Learn the best malware techniques for Windows OS, with content ranging from beginner to advanced levels. All implementations are developed in C++.
Gain access to a new malware development module every 15 days. And of course, all the previous ones. Each module offers over 45 minutes of reading time. Available from $5/month, $12.99/3 months, or $49.99/year. Alternatively, you can purchase individual modules for $1.99 each.
You can also get lifetime access to all the modules for a one-time payment of $100.
*We accept PayPal, Credit Card and Cryptocurrency, for this last option send a email to s12deff@gmail.com*
1 Month Subscription
Monthly Payment

3 Months Subscription
Quarterly Payment

1 Year Subscription
Annual Payment

Lifetime Access
Unique Payment

One-time purchases ($1.99) are limited to single modules. For full access to all modules, including new and previous content, consider our subscription, or lifetime plans.
| Module | Category | Duration | Pages | Date | Actions |
|---|---|---|---|---|---|
Windows Credential Dumping Techniques
This module covers the evolution of Windows credential dumping techniques, from classic LSASS memory extraction to advanced bypasses of Credential Guard and Remote Credential Guard using protocol abuse and chosen-challenge NTLMv1 attacks.
|
Injection | 32 min. | 34 | 25/01/2026 | |
Frankenstein APC Injection
This module covers Frankenstein APC Injection, a novel stealthy process injection technique that reuses existing system handles, RWX memory regions, and special APCs to execute shellcode without triggering common EDR detections.
|
Injection | 35 min. | 39 | 11/01/2026 | |
Process Injection Part II
In this second part of the Process Injection we show various interesting techniques like Windows process injection methods including APC-based execution, debugger-assisted hijacking, and memory-mapped migration.
|
Injection | 46 min. | 49 | 14/12/2025 | |
Building Command and Control Server based in Tor Part II
In this second part of the Onion C2 implementation, we have significantly enhanced our command and control infrastructure with enterprise-grade features that transform it from a basic proof-of-concept into robust operational platform.
|
Infrastructure | 49 min. | 51 | 30/11/2025 | |
Building a Windows Kernel Rootkit Part I
This module covers the fundamentals of Windows Kernel Rootkit development, including kernel architecture, driver programming, stealth techniques, and ethical considerations.
|
Kernel | 39 min. | 44 | 16/11/2025 | |
Initial Access Framework
This module provides a guide with various creative techniques to perform the initial access in a Red Team operation.
|
Initial Access | 36 min. | 43 | 03/11/2025 | |
Beyond the Reverse Shell
This module provides a guide with various alternative to the typical Reverse Shell for Red Team operations.
|
Injection | 31 min. | 38 | 19/10/2025 | |
Android Malware Development
This module provides a complete learning path from basic Android security concepts to advanced malware development techniques used by threat actors and security researchers.
|
Android | 42 min. | 51 | 05/10/2025 | |
Crypter Introduction
Overview of crypter development and its importance in malware development.
|
Evasion | 39 min. | 44 | 21/09/2025 | |
Complete OPSEC Guide
This module provides operational security guidelines to safeguard sensitive data, mitigate risks, and ensure resilience.
|
OPSEC | 49 min. | 51 | 07/09/2025 |