Obfuscation Reloaded: Techniques for Evading Detection
DEF CON 33 Workshop
Exercise 1: Logs
Exercise 2: PowerShell Obfuscation
Exercise 3: Threatcheck
Exercise 4: SilkETW, ILSpy and Seatbelt
Exercise 5: AMSI Bypass
Exercise 6: ETW Bypass
Exercise 7: API Unhooking