Magnetic link has been copied to the cutting board

Name Linkedin Learning Defeating Windows Defender

File Type video

Size 160.85MB

UpdateDate 2024-9-13

hash *****C08BAA6F7F1A8AF441CBBAB5EEA6CDC6BE

Hot 16

Files 2. Manipulating Defender/5. Disabling Defender in Windows 11.mp4 | 21.88MB 1. Introduction/1. Understanding how hackers get past Windows Defender.srt | 1.20KB 1. Introduction/2. What you should know.mp4 | 1.62MB 1. Introduction/2. What you should know.srt | 735B 1. Introduction/3. Disclaimer.mp4 | 4.36MB 1. Introduction/3. Disclaimer.srt | 2.04KB 2. Manipulating Defender/1. Introduction to Defender and AMSI.mp4 | 11.03MB 2. Manipulating Defender/1. Introduction to Defender and AMSI.srt | 4.70KB 2. Manipulating Defender/2. Defender real-time protection.mp4 | 8.18MB 2. Manipulating Defender/2. Defender real-time protection.srt | 3.98KB 2. Manipulating Defender/3. Defender Advanced Threat Protection.mp4 | 7.40MB 2. Manipulating Defender/3. Defender Advanced Threat Protection.srt | 3.58KB 2. Manipulating Defender/4. Disabling Defender on Windows 10.mp4 | 12.01MB 2. Manipulating Defender/4. Disabling Defender on Windows 10.srt | 4.16KB 1. Introduction/1. Understanding how hackers get past Windows Defender.mp4 | 2.58MB 2. Manipulating Defender/5. Disabling Defender in Windows 11.srt | 6.32KB 2. Manipulating Defender/6. Disabling Defender in Windows Servers.mp4 | 6.87MB 2. Manipulating Defender/6. Disabling Defender in Windows Servers.srt | 2.68KB 3. Obfuscation/1. Obfuscating your payloads.mp4 | 1.55MB 3. Obfuscation/1. Obfuscating your payloads.srt | 876B 3. Obfuscation/2. Creating an obfuscated msfvenom payload.mp4 | 7.34MB 3. Obfuscation/2. Creating an obfuscated msfvenom payload.srt | 2.99KB 3. Obfuscation/3. Using phantom evasion.mp4 | 8.98MB 3. Obfuscation/3. Using phantom evasion.srt | 3.19KB 3. Obfuscation/4. Using a simple shell.mp4 | 5.23MB 3. Obfuscation/4. Using a simple shell.srt | 2.55KB 4. Bypassing AMSI/1. Digging into AMSI.mp4 | 19.65MB 4. Bypassing AMSI/1. Digging into AMSI.srt | 8.49KB 4. Bypassing AMSI/2. Disrupting the AmsiOpenSession function.mp4 | 14.03MB 4. Bypassing AMSI/2. Disrupting the AmsiOpenSession function.srt | 4.98KB 4. Bypassing AMSI/3. Disrupting the AmsiScanBuffer function.mp4 | 3.81MB 4. Bypassing AMSI/3. Disrupting the AmsiScanBuffer function.srt | 1.65KB 4. Bypassing AMSI/4. Using obfuscation for an AMSI bypass.mp4 | 12.10MB 4. Bypassing AMSI/4. Using obfuscation for an AMSI bypass.srt | 4.47KB 4. Bypassing AMSI/5. Using Powercat after AMSI bypass.mp4 | 7.38MB 4. Bypassing AMSI/5. Using Powercat after AMSI bypass.srt | 3.55KB 5. Conclusion/1. Whats next.mp4 | 4.76MB 5. Conclusion/1. Whats next.srt | 2.19KB Exercise Files/02_04/mini-reverse.ps1 | 755B Exercise Files/03_01/icar.txt | 54B Exercise Files/03_01/myamsi.py | 214B Exercise Files/03_02/bypass1.ps1 | 1.81KB Exercise Files/03_03/bypass2.ps1 | 1.89KB Exercise Files/03_04/bypass3.ps1 | 207B Exercise Files/03_04/bypass3a.ps1 | 185B Exercise Files/03_04/bypass3b.ps1 | 285B

Recommend

Magnetic link has been copied to the cutting board