Author: Damon Mohammadbagher
Chapters :
Chapter 1 - Video [1] , Creating Simple Backdoor Payload by C#.NET
https://share.vidyard.com/watch/Es2PjHUptFUtoo6L8EXnx4?
Chapter 2 - Video [1] , Making Encrypted Meterpreter Payload by C#.NET
https://share.vidyard.com/watch/atg7BTDo4eHSXsxHbZPYDd?
Chapter 3 - Video [1] Bypassing Anti-Viruses with transfer Backdoor Payloads by DNS traffic
https://share.vidyard.com/watch/VNqWTF8unvV5hexsJ6JsDF?
Chapter 4 - Video [1] DATA Transferring by DNS Traffic (A records)
https://share.vidyard.com/watch/LRfvVDv9yxwCmSQojkJVPM?
Chapter 4 - Video [2] , DATA Transferring Technique by DNS Traffic A Records
https://share.vidyard.com/watch/nszyh2qtBHwaJn4QSLW6eu?
Chapter 5 - Video [1] , Exfiltration DATA via DNS PTR Records
https://share.vidyard.com/watch/NNHvoHTfxy4WiGLeajnoq7?
Chapter 5 - Video [2] , DATA Transferring Technique by DNS Traffic PTR Records
https://share.vidyard.com/watch/ak7iqaGsyxW3y3tTD8ErZo?
Chapter 6 - Video [2] , DATA Transferring Technique by DNS Traffic AAAA Records
https://share.vidyard.com/watch/g6xYrAh83LtUQFubFjfQVe?
Chapter 7 - Video [1] Exfiltration _ Uploading DATA via IPv6 DNS AAAA Records
https://share.vidyard.com/watch/Ecuqb58M6QYRTv4qQoxZDK?
Chapter 7 - Video [2] DATA Exfiltration_Uploading by IPV6 DNS PTR Queries
https://share.vidyard.com/watch/mFDCSk4njGQfMJBcGQ83A7?
Chapter 8 - Video [1] Transfer Backdoor Payloads by ARP Traffic
https://share.vidyard.com/watch/VseNe2miM4gepSLW3J7r1v?
Chapter 8 - Video [2] Transferring Backdoor Payload by ARP Traffic
https://share.vidyard.com/watch/r9x5GQoGcRexK2DmAZnU9H?
Chapter 9 - Video [1] Transferring Backdoor Payload with BSSID by Wireless Traffic
https://share.vidyard.com/watch/ZZRqZdbA54kb1YXpk1u4Uu?
Chapter 9 - Video [2] , DATA Exfiltration via Wireless Traffic (BSSID)
https://share.vidyard.com/watch/BTaue1MhM275QRcWTWyrsT?
Chapter 11 - Video [1] Data Transferring via BMP Image files
https://share.vidyard.com/watch/qpP6KxZbdtNLtEVvEHjnFj?
Chapter 11 - Video [2] Exfiltration_Hiding Payload via BMP Image Pixels
https://share.vidyard.com/watch/Egr8cLqGeFAqVZAkEPcaNY?
Chapter 12 - Video [1] Simple way for Data Exfiltration via HTTP Traffic
https://share.vidyard.com/watch/wVPxn8ggCectoeaMbWKmJG?
Chapter 12 - Video [2] Simple way for Data Exfiltration via HTTP
https://share.vidyard.com/watch/oPMyNJCVPj1Eoc24jpFuiq?
Chapter 15 - Video [1] Part1
https://share.vidyard.com/watch/5ybRwUbt2b3d3M3ggQiuYQ?
Chapter 15 - Video [2] Part2
https://share.vidyard.com/watch/6bYvcF75FqQ3BomZELpQUj?
Chapter 15 - Video [3] Part2
https://share.vidyard.com/watch/4kB2Xy1bLfhRxaTD6pwaLD?
------------------------------------------------------------------------------------------
Chapter 1 : Creating Simple Backdoor Payload by C#.NET
https://www.youtube.com/watch?v=pdMgQSTuN0M
Chapter 2 : Making Encrypted Meterpreter Payload by C#.NET
https://youtu.be/j6pwSemHfTY
Chapter 3 : DATA Transferring / Downloading Method by DNS Traffic (PTR Records)
https://www.youtube.com/watch?v=M4dbqRWRsUk
Chapter 4 : DATA Transferring Technique by DNS Traffic (A Records)
https://www.youtube.com/watch?v=B-vR7jKXyts
https://www.youtube.com/watch?v=TjOTdxnyvV0
Chapter 5 : Exfiltration and Uploading DATA by DNS Traffic (PTR Records)
https://www.youtube.com/watch?v=AgDbcC9kgcg
https://www.youtube.com/watch?v=zKUg_0LC9fk
Chapter 6 : DATA Transferring Technique by DNS Traffic (AAAA Records)
https://www.youtube.com/watch?v=Ac651MbNJ_U
Chapter 7 : Exfiltration and Uploading DATA by DNS Traffic (IPv6 AAAA/PTR Queries)
https://www.youtube.com/watch?v=9jiry5b-oPo
https://www.youtube.com/watch?v=6Lj-2KkHqgA
Chapter 8 : Transferring Backdoor Payloads by ARP Traffic
https://youtu.be/qDLicXj7Vuk
https://www.youtube.com/watch?v=O-llNZ9S8Mo
Chapter 9 : Transferring Backdoor Payload by Wireless Traffic (BSSID)
https://youtu.be/W0dJGln3tls
https://www.youtube.com/watch?v=i6Y5BmJXWko
Chapter 10 : Transferring Payload via ICMPv4 Traffic by TTL
Chapter 11 : Hiding Payloads via BMP Image Pixels
https://www.youtube.com/watch?v=D5tfh23vIOQ
https://www.youtube.com/watch?v=2n6ZLbJxlkw
Chapter 12 : Simple way for Data Exfiltration via HTTP
https://www.youtube.com/watch?v=vjhubCYFP4c
https://www.youtube.com/watch?v=7MCOko-qy0c
Chapter 13 : C# e[X]tension Method (X Technique) and bypassing Anti-viruses
Chapter 15 : ETW + C# and Monitoring Network Connections via ETW (CH15-Part1)
https://www.youtube.com/watch?v=zDG4Tze9mts
Chapter 15 : ETW + C# & Monitoring Process/Memory/Threads + Network Connection via ETW (CH15-Part2)
https://www.youtube.com/watch?v=1Aeor_NqpUA
Chapter 15 : C# + ETW vs Some Thread/Process/Code Injection Techniques
https://www.youtube.com/watch?v=d1a8WqOvE84
Note: in these channels (my channels) you can watch Videos online [playlists]:
- https://share.vidyard.com/watch/c7k7rw4RBy4erHBACeWDy2
- https://vimeo.com/damonmohammadbagher
- https://www.youtube.com/watch?v=pdMgQSTuN0M&list=PLlbW0JD9GV5m53UzA3kvE1-WVvDKoNi-o
- https://www.youtube.com/watch?v=5fSDV28phYI&list=PLBfcsaH1D0ryUV8t4o5JT4Cj1KiWGZGt9
This eBook is online with simple web pages here : https://damonmohammadbagher.github.io/Posts/ebookBypassingAVsByCsharpProgramming/index.htm
eBook PDF Files : https://github.com/DamonMohammadbagher/eBook-BypassingAVsByCSharp
unzip (step by step):