📄️ SSH tunneling
This section demonstrate where to use ssh tunneling.
📄️ HTTP Tunneling
Learn how HTTP tunneling works, why attackers use it to bypass firewalls and proxies, and how tools like httrack, Tunna, and reGeorg enable covert data transmission. Includes detection tips and real-world use cases.
📄️ AV Evasion Techniques
Learn common techniques used to bypass modern antivirus and EDR systems during offensive security engagements. Covers obfuscation, payload encryption, process injection, and more.
📄️ Simple-Port-Forwarding
Simple Port Forwarding Scenario