
PowerShell for Hackers – Survival Edition, Part 4: Blinding Defenders
Learn to stay invisible by abusing native Windows binaries, living-off-the-land techniques and scripting engines for stealthy execution.
Explore the tactics and techniques used to bypass antivirus and endpoint protection systems. This category covers payload obfuscation, packers, crypters, process injection, signature evasion, and living-off-the-land binaries (LOLBins). Learn how hackers avoid detection and how red teamers simulate real-world AV evasion to test defenses.

Learn to stay invisible by abusing native Windows binaries, living-off-the-land techniques and scripting engines for stealthy execution.

In the first part of this project, I explored how artificial intelligence can be used to simulate the early stages of a stealthy APT—focusing on polyglot files, in-memory execution, and basic command-and-control behavior. Everything was generated by the AI: from…

Welcome back, my aspiring cyberwarriors! In this series, we are looking at using the wold’s most popular hacking framework, Metasploit. As Metasploit has become more popular, the major anti-virus developers have found ways to detect and remove metasploit based payloads…

Welcome back, my cyberwarriors. It’s Collateral here again. Today we’ll walk through one of the obfuscation methods we use during engagements. This time, we’re bypassing well-known Russian antivirus software like Kaspersky, DrWeb, and others that might be running on a…