Linux Red Team Defense Evasion Techniques - Hiding Linux Processes
Linux Defense Evasion - Hiding Processes | Red Team Series 11-13
Linux Defense Evasion - Linux Rootkits | Red Team Series 12-13
Linux Defense Evasion - Apache2 Rootkit
Advanced adversary tactics and defense evasion with MITRE ATT&CK | Free Cyber Work Applied series
ATT&CK Deep Dive: Defense Evasion
Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
MITRE ATT&CKcon 2.0: Alertable Techniques for Linux Using ATT&CK
Windows Defense Evasion Techniques | Red Team Series 7-13
Do CTFs prepare you to be hacker?
How to quickly use the Sliver with AV bypass
Area41 2014: Arron Finnon: Finux's Historical Tour Of IDS Evasion, Insertions, and Other Oddities
Metasploit Evasion Module: Hands-On Lab
Red Team Skills: Defense Evasion with Veil Course Preview
Bypassing Firewalls with DNS Tunnelling (Defence Evasion, Exfiltration and Command & Control)
Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
Mitre ATT&CK Tactics, Techniques and Mitigations Series: Part 7 Defense Evasion
APT40 Shellcode Injection & Defense Evasion
Red Team Adversary Emulation With Caldera
Simple Penetration Testing Tutorial for Beginners!