Skip to main content

Evasion

Firewall Bypass Techniques: Tools and Best Practices

··3471 words·17 mins· loading · loading
This technical article provides a detailed overview of various techniques and tools that can be used to bypass firewalls, including examples and best practices for red teamers and pen testers.

Know Thy Enemy: Malware Analysis for Red Teams

··693 words·4 mins· loading · loading
To defeat the EDR, you must think like the EDR. This guide introduces malware analysis concepts specifically for Red Team operators to self-audit payloads and improve stealth.

Phishing: Detection and Defeat

··992 words·5 mins· loading · loading
A comprehensive guide to advanced phishing evasion techniques for Red Team engagements. Learn infrastructure masking, cloaking, HTML smuggling, and how to bypass automated analysis and Secure Email Gateways.