Evading Logging and Monitoring

Evading Logging and Monitoring

Learn how to bypass common logging and system monitoring, such as ETW, using modern tool-agnostic approaches.

Breaching UAC

Breaching UAC

Learn common ways to bypass User Account Control (UAC) in Windows hosts.

Network Security Solutions

Network Security Solutions

Learn about and experiment with various IDS/IPS evasion techniques, such as protocol and payload manipulation.

Obfuscation Principles

Obfuscation Principles

Leverage tool-agnostic software obfuscation practices to hide malicious functions and create unique code.

Runtime Detection Evasion

Runtime Detection Evasion

Learn how to bypass common runtime detection measures, such as AMSI, using modern tool-agnostic approaches.

Introduction to AV

Introduction to AV

Understand how antivirus software works and what detection techniques are used to bypass malicious file checks.

Abusing Windows Internals

Abusing Windows Internals

Leverage windows internals components to evade common detection solutions, using modern tool-agnostic approaches.