Bypass Yara Rule Windows_Trojan_CobaltStrike_f0b627fc by randomizing its shellcode signature using a Python script.
Learn how to make your malware appear as legitimate software by adding an icon to your malware, and copying file properties from real programs.
Learn how to create your own malware testing lab with Elastic EDR and TCM Security's AD lab for malware evasion testing.
Learn to store and read shellcode in .bin files using C++, and quickly convert between .bin files and C arrays with xxd.