1. Introduction to malware
2. Creating Hacker Server
3. Writing Victim Program
4. Running Server and Victim Programs
5. Clean up server program
6. Clean up victim program
7. Sending Data from server to victim
8. Receiving data from hacker server
9. Sending gob structs to victim
10. Receiving gob structs at victim machine
11. Running the program to send and receive gobs
12. Executing command server side
13. Exit condition
14. Victim Side main function
15. Server logic command execution
16. Victim Logic command execution
17. Victim Logic command execution Part 2
18. Minor Error
19. Executing Commands Complete program