πŸ‘Ύ
Malware Development Guide
CtrlK
  • πŸš€Introduction
  • 🐀Baby Steps
    • πŸ“”Pre-requisite Knowledge
    • What is Malware?
    • Programming Guide
    • Vulnerability Analysis
  • πŸ‘ΎBasic Malware
    • Fork Bombs
    • Logical Bombs
    • Zip Bombs
    • Keyloggers
    • Wipers
    • ScreenJackers
    • Prependers and Postpenders
    • What's Next?
  • πŸ’€Intermediate Malware
    • Browser Extensions
    • Worms
    • RATs
  • ☠️Advanced Malware
    • Botnets w/ C2 Servers
    • Rootkits and Bootkits
    • Polymorphic Malware
  • Appendix
    • Pivoting
      • Windows: Effing Drivers
      • Windows: Abusing LSASS
    • Elementary Concepts and Stuff
      • Memory Representation
      • Expressions
    • Being Stealthy
      • UAC Evasion
      • OPSEC
      • Code Obfuscation
      • Signing Code and Binary Properties
      • Punycodes
    • Backdoors
    • Windows Process Injection
    • SIM Swapping
    • Quishing
    • RunPE
    • Malware Packers
    • Learning Resources
  • Updates n Stuff
  • Scratchpad
Powered by GitBook
On this page
  1. πŸ‘ΎBasic Malware

What's Next?

Now that you have some idea on making simple pieces of malware like all the "X"-bombs and keyloggers and such, we can move on to intermediate malware. This includes stuff like RATs (remote access trojans), Worms, and much more πŸ‘…

PreviousPrependers and PostpendersNextBrowser Extensions

Last updated 2 years ago