1. Post-Exploitation Behaviours.md
12. Thread Stack Spoofing.md
4. Command Line Spoofing.md
5. Network Connections.md
9. Event Tracing for Windows (ETW).md
6. Attack Surface Reduction
7. Windows Defender Application Control
1. Course Introduction.png
10. HTTPS Listener for Redirector.png
16. MessageBox in C++.png
17. MessageBox in C++.png
2. Accessing Snap Labs.png
21. MessageBox in VBA.png
23. MessageBox with DInvoke.png
25. CreateRemoteThread.png
27. NtMapViewOfSection.png
3. Accessing Snap Labs.png
34. Command Line Spoofing.png
35. Command Line Spoofing.png
36. Command Line Spoofing.png
4. Accessing Snap Labs.png
44. Image Load Events.png
45. Event Tracing for Windows (ETW).png
46. Event Tracing for Windows (ETW).png
5. Accessing Snap Labs.png
54. Thread Stack Spoofing.png
55. Thread Stack Spoofing.png
56. Thread Stack Spoofing.png
57. Thread Stack Spoofing.png
58. Thread Stack Spoofing.png
59. Thread Stack Spoofing.png
60. Thread Stack Spoofing.png
61. Block Child Processes.png
62. Block Child Processes.png
63. Block Child Processes.png
64. Block Child Processes.png
65. Block Child Processes.png
66. Block Child Processes.png
70. Block Code Injection.png
71. Block Code Injection.png
76. Trusted Applications.png
8. Apache Installation.png
9. Generate SSL Certificates.png
Folders and files Name Name Last commit message
Last commit date
parent directory
View all files
You can’t perform that action at this time.