Linkedin Learning Defeating Windows Defender
File List
- 2. Manipulating Defender/5. Disabling Defender in Windows 11.mp4 21.9 MB
- 4. Bypassing AMSI/1. Digging into AMSI.mp4 19.7 MB
- 4. Bypassing AMSI/2. Disrupting the AmsiOpenSession function.mp4 14.0 MB
- 4. Bypassing AMSI/4. Using obfuscation for an AMSI bypass.mp4 12.1 MB
- 2. Manipulating Defender/4. Disabling Defender on Windows 10.mp4 12.0 MB
- 2. Manipulating Defender/1. Introduction to Defender and AMSI.mp4 11.0 MB
- 3. Obfuscation/3. Using phantom evasion.mp4 9.0 MB
- 2. Manipulating Defender/2. Defender real-time protection.mp4 8.2 MB
- 2. Manipulating Defender/3. Defender Advanced Threat Protection.mp4 7.4 MB
- 4. Bypassing AMSI/5. Using Powercat after AMSI bypass.mp4 7.4 MB
- 3. Obfuscation/2. Creating an obfuscated msfvenom payload.mp4 7.3 MB
- 2. Manipulating Defender/6. Disabling Defender in Windows Servers.mp4 6.9 MB
- 3. Obfuscation/4. Using a simple shell.mp4 5.2 MB
- 5. Conclusion/1. Whats next.mp4 4.8 MB
- 1. Introduction/3. Disclaimer.mp4 4.4 MB
- 4. Bypassing AMSI/3. Disrupting the AmsiScanBuffer function.mp4 3.8 MB
- 1. Introduction/1. Understanding how hackers get past Windows Defender.mp4 2.6 MB
- 1. Introduction/2. What you should know.mp4 1.6 MB
- 3. Obfuscation/1. Obfuscating your payloads.mp4 1.6 MB
- 4. Bypassing AMSI/1. Digging into AMSI.srt 8.5 KB
- 2. Manipulating Defender/5. Disabling Defender in Windows 11.srt 6.3 KB
- 4. Bypassing AMSI/2. Disrupting the AmsiOpenSession function.srt 5.0 KB
- 2. Manipulating Defender/1. Introduction to Defender and AMSI.srt 4.7 KB
- 4. Bypassing AMSI/4. Using obfuscation for an AMSI bypass.srt 4.5 KB
- 2. Manipulating Defender/4. Disabling Defender on Windows 10.srt 4.2 KB
- 2. Manipulating Defender/2. Defender real-time protection.srt 4.0 KB
- 2. Manipulating Defender/3. Defender Advanced Threat Protection.srt 3.6 KB
- 4. Bypassing AMSI/5. Using Powercat after AMSI bypass.srt 3.6 KB
- 3. Obfuscation/3. Using phantom evasion.srt 3.2 KB
- 3. Obfuscation/2. Creating an obfuscated msfvenom payload.srt 3.0 KB
- 2. Manipulating Defender/6. Disabling Defender in Windows Servers.srt 2.7 KB
- 3. Obfuscation/4. Using a simple shell.srt 2.6 KB
- 5. Conclusion/1. Whats next.srt 2.2 KB
- 1. Introduction/3. Disclaimer.srt 2.0 KB
- Exercise Files/03_03/bypass2.ps1 1.9 KB
- Exercise Files/03_02/bypass1.ps1 1.8 KB
- 4. Bypassing AMSI/3. Disrupting the AmsiScanBuffer function.srt 1.6 KB
- 1. Introduction/1. Understanding how hackers get past Windows Defender.srt 1.2 KB
- 3. Obfuscation/1. Obfuscating your payloads.srt 876 bytes
- Exercise Files/02_04/mini-reverse.ps1 755 bytes
- 1. Introduction/2. What you should know.srt 735 bytes
- Exercise Files/03_04/bypass3b.ps1 285 bytes
- Exercise Files/03_01/myamsi.py 214 bytes
- Exercise Files/03_04/bypass3.ps1 207 bytes
- Exercise Files/03_04/bypass3a.ps1 185 bytes
- Exercise Files/03_01/icar.txt 54 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.