Skip to main contentSkip to main content
Back to all modules

Host Evasions

Host Evasions icon

Understand the techniques behind host-based security and bypass the most common security products in Windows operating systems.

This module provides the essential knowledge and fundamental techniques to bypass various host-based security solutions, including AV products, UAC and AppLocker, Logging, Runtime Detection, and AMSI. You will also learn the Living-Off-the-Land technique and how to leverage the Windows Sysinternals tool to perform various Red Team purposes.

Host Evasions icon

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

Hierarchical diagram showing how learning pathways contain modules, which contain individual rooms.

We use cookies to ensure you get the best user experience. For more information see our cookie policy.