🪷
RedLotus Guide
Ctrlk
  • ScreenSharing Introducttion and Principles
    • Introduction
    • Red Lotus Principles
  • ScreenSharing General Knowledge
    • Windows Fundamentals
    • Common Windows Artifacts and Their Basic Analysis
    • Manual SS Techniques (Basic and Intermediate)
    • More Artifact Analysis for ScreenSharing
    • Common Bypass Techniques in ScreenSharing
      • Introduction to Bypass Categories
      • Concealment and Obfuscation
      • Steganography
      • Artifact and System Manipulation
      • Artifact Clearing Techniques
      • Permission and Inheritance Modification
      • Disk Partition Manipulation for Evasion
      • Task Scheduler Bypass Techniques
      • Scripting Languages for Evasion
        • Mechanisms of Evasion
        • Forensic Implications
      • Fileless Malware and Living-off-the-Land Binaries (LOLBins)
      • COM Hijacking
      • Shellcode Injection
      • Powershell Remoting
      • Suspicious DLLs and DLL Injection Techniques
      • Process Hollowing
      • Unsigned / Fake Digital Signatures
      • Environment and Hardware Bypasses
    • Ban Evasion and Alt Account Detection
  • ScreenSharing Minecraft Knowledge
    • Minecraft Architecture and Analysis
    • Mouse, Macro, and Input Analysis
  • Advanced explanation of artifacts
    • Program Execution
    • File System Activity
    • User Activity and Knowledge
    • System Configuration and Persistence
  • ScreenShare Tools
    • Spok's Tools
    • Rancio's Tools
    • Echo's Tools
    • Specific PowerShell Scripts
  • Automatic ScreenShare Tools
    • coming soon
Powered by GitBook
On this page
  1. ScreenSharing General Knowledge
  2. Common Bypass Techniques in ScreenSharing

Scripting Languages for Evasion

Mechanisms of EvasionForensic Implications
PreviousDetectionNextMechanisms of Evasion

Last updated 6 months ago