Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status (how to buy - Premium status)
  • We have a scammer on our forum who poses as the administrator of our forum in his telegram channel.
    Scammer screen group - Screen 1, Screen 2 and group name - https://t.me/Niflheimworld (This is not an admin, the link is only for reference with whom not to conduct transactions)
    Do not trust him and do not conduct transactions with him!
    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

Sektor7 - Evasion Windows Red Team Ops


ENCRYP73D_GH05T

New user
Landboar
Joined
Jan 17, 2025
Messages
200
Reaction score
4
NL COIN
1,015
Screenshot_20.png


In the modern enterprise Windows environment we often encounter lots of obstacles, which try to detect and stop our sneaky tools and techniques. Endpoint protection agents (AV, IDS/IPS, EDR, etc.) are getting better and better at this, so this requires an extended effort in finding a way into the system and staying undetected during post-exploitation activities.

This course will guide you though modern detection technology and teach how you can try to avoid it. This means understanding how the technology works and developing certain capabilities to stay under the radar.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELL

You Will Learn
  • How a modern detection looks like
  • How to get rid of process' internal operations monitoring
  • How to make your payload look benign in memory
  • How to break process parent-child relation
  • How to disrupt EPP/EDR logging
  • What is Sysmon and how to bypass it

What Will You Get?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements

Target Audience
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics

 
shape1
shape2
shape3
shape4
shape7
shape8
Top