AV Evasion: Shellcode

AV Evasion: Shellcode

Learn shellcode encoding, packing, binders, and crypters.

Signature Evasion

Signature Evasion

Learn how to break signatures and evade common AV, using modern tool-agnostic approaches.

Living Off the Land

Living Off the Land

Learn the essential concept of 'Living Off the Land' in Red Team engagements.

Evading Logging and Monitoring

Evading Logging and Monitoring

Learn how to bypass common logging and system monitoring, such as ETW, using modern tool-agnostic approaches.

Breaching UAC

Breaching UAC

Learn common ways to bypass User Account Control (UAC) in Windows hosts.

Obfuscation Principles

Obfuscation Principles

Leverage tool-agnostic software obfuscation practices to hide malicious functions and create unique code.

Runtime Detection Evasion

Runtime Detection Evasion

Learn how to bypass common runtime detection measures, such as AMSI, using modern tool-agnostic approaches.

Introduction to AV

Introduction to AV

Understand how antivirus software works and what detection techniques are used to bypass malicious file checks.

Abusing Windows Internals

Abusing Windows Internals

Leverage windows internals components to evade common detection solutions, using modern tool-agnostic approaches.