Skip to content

Malware Examples

This section contains end-to-end examples showing how various techniques come together in complete programs. Currently provided:

  • Reverse shells (plain and TLS)

Review these examples to see how the concepts from previous chapters can be combined into practical malicious tooling.