
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
00:00
How do you customize offensive tools to avoid detection?
Spencer explains renaming functions, removing comments, and obfuscating open-source tools to evade static signatures and detections.
Transcript
Play full episode


