When Things Begin Private

Is it really a private page posted on a public domain with an unpublished title ? Naaaah. This is not really private, let me say this is the private public page ;). If you wanna understand you will .
Private: http://www.blogger.com/profile/09472209631979859691
Find-out-packs: http://kafeine.minus.com – http://kafeine.minus.com/mnrcD1JxAzu2U
This guy rocks: http://malwaremustdie.blogspot.it
WatchOut here: https://lampeduza.net/
BackDoors Collection: http://contagiodump.blogspot.it/2010/03/collection-of-web-backdoors-shells-from.html
TTConsole: https://www.tcconsole.com/login.html  (team-cymru.org)
Malware collectors: 
http://support.clean-mx.de/clean-mx/viruses.php
http://malc0de.com/database/
http://www.malwareblacklist.com/showMDL.php
Tools:
http://carnivore.it  (DIONEA, Analysis e NEBULA, testing)
http://pmelson.blogspot.it/2008/05/list-of-malware-analysis-tools.html

Packers/Crypters:
http://upx.sourceforge.net
http://wakaba.c3.cx/s/apps/unarchiver.html 

http://www.exetools.com/unpackers.htm
http://cypherx.org/fud-crypter-tour/
http://best-fud-crypters.com/index.html
http://www.buycrypter.com
http://www.softcrypter.com/crypter/
https://code.google.com/p/pescrambler/

— CyberGate Server (https://www.hackcommunity.com/Thread-Cybergate-RAT-Tutorial-For-Beginners-best-version-ever)

https://www.
https://github.com/inquisb/shellcodeexec/pentestgeek.com/2012/01/25/using-metasm-to-avoid-antivirus-detection-ghost-writing-asm/

EVASION Framework:
http://tipstrickshack.blogspot.it/2013/10/list-of-differnet-av-evasion-frameworks.html

https://github.com/secretsquirrel/the-backdoor-factory   (The BackDoor Factory, massive on directories and on MAC Files)

https://github.com/inquisb/shellcodeexec/

https://github.com/Veil-Framework/Veil-Evasion/blob/master/modules/payloads/native/Hyperion.py (Hyperion creates an executable with an AES encrypted version of your shellcode. )

PASS THE HAS: (from local credentials to domain credentials)
— http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=tool&name=Pass-The-Hash_Toolkit
— https://github.com/inquisb/keimpx (this is useful to test across a whole network if username and passwords are valid in other machines, it uses hashes from Pass-The-Hash toolkit)

GUIDE:
http://www.woodmann.com/TiGa/unpacking.html
https://www.hex-rays.com/products/ida/support/idadoc/
http://www.codeproject.com/Articles/4610/Three-Ways-to-Inject-Your-Code-into-Another-Proces

Collaborative Tools
MalControl
Collaborative Research Int Threats (https://crits.github.io/)
MalwareInformationSharingPlatform (https://github.com/MISP/MISP)
Collective Intelligence Framework (http://csirtgadgets.org/projects)

Reading Books:
http://dfir.org/?q=node%2F8
http://909research.com/find-a-windows-infection-quickly-part-2-with-tools/
http://blog.extremehacking.org/