Gibson> Download Garbage
Ctrlk
  • Statement of purpose
  • Techniques
    • Intelligence Gathering
    • Initial Access
    • Execution
    • Privilege Escalation
    • Defense Evasion
      • Clear windows event logs
      • Bypassing proxies and firewalls
      • Microsoft Windows Defender
    • Credential Access
    • Infrastructure
    • Web application testing
    • Other
    • Red Team Infrastructure
    • Malware
    • Automation
  • Tools
    • Tools
Powered by GitBook
On this page
  1. Techniques

Defense Evasion

Clear windows event logsBypassing proxies and firewallsMicrosoft Windows Defender
PreviousLinuxNextClear windows event logs

Last updated 5 years ago

Was this helpful?

Was this helpful?