Introduction
Chapter 1: A Visit to the Dark Web
Chapter 2. Initial Access Methods
Chapter 3: Loaders and Botnets
Chapter 4: Information Stealers
Chapter 5: Banking Trojans
Chapter 6: Packers and Crypters
Chapter 7: Command-and-Control Frameworks
Chapter 8: Post-Exploitation Toolkits
Chapter 9: Living off the Land
Chapter 10: Windows Ransomware
Chapter 11: Linux and ESXi Ransomware
Chapter 12: Lessons from the Underground Economy
Appendix: Exercise Solutions
The chapters in red are included in this Early Access PDF.