Learn the best malware techniques for Windows OS, with content ranging from beginner to advanced levels. All implementations are developed in C++.
Gain access to a new malware development module every 15 days. And of course, all the previous ones. Each module offers over 45 minutes of reading time. Available from $5/month, $12.99/3 months, or $49.99/year. Alternatively, you can purchase individual modules for $1.99 each.
You can also get lifetime access to all the modules for a one-time payment of $100.
*We accept PayPal, Credit Card and Cryptocurrency, for this last option send a email to s12deff@gmail.com*
1 Month Subscription
Monthly Payment

3 Months Subscription
Quarterly Payment

1 Year Subscription
Annual Payment

Lifetime Access
Unique Payment

One-time purchases ($1.99) are limited to single modules. For full access to all modules, including new and previous content, consider our subscription, or lifetime plans.
| Module | Category | Duration | Pages | Date | Actions |
|---|---|---|---|---|---|
Command & Control (C2) Server – Part I
This module shows you how to build a secret communication system using DNS, just like real malware does. You will learn how to send commands and get results from a victim machine using only DNS requests and replies.
|
Infrastructure | 46 min. | 40 | 06/04/2025 | |
Userland Rootkit Development
Master userland rootkit development with Windows API hooking, DLL injection, and stealth techniques. Learn Detours for API interception, memory-mapped files for IPC, and persistence evasion through hands-on coding
|
Manipulation | 38 min. | 41 | 23/03/2025 | |
Token Manipulation
This module explored how Windows tokens control access and privileges in a system. We learned about different token types, like primary and impersonation tokens, and how attackers can steal or modify them to gain higher privileges.
|
Manipulation | 49 min. | 56 | 09/03/2025 | |
Playing with Thread Context
This module covers how the CONTEXT structure is used for thread hijacking, code injection, and anti-debugging techniques. Understanding these methods helps both attackers and defenders improve their strategies.
|
Manipulation | 41 min. | 55 | 23/02/2025 | |
Sandboxes for Malware Developers
Learn how to test and analyze malware safely using sandboxes and antivirus tools.
Gain practical skills in secure malware analysis environments. |
Analysis | 32 min. | 35 | 09/02/2025 | |
EDR & Antivirus Evasion Part II
Explore comprehensive methods for EDR and Antivirus Evasion in Windows OS.
Advanced techniques to bypass modern security solutions. |
Evasion | 54 min. | 57 | 25/01/2025 | |
Windows Persistence for Malware Developers
The โWindows Persistence for Malware Developersโ module is the perfect post where we will see some techniques to get the malware persistence in a victim Windows system
|
Persistence | 52 min. | 54 | 09/01/2025 | |
Encryption Ciphers
The โEncryption Ciphersโ module provides an in-depth guide to encryption ciphers frequently used by malware developers to obfuscate and protect malicious code, payloads, and sensitive strings from detection.
|
Evasion | 31 min. | 37 | 21/12/2024 | |
Inter Process Connection
The โInter Process Connectionโ module that basically teaches the ability of some malware to share data through different processes. Basically this means that you can connect all your malware even when you are targeting the victim system through different processes.
|
IPC | 49 min. | 48 | 05/12/2024 | |
Malicious Kernel Driver Development Part II
The โMalicious Kernel Driver Developmentโ module teaches the creation and manipulation of Windows kernel-mode drivers.
|
Kernel | 47 min. | 57 | 20/11/2024 |