Skip to content

Antivirus

  • 5 Common Cyber Security Threats That Bypass Legacy AV: https://www.sentinelone.com/blog/5-common-cyber-security-threats-that-bypass-legacy-av/
  • Antivirus Event Analysis Cheat Sheet v1.4: https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
  • Bypassing Kaspersky Endpoint Security 11: http://0xc0ffee.io/blog/kes11-bypass
  • Hiding Metasploit Shellcode to Evade Windows Defender: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/
  • Enumerating Anti-Sandboxing Techniques - TrustedSec: https://www.trustedsec.com/2018/06/enumerating-anti-sandboxing-techniques/?utm_content=73303714&utm_medium=social&utm_source=twitter

  • Art of Anti Detection 1 – Introduction to AV & Detection Techniques: https://pentest.blog/art-of-anti-detection-1-introduction-to-av-detection-techniques/

  • Art of Anti Detection 2 – PE Backdoor Manufacturing: https://pentest.blog/art-of-anti-detection-2-pe-backdoor-manufacturing/