8bytes
Learn shellcode encoding, packing, binders, and crypters.
Learn how to break signatures and evade common AV, using modern tool-agnostic approaches.
Learn the essential concept of 'Living Off the Land' in Red Team engagements.
Learn how to bypass common logging and system monitoring, such as ETW, using modern tool-agnostic approaches.
Learn common ways to bypass User Account Control (UAC) in Windows hosts.
Leverage tool-agnostic software obfuscation practices to hide malicious functions and create unique code.
Learn how to bypass common runtime detection measures, such as AMSI, using modern tool-agnostic approaches.
Understand how antivirus software works and what detection techniques are used to bypass malicious file checks.
Leverage windows internals components to evade common detection solutions, using modern tool-agnostic approaches.