Subscription Plans Available

One-time purchases ($1.99) are limited to single modules. For full access to all modules, including new and previous content, consider our subscription, or lifetime plans.





Module Category Duration Pages Date Actions
Onion Implementation in Malware Development


Onion Implementation in Malware Development

This comprehensive module explores the implementation and application of Tor hidden services (Onion services) in malware development and command-and-control (C2) infrastructure

Infrastructure 29 min. 31 24/08/2025
Advanced LNK File Attack Techniques


Advanced LNK File Attack Techniques

This comprehensive report analyzes advanced LNK (Windows Shortcut) file attack techniques that have become increasingly prevalent in modern cyber attacks.

Injection 42 min. 43 10/08/2025
Shellcode Encryption


Shellcode Encryption

This module introduces you to the different algorithm mechanisms to encrypt shellcode.

Evasion 31 min. 27 27/07/2025
Beacon Object File (BOF)


Beacon Object File (BOF)

This module introduces beacon object files, exploring their role in command-and-control (C2) communications used by malware such as Cobalt Strike.

BOF 47 min. 54 13/07/2025
Introduction to YARA for Blue Team Operations


Introduction to YARA for Blue Team Operations

Module providing the introduction to how YARA empowers blue team analysts to detect threats using customizable, rule-based pattern matching.

Analysis 28 min. 33 29/06/2025
Introduction to Android Malware Development


Introduction to Android Malware Development

Module providing the introduction to the Android Malware Development

Android 58 min. 76 16/06/2025
Event Tracing for Windows (ETW)


Event Tracing for Windows (ETW)

Educational module providing foundational knowledge on some of the bests ETW red team operations

Evasion 47 min. 54 01/06/2025
RAT Fundamentals


RAT Fundamentals

Educational module providing foundational knowledge on Remote Access Tools (RATs) in the context of the modern security landscape

Development 51 min. 63 18/05/2025
Analyzing RAM with Volatility


Analyzing RAM with Volatility

In this session, weโ€™ll be analyzing system RAM or specific processes, searching for patterns or values related to malware

Analysis 21 min. 31 05/05/2025
Malicious Office Documents with VBA Macros


Malicious Office Documents with VBA Macros

This module teaches how to craft macro-enabled Office documents that serve as initial access payloads in penetration testing or red team engagements. From building a secure lab to generating reverse shellcode with Metasploit, encoding it, and injecting it via VBA macros.

Injection 41 min. 46 20/04/2025