Subscription Plans Available

One-time purchases ($1.99) are limited to single modules. For full access to all modules, including new and previous content, consider our subscription, or lifetime plans.





Module Category Duration Pages Date Actions
Command & Control (C2) Server - Part I


Command & Control (C2) Server – Part I

This module shows you how to build a secret communication system using DNS, just like real malware does. You will learn how to send commands and get results from a victim machine using only DNS requests and replies.

Infrastructure 46 min. 40 06/04/2025
Userland Rootkit Development


Userland Rootkit Development

Master userland rootkit development with Windows API hooking, DLL injection, and stealth techniques. Learn Detours for API interception, memory-mapped files for IPC, and persistence evasion through hands-on coding

Manipulation 38 min. 41 23/03/2025
Token Manipulation


Token Manipulation

This module explored how Windows tokens control access and privileges in a system. We learned about different token types, like primary and impersonation tokens, and how attackers can steal or modify them to gain higher privileges.

Manipulation 49 min. 56 09/03/2025
Playing with Thread Context


Playing with Thread Context

This module covers how the CONTEXT structure is used for thread hijacking, code injection, and anti-debugging techniques. Understanding these methods helps both attackers and defenders improve their strategies.

Manipulation 41 min. 55 23/02/2025
Sandboxes for Malware Developers


Sandboxes for Malware Developers

Learn how to test and analyze malware safely using sandboxes and antivirus tools.
Gain practical skills in secure malware analysis environments.

Analysis 32 min. 35 09/02/2025
EDR & Antivirus Evasion Part II


EDR & Antivirus Evasion Part II

Explore comprehensive methods for EDR and Antivirus Evasion in Windows OS.
Advanced techniques to bypass modern security solutions.

Evasion 54 min. 57 25/01/2025
Windows Persistence for Malware Developers


Windows Persistence for Malware Developers

The โ€œWindows Persistence for Malware Developersโ€ module is the perfect post where we will see some techniques to get the malware persistence in a victim Windows system

Persistence 52 min. 54 09/01/2025
Encryption Ciphers


Encryption Ciphers

The โ€œEncryption Ciphersโ€ module provides an in-depth guide to encryption ciphers frequently used by malware developers to obfuscate and protect malicious code, payloads, and sensitive strings from detection.

Evasion 31 min. 37 21/12/2024
Inter Process Connection


Inter Process Connection

The โ€œInter Process Connectionโ€ module that basically teaches the ability of some malware to share data through different processes. Basically this means that you can connect all your malware even when you are targeting the victim system through different processes.

IPC 49 min. 48 05/12/2024
Malicious Kernel Driver Development Part II


Malicious Kernel Driver Development Part II

The โ€œMalicious Kernel Driver Developmentโ€ module teaches the creation and manipulation of Windows kernel-mode drivers.

Kernel 47 min. 57 20/11/2024