Source |
Security Intelligence |
Identifiant |
2836875 |
Date de publication |
2021-05-25 17:35:00 (vue: 2021-05-25 18:06:05) |
Titre |
Applying the Invisibility Cloak: Obfuscate C# Tools to Evade Signature-Based Detection |
Texte |
This is the first in a new series from our offensive security experts at X-Force Red sharing research, resources and recommendations to help you harden your defenses and protect your most important assets. Attackers and offensive security professionals have been migrating from PowerShell to C# for post-exploitation toolkits due to advances in security product configurations […]
|
Envoyé |
Oui |
Condensat |
advances applying assets attackers based been cloak: configurations defenses detection due evade experts exploitation first force from harden have help important invisibility migrating most new obfuscate offensive post powershell product professionals protect recommendations red research resources security series sharing signature toolkits tools your |
Tags |
|
Stories |
|
Notes |
★★★★★
|
Move |
|