Posted on
in Presentations
Join this session to explore EDR telemetry mechanisms, Kernel Callbacks, Userland API hooks, and ETW. Followed by a deep dive into the typical bypasses, unhooking, direct system calls, and more. EDR bypasses are not new but remain complex and primarily red-team tools, while their adoption in cybercrime is limited. But for how long? Can Smart ChatGPT prompt automate EDR bypasses? Demo included!
Share With Your Community