Self-Taught Course

// offensive security training dashboard

19
Courses
155
Modules
6
Categories
3
Difficulty Tiers
01

Reflective Loading & PIC

Building position-independent loaders

5 courses · 43 modules
AceLdr
Memory Evasion Masterclass

Deep dive into reflective DLL loading, return address spoofing, IAT hooking, and the FOLIAGE sleep mask. Master Windows memory internals from PE parsing to full evasion chains.

Beginner Intermediate Advanced C / ASM
  • 1 Windows Memory 101
  • 2 PE File Format
  • 3 PEB & API Hashing
  • 4 Reflective Loading
  • 5 Position-Independent Code
  • 6 IAT Hooking
  • 7 Return Addr Spoofing
  • 8 FOLIAGE Sleep Mask
  • 9 Full Chain & Integration
Stardust
Modern Implant Template Masterclass

Build position-independent C++20 shellcode from scratch. No PE headers, no DLL, no loader stub — pure PIC implant code with compile-time hashing, PEB walking, and module stomping.

Beginner Intermediate Advanced C++20 / NASM
  • 01 Why Stardust Exists
  • 02 C++20 for Shellcode
  • 03 Project Anatomy
  • 04 Position-Independent Code
  • 05 Compile-Time Hashing
  • 06 PEB & API Resolution
  • 07 The symbol<T> Template
  • 08 Linker Script & Sections
  • 09 Module Stomping
  • 10 Full Chain & Extending
Crystal-Loaders
PIC Reflective Loaders with Crystal Palace

Position-independent reflective DLL loading built with Crystal Palace: spec-driven PIC linker, LibTCG PE loading, LibGate indirect syscalls, DFR, Beacon User Data, and extending loaders beyond PoC.

Beginner Intermediate Advanced C / x64 PIC
  • 01 The Loader Problem
  • 02 Crystal Palace
  • 03 LibTCG
  • 04 LibGate Syscalls
  • 05 UDRL Walkthrough
  • 06 Beacon User Data
  • 07 Post-Ex & Aggressor
  • 08 Extending Loaders
Donut
PE-to-Shellcode Masterclass

Convert any EXE, DLL, VBScript, JScript, or .NET assembly into position-independent shellcode. In-memory PE loading, CLR hosting, Chaskey encryption, and AMSI/ETW/WLDP bypass stubs.

Beginner Intermediate Advanced C / x86/x64
  • 01 The PE-to-Shellcode Problem
  • 02 PE Loader Fundamentals
  • 03 .NET CLR Hosting
  • 04 Donut Module Architecture
  • 05 The Donut Loader
  • 06 Encryption & Anti-Detection
  • 07 Advanced Payload Types
  • 08 Full Chain & Detection
COFFLoader
Beacon Object File Loader

Load and execute Beacon Object Files outside Cobalt Strike. COFF parsing, section loading, symbol resolution, relocation processing, and implementing the Beacon API compatibility layer.

Beginner Intermediate Advanced C / x64
  • 01 What Are Beacon Object Files?
  • 02 COFF File Format Deep Dive
  • 03 The BOF API Contract
  • 04 COFF Section Loading
  • 05 Symbol Resolution & Linking
  • 06 Relocation Processing
  • 07 The Beacon Compatibility Layer
  • 08 Full Chain & Writing BOFs
02

Syscalls & API Evasion

Stealthy OS interaction

3 courses · 24 modules
Hell's Gate
Dynamic SSN Resolution & Direct Syscalls

Resolve System Service Numbers at runtime from ntdll stubs, execute direct syscalls from user-mode, and bypass EDR hooks entirely. Covers Halo's Gate and TartarusGate extensions.

Beginner Intermediate Advanced C / x64 ASM
  • 01 EDR Hooking & The Problem
  • 02 Windows Syscall Architecture
  • 03 System Service Numbers (SSN)
  • 04 ntdll.dll Stub Anatomy
  • 05 The Hell's Gate Algorithm
  • 06 Direct Syscall Execution
  • 07 Halo's Gate & TartarusGate
  • 08 Full Chain & Detection
LayeredSyscall
VEH Syscall Evasion Masterclass

Generate legitimate call stack frames with indirect syscalls by abusing Vectored Exception Handling. Hardware breakpoints, CPU trap flags, and context manipulation to bypass user-land EDR hooks.

Beginner Intermediate Advanced C++ / x64
  • 01 EDR Hooks & Detection
  • 02 Syscall Internals & SSN
  • 03 Exception Handling & VEH
  • 04 Hardware Breakpoints
  • 05 Dual-Handler Architecture
  • 06 Call Stack Construction
  • 07 Argument Marshalling
  • 08 Full Chain & Detection
Hooka
Shellcode Loader Generator Masterclass

Generate shellcode loaders with comprehensive evasion. Injection techniques, syscall gates, NTDLL unhooking, AMSI/ETW patching, sandbox detection — all from a Go library and CLI generator.

Beginner Intermediate Advanced Go / Windows
  • 01 Shellcode Loader Intro
  • 02 Injection Techniques
  • 03 Syscalls & Gates
  • 04 Unhooking & Patching
  • 05 Sandbox & Protection
  • 06 Encryption & Obfuscation
  • 07 The Hooka Go Library
  • 08 CLI Generator & Full Chain
03

Process Injection

Getting code into remote processes

4 courses · 33 modules
PoolParty
Thread Pool Injection Masterclass

Abuse Windows thread pool internals for stealthy process injection. Eight variants targeting TP_WORK, TP_TIMER, TP_WAIT, TP_IO, ALPC, and TP_DIRECT — bypassing all major EDRs.

Beginner Intermediate Advanced C++ / x64
  • 01 Process Injection Landscape
  • 02 Windows Thread Pool Architecture
  • 03 Thread Pool Internals
  • 04 Worker Factory Exploitation
  • 05 Timer & Wait Variants
  • 06 I/O Completion & ALPC Variants
  • 07 Direct TP_DIRECT Insertion
  • 08 Full Chain, Detection & Impact
ThreadlessInject
Threadless Process Injection

Inject into remote processes without creating threads. Hook a target function in the remote process so existing threads trigger your shellcode — zero CreateRemoteThread, zero ETW thread creation events.

Beginner Intermediate Advanced C++ / x64
  • 01 The Thread Creation Problem
  • 02 Remote Function Hooking Concept
  • 03 Target Function Selection
  • 04 Memory Allocation in Remote Process
  • 05 The Hook Stub Architecture
  • 06 Installing the Remote Hook
  • 07 Shellcode Execution & Cleanup
  • 08 Full Chain, BOF & Detection
ProcessGhosting
Ghost Process Evasion

Create processes from delete-pending files that AV/EDR cannot scan. Write a payload to a temp file, mark it delete-pending, create a section, spawn the process, then close the handle — the file vanishes.

Beginner Intermediate Advanced C++ / x64
  • 01 Process Creation Internals
  • 02 PE Tampering Techniques Overview
  • 03 File System States & Delete-Pending
  • 04 Creating the Ghost File
  • 05 Section Mapping from Ghost
  • 06 Process & Thread Creation
  • 07 AV/EDR Scan Timing Window
  • 08 Full Chain & Comparison
ShellGhost
Single-Instruction Memory Evasion

Execute shellcode one instruction at a time using INT3 breakpoints and VEH handlers. Only one byte is ever decrypted in memory — the ultimate minimal decryption surface for memory scanner evasion.

Beginner Intermediate Advanced C / x64
  • 01 Memory Scanner Evasion Goals
  • 02 Software Breakpoints & INT3
  • 03 Vectored Exception Handling Deep Dive
  • 04 The ShellGhost Concept
  • 05 RC4 Single-Byte Decryption
  • 06 The VEH Handler Implementation
  • 07 Trap Flag & Single-Stepping
  • 08 Full Chain, Performance & Detection
04

Sleep & Memory Evasion

Hiding in memory at rest

3 courses · 25 modules
Ekko
Sleep Obfuscation Masterclass

Timer-based sleep obfuscation using ROP chains, RC4 encryption, and NtContinue context manipulation. Encrypt implant memory during sleep to evade idle-time memory scanners.

Beginner Intermediate Advanced C / x64
  • 01 Why Sleep Obfuscation Matters
  • 02 Timer Queues & Waitable Timers
  • 03 RC4 Encryption in Evasion
  • 04 ROP Gadgets & NtContinue
  • 05 The Ekko Timer Chain
  • 06 Context Manipulation
  • 07 Stack & Return Address Handling
  • 08 Full Chain, Detection & Variants
ShellcodeFluctuation
Memory Fluctuation Evasion

Toggle shellcode memory between encrypted RW and executable RX on every sleep cycle. Hook Sleep to XOR-encrypt shellcode during idle, defeating Moneta, pe-sieve, and BeaconEye scanners.

Beginner Intermediate Advanced C++ / x64
  • 01 Memory Scanning Threat Model
  • 02 XOR Encryption for Memory Evasion
  • 03 VirtualProtect & Page Permissions
  • 04 Sleep Function Hooking
  • 05 The Fluctuation Algorithm
  • 06 Shellcode Region Tracking
  • 07 Thread Stack Spoofing Integration
  • 08 Full Chain & Comparison
FunctionPeekaboo
LLVM Self-Masking Functions

Compiler-level per-function self-masking via LLVM backend modifications. XOR encryption keeps ~98% of code masked even at sleep 0, defeating memory scanners while maintaining CET compatibility.

Beginner Intermediate Advanced C++ / LLVM
  • 01 Memory Scanning & Sleep
  • 02 LLVM Compiler Architecture
  • 03 PE Internals & Sections
  • 04 Registration & X86RetModPass
  • 05 Prologue & Epilogue Stubs
  • 06 The Handler & XOR Engine
  • 07 Init & Runtime Flow
  • 08 Detection, CET & Nighthawk
05

Call Stack & Control Flow

Spoofing execution traces

2 courses · 16 modules
SilentMoonwalk
Dynamic Call Stack Spoofing

Dynamically spoof call stacks to defeat EDR stack walking. Stack desynchronization, synthetic RUNTIME_FUNCTION entries, ROP-driven frame fabrication, and full syscall dispatch with clean stacks.

Beginner Intermediate Advanced C++ / x64
  • 01 EDR Call Stack Telemetry
  • 02 x64 Stack Frames & Unwinding
  • 03 ROP Fundamentals
  • 04 Stack Desynchronization Theory
  • 05 Gadget Discovery & Selection
  • 06 Synthetic Frame Construction
  • 07 The Full Spoof Engine
  • 08 Detection & Countermeasures
Draugr
Synthetic Stack Frame Evasion

Construct synthetic call stacks that fool EDR stack walkers. Beacon Object Files, x64 unwind metadata parsing, JMP RBX gadgets, and indirect syscalls — making shellcode look like normal thread initialization.

Beginner Intermediate Advanced C++ / ASM / BOF
  • 01 EDR Call Stack Analysis
  • 02 Beacon Object Files
  • 03 x64 Stack Unwinding
  • 04 SSN & Indirect Syscalls
  • 05 Spoof Assembly Routine
  • 06 Synthetic Frame Construction
  • 07 Gadgets & Clean Return
  • 08 Full Chain & Detection
06

Payload Engineering & Kernel

Polymorphism, encoding, and ring 0

2 courses · 16 modules
Shoggoth
Polymorphic Shellcode Engine

Generate polymorphic shellcode with unique decoder stubs on every run. RC4 + random block cipher encryption, asmjit-powered runtime assembly, junk code insertion, and anti-analysis tricks.

Beginner Intermediate Advanced C++ / x86/x64
  • 01 Signature Detection & Polymorphism
  • 02 Polymorphic Engine Concepts
  • 03 asmjit: Runtime Code Generation
  • 04 Shoggoth Architecture Overview
  • 05 The Encryption Layer
  • 06 Decoder Stub Generation
  • 07 Junk Code & Anti-Analysis
  • 08 Full Chain & Detection
Nidhogg
Windows Kernel Rootkit Masterclass

Ring 0 offensive techniques: DKOM process hiding, ETW provider disabling, kernel callback removal, registry/file protection, and memory scanner evasion — all through a kernel driver framework.

Beginner Intermediate Advanced C/C++ / Kernel
  • 01 Kernel vs User-Mode Evasion
  • 02 Windows Kernel Driver Basics
  • 03 Process & Thread Manipulation
  • 04 File & Registry Protection
  • 05 ETW Provider Disabling
  • 06 Kernel Callbacks & Notifications
  • 07 Memory Scanner Evasion
  • 08 Full Chain & Detection