
(Replay) How We Evade Detection During Internal Pentests
The Cyber Threat Perspective
00:00
How do you customize offensive tools to avoid detection?
Spencer explains renaming functions, removing comments, and obfuscating open-source tools to evade static signatures and detections.
Play episode from 22:06
Transcript


