Subscription Plans Available

One-time purchases ($1.99) are limited to single modules. For full access to all modules, including new and previous content, consider our subscription, or lifetime plans.





Module Category Duration Pages Date Actions
Windows Credential Dumping Techniques


Windows Credential Dumping Techniques

This module covers the evolution of Windows credential dumping techniques, from classic LSASS memory extraction to advanced bypasses of Credential Guard and Remote Credential Guard using protocol abuse and chosen-challenge NTLMv1 attacks.

Injection 32 min. 34 25/01/2026
Frankenstein APC Injection


Frankenstein APC Injection

This module covers Frankenstein APC Injection, a novel stealthy process injection technique that reuses existing system handles, RWX memory regions, and special APCs to execute shellcode without triggering common EDR detections.

Injection 35 min. 39 11/01/2026
Process Injection Part II


Process Injection Part II

In this second part of the Process Injection we show various interesting techniques like Windows process injection methods including APC-based execution, debugger-assisted hijacking, and memory-mapped migration.

Injection 46 min. 49 14/12/2025
Building Command and Control Server based in Tor Part II


Building Command and Control Server based in Tor Part II

In this second part of the Onion C2 implementation, we have significantly enhanced our command and control infrastructure with enterprise-grade features that transform it from a basic proof-of-concept into robust operational platform.

Infrastructure 49 min. 51 30/11/2025
Building a Windows Kernel Rootkit Part I


Building a Windows Kernel Rootkit Part I

This module covers the fundamentals of Windows Kernel Rootkit development, including kernel architecture, driver programming, stealth techniques, and ethical considerations.

Kernel 39 min. 44 16/11/2025
Initial Access Framework


Initial Access Framework

This module provides a guide with various creative techniques to perform the initial access in a Red Team operation.

Initial Access 36 min. 43 03/11/2025
Beyond the Reverse Shell


Beyond the Reverse Shell

This module provides a guide with various alternative to the typical Reverse Shell for Red Team operations.

Injection 31 min. 38 19/10/2025
Android Malware Development


Android Malware Development

This module provides a complete learning path from basic Android security concepts to advanced malware development techniques used by threat actors and security researchers.

Android 42 min. 51 05/10/2025
Crypter Introduction


Crypter Introduction

Overview of crypter development and its importance in malware development.

Evasion 39 min. 44 21/09/2025
Complete OPSEC Guide


Complete OPSEC Guide

This module provides operational security guidelines to safeguard sensitive data, mitigate risks, and ensure resilience.

OPSEC 49 min. 51 07/09/2025