Category: Evasion & Exploitation

  • Beginner Friendly Practical mini-course
  • Hands-on Practical Exercises, Video and PDF Manual
  • Techniques to create FUD Credential Dumper
  • Scenarios aligned for Offensive Information Security Teams
  • AV, Directory-Level and Linux Controls Bypass
  • Offensive C# Trade-Craft & Windows API Abuse
  • Multiple Cross-Forest Attacks in a hardened environment
  • Multiple Cross-Forest Attacks in a hardened environment
  • Windows Features (AMSI, CLM, UAC, Applocker, WDAC, WDAG, WDEG, Sandbox) Bypass
  • Start your journey in Microsoft Windows Internals
  • Unveil common Win32/NT APIs used by the malwares
  • Understand malwares abusing internals from user-mode perspective
  • Perform various challenges/exercises to learn Windows Internals
  • Learn different kernel data structures (EPROCES, ETHREAD, KPCR etc.) through Windbg