Testlab
Process injection
AV evasion
Obfuscation basics
Signature evasion
Bypassing UAC
Runtime detection evasion
Evading logging and monitoring
Living off the land
Network security solutions
Firewalls
Sandbox evasion
Break signatures using modern tool-agnostic approaches.
Evade common AV.
Signature identification
Static code-based signatures
Static property-based signatures
Behavioural signatures
Challenge