-u3w9 ай бұрын
Your videos are so good, my tiny brain can finally understand all this stuff. Keep it up!
@muha06449 ай бұрын
Man you gotta make more videos, you're the new liveoverflow but more funny and less serious.
@crr0ww9 ай бұрын
thank you so much for your comment; I really appreciate that! liveoverflow's the GOAT tho :')
@muha06449 ай бұрын
@@crr0ww yeah, he is! But ever since he started using his face on camera his videos seem too "formal" or professional. More like John Hammond, but if he was German I guess...
@tablettablete1869 ай бұрын
This is why we need syscall kernel interception like we do in Linux with SECCOMP. Great video by the way!
@VloggerMan-if9bt19 сағат бұрын
seeing him go from using vscode to neovim was better than watching my child grow up
@zombieboyxx2 ай бұрын
"If your prefrontal cortex misses a QuickTime event" 😂😂😂 you have to be the funniest cybersec youtuber
@phantompuma2289 ай бұрын
NEW CROW VID?? LETS GOOO
@crr0ww9 ай бұрын
@QnF5EPuArXEX3bP7 ай бұрын
I've just discovered your channel and OMG keep it up man, you're a GEMMMM
@rosehacksyoutube9 ай бұрын
Quality! Your channel is going to blow up.
@MeharKlair9 ай бұрын
He's finally back after his hibernation
@gitgudsec9 ай бұрын
He’s back!
@crr0ww9 ай бұрын
hey!! thank you so much for commenting, brother! i LOVE your videos as well, such a unique style! keep up the GREAT work, you'll get really far I can already tell
@gitgudsec9 ай бұрын
@@crr0ww 🖤
@christian_leone9 ай бұрын
Nice vid as always crow, thanks
@crr0ww9 ай бұрын
thank you so much! i'm really happy you liked it :)
@jonas-ke4qz3 ай бұрын
This editing is awesome
@Negalijus3709 ай бұрын
Inspiring next generation of Greybeards ⚡⚡
@vizzil16759 ай бұрын
I just finished my os class. Really love it haha
@EnLopXf9 ай бұрын
Yow the legend is back!!
@4sakenGol3m6 ай бұрын
Your LOCO❤😂 4:16 Love the content; keep up the incredible work!
@dadamnmayne9 ай бұрын
Thank you. Prob going to watch this at least 100 times.
@crr0ww9 ай бұрын
i appreciate you, brother! thank you so so much
@dadamnmayne9 ай бұрын
@@crr0ww 19:01 that API hooking/unhooking video tho... 🙏
@azdirtnaper9 ай бұрын
I love watching these even though I don't understand any of the shit that is going on lmaooo
@lime52339 ай бұрын
FINALLY A VIDEO
@MeharKlair9 ай бұрын
CROW SIR SIR CROW YESSSSSSSSSSSSSS
@11superjump9 ай бұрын
this video taught me a lot, love it :)
@crr0ww9 ай бұрын
ah, great!! that means i've done my job haha thank you so much for commenting
@HTWwpzIuqaObMt9 ай бұрын
Welcome back ❤
@crr0ww9 ай бұрын
@backinyourcommentsectionag31919 ай бұрын
CROW WHERE HAVE YOU BEEN I MISS YOU LOVE
@noorkhara14299 ай бұрын
HES BACKKKKK !!!!! 🎉🎉🎉🎉
@crr0ww9 ай бұрын
@stolfoch.9 ай бұрын
mr crow i love you
@korsate9 ай бұрын
YAYAYAYAYAYA MY GOAT UPLOADED
@alec32179 ай бұрын
LESS FUCKING GOOOOOOOOO, new crow vid
@crr0ww9 ай бұрын
@alec32179 ай бұрын
@crr0ww do you have a discord server or something similar?
@ferverrel55199 ай бұрын
Used your promo for the maldev academy baby!
@tracetv81159 ай бұрын
A video about antivirus intrusion would be nice.
@Beryesa.9 ай бұрын
Operation Tux continues 😅
@madezra649 ай бұрын
What's the music at 11:50? Starts a little earlier then that but Shazam as failing me cause it's copyright free music :(
@Bl45ty9 ай бұрын
_
@crr0ww9 ай бұрын
HAHAHAHA LETS GOOOOO i wrote it down on some sticky notes so I don't forget it again :')
@Bl45ty9 ай бұрын
@@crr0ww 😂♥
@meharklair37559 ай бұрын
i would like to inject my malware into crow :3
@crr0ww9 ай бұрын
BAHAHAHAHAHA
@nobody-m6fАй бұрын
what is the fond and IDE that you are using?
@meharklair37559 ай бұрын
CROW CROW CROW
@HelpersSoftware9 ай бұрын
Awesome ❤ Thanks!What a theme name in visual studio bro?
@ericytff73889 ай бұрын
MORE TUTORIALLS WE SHALL SEE
@nightlockhayze9 ай бұрын
Crow why did you just ignore us and drop this new video asdjasdhakjdadasda ily always
@dompurified9 ай бұрын
mom, look! cr0w uploaded!
@arnabthakuria22439 ай бұрын
Great vid as always. What font is that ?
@vesmirnyjay9 ай бұрын
touching everything
@crr0ww9 ай бұрын
😭
@mnesicles.9 ай бұрын
Sos un capo cuervito. Excelente contenido ✨
@brunom121119 ай бұрын
that's my goat right there
@PlanetComputer9 ай бұрын
thanks crow
@crr0ww9 ай бұрын
it's my pleasure
@DM-qm5sc9 ай бұрын
Imagine calling pantaloons trousers LuL
@czerwonejakmleko4018 ай бұрын
does anyone know what font he uses?
@honestsniping19 ай бұрын
Aren't all variables saved in the .TEXT section either way? Why did he manually added that code at 29:00?
@nikhilt37558 ай бұрын
variables go into .data section. if we specify to allocate in .text section then contents of our variable can be executed because .text section is executable by default
@honestsniping18 ай бұрын
Thanks for the reply. But if I define the shellcode variable inside main(), it will be located in .TEXT and not .DATA. And after your logic, it would mean that shellcodes defined in the global section of the program (not within main) cannot be executed. I'm probably missing something here...
@Trikstarck9 ай бұрын
Let’s GOOOOOO 🎉🎉🎉🎉🎉🎉
@DaxSudo9 ай бұрын
All of this just serves my point. The NT Kernel f***ing sucks balls.
@synrage9 ай бұрын
finally bro
@mohammedzaid66349 ай бұрын
Hey crow whats up man ✋
@crr0ww9 ай бұрын
hey!! how are you :P
@GHOST-qx6wi9 ай бұрын
finally
@ReconTechBF39 ай бұрын
all your syscalls are belong to us
@dneial.9 ай бұрын
Can anyone link the equivalent of this but on Mac plz 🤗
@hiddengo32327 ай бұрын
how to modify exploit code
@lumikarhu9 ай бұрын
a more in-depth video on indirect syscalls would be great, im not sure everything was covered, noob here. i can only cross check with the maldevs module. PS. i came with the power of thousand suns, you should get exclusive rights for maldev sponsoring, why watch boring jurassic park man when crow videos exist? lmfao please mr. d0x do this, the world will be a better place if crow becomes THE teacher. me not knowing C and low level programming well had some difficulties understanding the material but now so much has gotten clearer it's not even funny. ILY Crow
@gordonfreimann9 ай бұрын
whats your font in vs?
@mastergame15993 ай бұрын
+1
@uh39069 ай бұрын
Lmao just thought about you yesterday
@hell0kitje9 ай бұрын
MOB PSYCHO 100!
@fodk70219 ай бұрын
What do you mean ?
@hell0kitje9 ай бұрын
@@fodk7021 its anime.
@fodk70219 ай бұрын
@@hell0kitje yes but where is it in the video.
@hell0kitje9 ай бұрын
@@fodk7021 its in thumbail
@fodk70219 ай бұрын
@@hell0kitje I thought it was midoriya from my hero academia
@Mika_5659 ай бұрын
Thats cool but how do I get free robux
@crr0ww9 ай бұрын
YOU THINK I'M AT *THAT* LEVEL, MIKA? THAT'S TOO ADVANCED FOR ME!1:$!$:
@FictionHubZA9 ай бұрын
Nice
@raven-vr5yz9 ай бұрын
yo man nice nickname
@crr0ww9 ай бұрын
thank you RAVEN, nice nickname as well, RAVEN :>
@snapshot88869 ай бұрын
Bro!!!
@SpYlE-9 ай бұрын
bro.. iam from bangldesh ..plzz make more video
@marcelocabral3894 ай бұрын
I'm not gonna lie, i didn't understand almost anything from the video, this "layer" of execution in assembly code and things written in hexadecimal gave me a headache, great video anyway!
@jacobjohnson15019 ай бұрын
heyyo you're alive ?
@crr0ww9 ай бұрын
YESSIR!!! :)
@nordgaren23589 ай бұрын
Lmao. Urien spotted.
@mongru9 ай бұрын
ah yes here i am again
@crr0ww9 ай бұрын
and i'm so happy u are
@cagdasisk76409 ай бұрын
ur the best
@sinatra029 ай бұрын
a group of crows are called a murder... are we, as your fan base... murderers?
@4sakenGol3m6 ай бұрын
WTF 9:56 😂😂😂😂😂😂😂😂
@lavender06669 ай бұрын
hot
@meharklair37559 ай бұрын
crow is so sexy
@lumikarhu9 ай бұрын
psst hey kid, wanna buy some skooma?
@theexplosionist20199 ай бұрын
I don't understand what you're trying to achieve. You can't do "useful" functions such as virtualalloc or openprocess to modify processes' memory without admin access. Inline assembly works in VS2022 just fine. I was thinking rax is the GetProcAddress but its a special number. That makes using syscall even more pointless. unsigned long long count = 9; __asm { mov rax, 31H lea r10, count xor edx,edx xor r8d, r8d xor r9d, r9d sub rsp,40 syscall add rsp,40 } std::cout
@Bo_om25909 ай бұрын
do you have a job? what is it?
@imahotdogdonteatme87229 ай бұрын
Holy shit! I thought yt assasinated him!
@crr0ww9 ай бұрын
THEY GOT REALLY *REALLY* close 😓 still have more videos to make, can't stop now :')