Introduction This is the seventh post of a series which regards the development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist. Today we will talk about “Secure Desktop” on Windows and implement a keylogger.