Udemy

Red Teaming | Exploit Development with Assembly & C | MSAC+

Enroll Now
  • 58,016 Students
  • Updated 1/2026
4.1
(409 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Language
English
Taught by
OCSALY Academy | 560.000+ Students
Rating
4.1
(409 Ratings)

Course Overview

Red Teaming | Exploit Development with Assembly & C | MSAC+

Exploit Development: Shellcode Execution, Bad Character Analysis, Segmentation Fault, Buffer Overflow, Enroll Now & more

Are you ready to unlock the secrets of reverse engineering and take your cybersecurity and programming skills to the next level? Whether you're an aspiring ethical hacker, a cybersecurity professional, or a programming enthusiast, this comprehensive course will empower you with the tools and techniques needed to analyze malware, write assembly programs, and develop powerful exploits.

From foundational assembly language concepts to advanced exploit development, you’ll gain hands-on experience with industry-standard tools like Ghidra, IDA Pro, SASM, and more.

What You'll Learn:

  • Malware Analysis & Reverse Engineering: Learn how to use tools like Ghidra to dissect and understand malware behavior.

  • Binary Analysis Techniques: Master the 4 stages of binary compilation—preprocessing, compilation, assembly, and linking.

  • Executable Formats (ELF & PE): Explore Linux ELF and Windows PE formats to analyze executables.

  • Assembly Programming: Write, debug, and execute 64-bit assembly programs from scratch.

  • Shellcoding & Exploit Development: Develop shellcode and exploit vulnerabilities to gain system access.

  • Buffer Overflow Attacks: Identify and exploit buffer overflow vulnerabilities using Metasploit, Immunity Debugger, and manual techniques.

  • Network Shells: Create TCP bind and reverse shells to understand real-world exploitation techniques.

Why This Course?

  • Comprehensive Curriculum: Cover everything from malware analysis and binary analysis to advanced exploit development.

  • Practical, Hands-On Learning: Dive deep into real-world projects and step-by-step labs to reinforce your knowledge.

  • Industry-Standard Tools: Gain expertise in Ghidra, IDA Pro, SASM, and more, used by cybersecurity professionals globally.

  • Career Advancement: Develop skills in high demand across ethical hacking, red teaming, and cybersecurity domains.

Course Breakdown:

  1. Introduction: Get started with the essentials and understand why assembly is the key to unlocking open-source knowledge.

  2. Lab Setup: Set up your environment with SASM, Ghidra, IDA Pro, and other essential tools.

  3. Malware Analysis with Ghidra: Begin analyzing malware, extracting system files, and utilizing OSINT for reverse engineering.

  4. Binary Analysis: Understand how binaries compile, load, and execute.

  5. Assembly Programming: Write and debug 64-bit assembly programs, develop projects, and understand system calls.

  6. Shellcoding & Exploitation: Create shellcodes, analyze vulnerabilities, and build exploits for real applications.

  7. Buffer Overflow Exploits: Exploit buffer overflow vulnerabilities to gain shell access.

Who Should Enroll?

  • Cybersecurity professionals aiming to enhance reverse engineering skills.

  • Ethical hackers and red teamers seeking practical experience in exploit development.

  • Students or programmers passionate about low-level programming and system internals.

  • IT professionals exploring advanced debugging and vulnerability exploitation techniques.

Prerequisites:

  • Basic programming knowledge is helpful but not mandatory.

  • A willingness to learn and explore complex concepts.


This is not just another course - it’s 33 hours of expert-led content designed to take you from beginner to advanced in reverse engineering, malware analysis, and exploit development. Whether you're looking to boost your career or master low-level programming, this course is your ultimate guide.

Enroll now to begin your journey and discover how limitless your skills can become. Let’s hack the future—together!


Reverse engineering, malware analysis, exploit development, buffer overflow, Ghidra tutorial, assembly programming, ethical hacking, cybersecurity, shellcoding, binary analysis, Linux ELF, Windows PE, vulnerability exploitation, TCP reverse shell, Metasploit.

Course Content

  • 47 section(s)
  • 173 lecture(s)
  • Section 1 Introduction
  • Section 2 Introduction to Computer Engineering & Science
  • Section 3 Computer Arithmetic for Begineers
  • Section 4 Boolean Algebra & Low Level Electronics
  • Section 5 Combinational Logic Circuits
  • Section 6 Creating Lab
  • Section 7 Starting with Ghidra
  • Section 8 Introduction to Computer Engineering & Science
  • Section 9 Computer Arithmetic for Begineers
  • Section 10 Boolean Algebra
  • Section 11 Electronics
  • Section 12 Introduction to Ghidra
  • Section 13 Introduction to Low Level Computing
  • Section 14 Introduction to Reverse Engineering and Exploit Development
  • Section 15 Assembly Language
  • Section 16 Introduction to Ghidra
  • Section 17 Low Level Computing
  • Section 18 Introduction to Reverse Engineering
  • Section 19 Assembly Language
  • Section 20 Malware Analysis and Reverse Engineering with Ghidra
  • Section 21 Binary Analysis
  • Section 22 Symbols, Stripped and Not Stripped Binaries
  • Section 23 Linux - ELF Format
  • Section 24 Windows - PE Format
  • Section 25 IDA Pro _ IDA Freeware
  • Section 26 Writing our first 64Bit Assembly Program
  • Section 27 Disassembly and Disassembler
  • Section 28 Understanding Data Types
  • Section 29 Debugging x86-64
  • Section 30 Writing our second 64Bit Assembly Program
  • Section 31 OR XOR AND
  • Section 32 Data Display Debugger - DDD
  • Section 33 Jump and Loop
  • Section 34 Assembly Project using Jump and Loop
  • Section 35 Memory Manipulation
  • Section 36 Calculator with Assembly
  • Section 37 First but not last SHELLCODE
  • Section 38 Malware Injection with JMP Instruction
  • Section 39 Shellcode with Stack Technique
  • Section 40 Execve Syscall Technique (Gaining Shell)
  • Section 41 TCP Bind Shell
  • Section 42 Reverse TCP Shell
  • Section 43 Finding and Attacking on Buffer Overflow Vulnerabilities
  • Section 44 Metasploit 101
  • Section 45 Exploit Development
  • Section 46 Developing Exploit for Real Applications
  • Section 47 Gaining Shell Access from Buffer Overflow

What You’ll Learn

  • Mastering Shellcode Execution: Gain a comprehensive understanding of shellcode execution techniques and their role in system hacking., Identifying Bad Characters: Learn to identify and handle bad characters in shellcode, ensuring its effectiveness and reliability., Segmentation Fault Analysis: Explore the nuances of segmentation faults and discover strategies to overcome them when executing shellcode., Ethical Hacking Fundamentals: Understand the ethical framework of hacking and how to apply these techniques responsibly., Developing Custom Shellcode: Develop your own custom shellcode to exploit system vulnerabilities effectively., Hands-On Practical Scenarios: Engage in practical demonstrations and exercises to apply theoretical knowledge in real-world scenarios., System Compromise Techniques: Learn techniques to compromise systems ethically by executing shellcode., Vulnerability Exploitation: Discover vulnerabilities within systems and exploit them using shellcode to gain access., Advanced Bad Character Mitigation: Dive deep into advanced techniques for identifying, analyzing, and mitigating bad characters in shellcode., Building Ethical Hacking Skills: Equip yourself with practical skills in ethical hacking, enhancing your cybersecurity expertise., Understand the significance of Assembly language in open-source exploration., Gain insights into the course structure and objectives., Install and set up the SASM development environment., Download and configure Ghidra, IDA Pro, and JDK for effective lab usage., Open and navigate projects within Ghidra., Explore and utilize key features of Ghidra for code analysis., Perform real malware analysis using Ghidra., Analyze suspicious strings and employ OSINT techniques in reverse engineering., Extract system files from malware and manipulate function names., Break down the four stages of binary compilation., Understand the preprocessing, compilation, assembly, and linking phases of binary analysis., Utilize READELF to view symbolic information., Analyze both stripped and not stripped binaries for key insights., Explore the ELF format and understand its executable and linkable features., Learn about ELF fields and program header fields., Grasp the fundamentals of the Windows PE format for executable files., Familiarize yourself with IDA Pro and its key functionalities., Explore useful tabs within the IDA Pro interface., Write a "Hello World" program using a makefile., Understand the advantages of NASM and compare different assemblers., Comprehend the theory behind disassembly., Explore the concept of disassembly and its practical applications., Understand CPU architectures and binary data types., Convert decimal to binary using basic mathematical operations., Initiate and set up GDB, exploring various flavors., Debug programs, locate variables in memory addresses, and enhance debugging skills., Code an assembly file, analyze output with GDB, and create a makefile., Learn the operations of OR, XOR, NOT, and AND in assembly language., Develop an assembly program for analysis using DDD., Analyze previously written code and interpret register values using DDD., Identify and troubleshoot errors in assembly programming., Implement conditional jumps and loops in assembly code., Develop a project involving loops and a calculator using assembly language., Test and evaluate the completed project., Work on the EXABYTE project involving memory manipulation., Test and analyze the project using Readelf and GDB., Define variables, perform addition and subtraction in assembly., Explain registers in practice and complete the section., Develop a custom shellcode and troubleshoot segmentation faults., Identify and fix bad characters in shellcode execution., Create shellcode with JMP instruction for malware injection., Inject shellcode and build an exploit for practical application., Compile and test shellcode using stack technique., Implement the Execve syscall with C for gaining shell access., Successfully gain shell access using the Execve syscall., Program the C side of a reverse bind shell., Develop assembly code for Listen, Bind, and Accept syscalls., Create a functional and secure TCP bind shell.


Reviews

  • T
    Trần Đinh Xuân Thành
    5.0

    Good foundation knowledge. Need more labs and quizzes.

  • R
    Rush Ford
    1.0

    Total waste of money, instructor not really prepared makes mistakes, sometimes snickers during explanations. Most of them are long winded, repetitive and borderline useless due to the nature of the explanations. You can find better free videos that explain 2s complement for example in less time than this instructor droning. Probably the worst course I've purchased on Udemy. Can't get a refund but oh well here's the review.

  • K
    Kuldeep singh shekhawat
    5.0

    Amazing, above expectations!

  • A
    Abdul Salam
    5.0

    The offensive hacking is very interesting for me.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed