Defense Evasion
Simple Shellcode Runner in RustPass the Hash Attack with Mimikatz and PsExecDirect Syscall Execution in WindowsHookchain Technique Introduction by Helvio Júnior (M4v3r1ck)Probabilistic Call Stack: A Deep Dive into Non-Deterministic Execution PathsAMSI Bypass - Neutralizing the Microsoft Antimalware Scan InterfaceETW Bypass - Blinding Windows TelemetryIndirect Syscalls — Preserving a Legitimate Stack TraceAPI Unhooking — Restoring ntdll to a Clean StateProcess Hollowing — Gutting Legitimate ProcessesReflective DLL Injection — DLLs That Load ThemselvesPPID Spoofing — Forging the Process TreeToken Impersonation — Identity Theft on WindowsShellcode Obfuscation — Hiding Payloads from Static DetectionAPC Injection — Execution via Asynchronous Procedure Call QueuesHeaven's Gate — Calling 64-bit Code from a 32-bit ProcessSleep Obfuscation — Encrypting Beacons During Rest