🪷
RedLotus Guide
search
⌘Ctrlk
🪷
RedLotus Guide
  • ScreenSharing Introducttion and Principles
    • book-sparklesIntroduction
    • gavelRed Lotus Principles
  • ScreenSharing General Knowledge
    • desktopWindows Fundamentals
    • diamonds-4Common Windows Artifacts and Their Basic Analysis
    • magnifying-glassManual SS Techniques (Basic and Intermediate)
    • circle-caret-downMore Artifact Analysis for ScreenSharing
    • ghostCommon Bypass Techniques in ScreenSharing
      • person-to-portalIntroduction to Bypass Categories
      • eye-slashConcealment and Obfuscation
      • fingerprintSteganography
      • hammer-crashArtifact and System Manipulation
      • broom-wideArtifact Clearing Techniques
      • ticket-perforatedPermission and Inheritance Modification
      • usb-driveDisk Partition Manipulation for Evasion
      • diagram-subtaskTask Scheduler Bypass Techniques
      • rectangle-codeScripting Languages for Evasion
        • Mechanisms of Evasion
        • Forensic Implications
      • rectangle-terminalFileless Malware and Living-off-the-Land Binaries (LOLBins)
      • atom-simpleCOM Hijacking
      • turtleShellcode Injection
      • tower-cellPowershell Remoting
      • syringeSuspicious DLLs and DLL Injection Techniques
      • coffinProcess Hollowing
      • face-lyingUnsigned / Fake Digital Signatures
      • computer-classicEnvironment and Hardware Bypasses
    • user-policeBan Evasion and Alt Account Detection
  • ScreenSharing Minecraft Knowledge
    • pickaxeMinecraft Architecture and Analysis
    • computer-mouseMouse, Macro, and Input Analysis
  • Advanced explanation of artifacts
    • badge-checkProgram Execution
    • grid-2File System Activity
    • user-checkUser Activity and Knowledge
    • gearsSystem Configuration and Persistence
  • ScreenShare Tools
    • toolboxRedLotus Tools
    • toolboxSpok's Tools
    • toolboxRancio's Tools
    • toolboxEcho's Tools
    • square-codeSpecific PowerShell Scripts
  • Automatic ScreenShare Tools
    • coming soon
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ScreenSharing General Knowledgechevron-right
  2. ghostCommon Bypass Techniques in ScreenSharing

rectangle-codeScripting Languages for Evasion

Mechanisms of Evasionchevron-rightForensic Implicationschevron-right
PreviousDetectionchevron-leftNextMechanisms of Evasionchevron-right

Last updated 11 months ago