Category: Evasion & Exploitation
- Beginner Friendly Practical mini-course
- Hands-on Practical Exercises, Video and PDF Manual
- Techniques to create FUD Credential Dumper
- Scenarios aligned for Offensive Information Security Teams
- AV, Directory-Level and Linux Controls Bypass
- Offensive C# Trade-Craft & Windows API Abuse
- Multiple Cross-Forest Attacks in a hardened environment
- Multiple Cross-Forest Attacks in a hardened environment
- Windows Features (AMSI, CLM, UAC, Applocker, WDAC, WDAG, WDEG, Sandbox) Bypass
- Start your journey in Microsoft Windows Internals
- Unveil common Win32/NT APIs used by the malwares
- Understand malwares abusing internals from user-mode perspective
- Perform various challenges/exercises to learn Windows Internals
- Learn different kernel data structures (EPROCES, ETHREAD, KPCR etc.) through Windbg