Table of Contents
- A Quick Introduction to Malware Development
- Exploring Various Malware Injection Attacks
- Mastering Malware Persistence Mechanisms
- Mastering Privilege Escalation on Compromised Systems
- Anti-Debugging Tricks
- Navigating Anti-Virtual Machine Strategies
- Strategies for Anti-Disassembly
- Navigating the Antivirus Labyrinth – a Game of Cat and Mouse
- Exploring Hash Algorithms
- Simple Ciphers
- Unveiling Common Cryptography in Malware
- Advanced Math Algorithms and Custom Encoding
- Classic Malware Examples
- APT and Cybercrime
- Malware Source Code Leaks
- Ransomware and Modern Threats

