Introduction

What?

Bypass common runtime detection measures, such as AMSI, using modern tool-agnostic approaches.

Why?

Overcoming headaches and roadblocks when executing malicious code.

How?