In this post, I’ll walk you through the detailed process of creating a covert spyware program for red teaming purposes. This project evolved from a simple Proof of Concept (PoC) loader to a fully functional payload that could evade detection by Windows Defender and perform real-time data exfiltration, including keylogging and screenshot capturing . This blog post will cover: Building the loader with persistence, VM evasion, and C2 communication. Designing the main payloa