How Hackers Create Undetectable Malware and Viruses - 1. We Begin Here

1. Welcome and Introduction
https://ds2play.com/d/is2cr4dj30p3

2. Introduction to Undetectable Malware
https://ds2play.com/d/mv2earm1rscz

How Hackers Create Undetectable Malware and Viruses - 2. Understanding Malware and Creating the Hacking Environment

1. Installing Python and Pip
https://ds2play.com/d/bhja12qo06ck

2. Installing Veil-Framework
https://ds2play.com/d/sgb9yf1sdsod

3. Setting Up The Veil Framework
https://ds2play.com/d/x1yh9e6k06qf

4. Installing Gnome Desktop
https://ds2play.com/d/xch11n1ghf2r

How Hackers Create Undetectable Malware and Viruses - 3. Veil and Metasploit

1. Wine Mono and Veil-Evasion Installation
https://ds2play.com/d/9waiu1tlcng0

2. Installing Metasploit
https://ds2play.com/d/sk2hzbwkeexq

3. Metasploit Installation Complete
https://ds2play.com/d/63xj77bh5o20

4. Testing MSF Console
https://ds2play.com/d/ivkeeryg3xe8

5. Veil Evasion Final Installation
https://ds2play.com/d/2mtwzxaxmkgv

6. Adding the Metasploit Folder to Veil Installation
https://ds2play.com/d/f61vqgxpfo5q

7. Introduction to Veil and The Importance in Ethical Hacking
https://ds2play.com/d/e0x9224u73hm

How Hackers Create Undetectable Malware and Viruses - 4. How Hackers Create Undetectable Malware

1. Creating an Exploit
https://ds2play.com/d/bgx0id79h1s1

2. Testing Exploit on Windows 10 Machine
https://ds2play.com/d/lxv1bu0gckbe

3. Encrypting Payload
https://ds2play.com/d/im1ldzeqa271