Malware dev lessons
https://x-it.medium.com/lesson-1a-setting-up-your-malware-development-environment-with-visual-studio-and-net-framework-43c6546ac862
https://x-it.medium.com/lesson-1b-using-external-classes-in-c-console-applications-a-step-by-step-guide-741f06740f72
https://x-it.medium.com/lesson-2-collecting-hardware-information-for-malware-development-a0bde03deeee
https://x-it.medium.com/lesson-3-collecting-network-information-for-malware-development-18f25416fd80
https://x-it.medium.com/lesson-4-filtration-techniques-for-malware-development-35b9f4464555
https://x-it.medium.com/lesson-5-browser-theft-in-malware-development-881f1f676022
https://x-it.medium.com/lesson-6-social-theft-in-malware-development-ff4c5dfda739
https://x-it.medium.com/lesson-7-stealing-ftp-clients-with-malware-top-5-popular-source-codes-b9c699ac96e3
https://x-it.medium.com/lesson-8-stealing-vpn-accounts-with-malware-top-4-popular-source-codes-9dbef09eed82
https://x-it.medium.com/lesson-9-stealing-offline-crypto-wallets-with-malware-top-6-popular-source-codes-fe35148894be
https://x-it.medium.com/lesson-10-stealing-accounts-sessions-with-malware-f25217c3b057
https://x-it.medium.com/lesson-11-file-grabbing-made-easy-for-malware-developers-6544f927868c
https://x-it.medium.com/lesson-12-crypto-clipper-stealing-cryptocurrency-like-a-pro-7e47f6cdb413
https://x-it.medium.com/lesson-13-exfiltrating-data-like-a-pro-learn-advanced-techniques-189d3215a727
https://x-it.medium.com/lesson-14-maintaining-persistence-with-malware-development-fd1cde42ee7e
https://x-it.medium.com/014-malware-development-lessons-with-source-code-advance-stealer-development-in-c-53bd16f6b3d
https://x-it.medium.com/lesson-1a-setting-up-your-malware-development-environment-with-visual-studio-and-net-framework-43c6546ac862
https://x-it.medium.com/lesson-1b-using-external-classes-in-c-console-applications-a-step-by-step-guide-741f06740f72
https://x-it.medium.com/lesson-2-collecting-hardware-information-for-malware-development-a0bde03deeee
https://x-it.medium.com/lesson-3-collecting-network-information-for-malware-development-18f25416fd80
https://x-it.medium.com/lesson-4-filtration-techniques-for-malware-development-35b9f4464555
https://x-it.medium.com/lesson-5-browser-theft-in-malware-development-881f1f676022
https://x-it.medium.com/lesson-6-social-theft-in-malware-development-ff4c5dfda739
https://x-it.medium.com/lesson-7-stealing-ftp-clients-with-malware-top-5-popular-source-codes-b9c699ac96e3
https://x-it.medium.com/lesson-8-stealing-vpn-accounts-with-malware-top-4-popular-source-codes-9dbef09eed82
https://x-it.medium.com/lesson-9-stealing-offline-crypto-wallets-with-malware-top-6-popular-source-codes-fe35148894be
https://x-it.medium.com/lesson-10-stealing-accounts-sessions-with-malware-f25217c3b057
https://x-it.medium.com/lesson-11-file-grabbing-made-easy-for-malware-developers-6544f927868c
https://x-it.medium.com/lesson-12-crypto-clipper-stealing-cryptocurrency-like-a-pro-7e47f6cdb413
https://x-it.medium.com/lesson-13-exfiltrating-data-like-a-pro-learn-advanced-techniques-189d3215a727
https://x-it.medium.com/lesson-14-maintaining-persistence-with-malware-development-fd1cde42ee7e
https://x-it.medium.com/014-malware-development-lessons-with-source-code-advance-stealer-development-in-c-53bd16f6b3d