Learn the best malware techniques for Windows OS, with content ranging from beginner to advanced levels. All implementations are developed in C++.
Gain access to a new malware development module every 15 days. And of course, all the previous ones. Each module offers over 45 minutes of reading time. Available from $5/month, $12.99/3 months, or $49.99/year. Alternatively, you can purchase individual modules for $1.99 each.
You can also get lifetime access to all the modules for a one-time payment of $100.
*We accept PayPal, Credit Card and Cryptocurrency, for this last option send a email to s12deff@gmail.com*
1 Month Subscription
Monthly Payment

3 Months Subscription
Quarterly Payment

1 Year Subscription
Annual Payment

Lifetime Access
Unique Payment

One-time purchases ($1.99) are limited to single modules. For full access to all modules, including new and previous content, consider our subscription, or lifetime plans.
| Module | Category | Duration | Pages | Date | Actions |
|---|---|---|---|---|---|
Onion Implementation in Malware Development
This comprehensive module explores the implementation and application of Tor hidden services (Onion services) in malware development and command-and-control (C2) infrastructure
|
Infrastructure | 29 min. | 31 | 24/08/2025 | |
Advanced LNK File Attack Techniques
This comprehensive report analyzes advanced LNK (Windows Shortcut) file attack techniques that have become increasingly prevalent in modern cyber attacks.
|
Injection | 42 min. | 43 | 10/08/2025 | |
Shellcode Encryption
This module introduces you to the different algorithm mechanisms to encrypt shellcode.
|
Evasion | 31 min. | 27 | 27/07/2025 | |
Beacon Object File (BOF)
This module introduces beacon object files, exploring their role in command-and-control (C2) communications used by malware such as Cobalt Strike.
|
BOF | 47 min. | 54 | 13/07/2025 | |
Introduction to YARA for Blue Team Operations
Module providing the introduction to how YARA empowers blue team analysts to detect threats using customizable, rule-based pattern matching.
|
Analysis | 28 min. | 33 | 29/06/2025 | |
Introduction to Android Malware Development
Module providing the introduction to the Android Malware Development
|
Android | 58 min. | 76 | 16/06/2025 | |
Event Tracing for Windows (ETW)
Educational module providing foundational knowledge on some of the bests ETW red team operations
|
Evasion | 47 min. | 54 | 01/06/2025 | |
RAT Fundamentals
Educational module providing foundational knowledge on Remote Access Tools (RATs) in the context of the modern security landscape
|
Development | 51 min. | 63 | 18/05/2025 | |
Analyzing RAM with Volatility
In this session, weโll be analyzing system RAM or specific processes, searching for patterns or values related to malware
|
Analysis | 21 min. | 31 | 05/05/2025 | |
Malicious Office Documents with VBA Macros
This module teaches how to craft macro-enabled Office documents that serve as initial access payloads in penetration testing or red team engagements. From building a secure lab to generating reverse shellcode with Metasploit, encoding it, and injecting it via VBA macros.
|
Injection | 41 min. | 46 | 20/04/2025 |