BHIS | Getting Started in Covert .NET Tradecraft for Post-Exploitation – Kyle Avery
5. Dominic Chell - Offensive Development: Post Exploitation Tradecraft in an EDR World
BlueHat IL 2020 - The Wover &Ruben Boonen - Staying # & Bringing Covert Injection Tradecraft to .NET
09/18/2019 Basics of Post Exploitation
WWHF | Abusing Microsoft Office for Post-Exploitation - Kyle Avery - 1 Hour
Covert Signals and the Business of Spying
DEFCON 19: Covert Post-Exploitation Forensics With Metasploit
Securi-Tay 2020: Offensive Tradecraft - Defence Evasion - Paul Laîné
DEFCON 20: Post-Exploitation Nirvana: Launching OpenDLP Agents over Meterpreter Sessions
C# : Interacting with WMI via .NET core
#HITB2021AMS D1T2 - WoW Hell: Rebuilding Heavens Gate - ShengHao Ma
BHIS | Admin’s Nightmare: Combining HiveNightmare/SeriousSAM and AD CS Attack Path’s for Profit
DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations
Cobalt Strike VBS Beacon Vs Kaspersky 6
Attack Tactics: Part 3! No Active Directory? No Problem!!
Be Evil: A Toolset for Tier 1 Threat Emulation - Matthew Toussain
In-Depth SILENTTRINITY Demo, Explanation & Walkthrough!
Puppy and Donut Tools in Action | Cyberskills99
BHIS | PreShow Banter™ — Darknet Diaries!
BHIS | Intro to Ransomware and Industrial Control Systems (ICS) w/ Ashley Van Hoesen (1-Hour)