Intermediate to Advanced Offensive Development

Offensive Development and Tradecraft

Master offensive development and tradecraft techniques used by red team operators. Learn to build implants, loaders, and evasive tradecraft that bypass modern EDR detections including Elastic, CrowdStrike, and Defender.

4.8 (89 reviews) 11 hours 112 lessons
$529.99
Get Instant Access
Lifetime access
Certificate of completion
Discord community access
Regular content updates

30-day money-back guarantee

What You'll Learn

Develop implants and loaders that bypass Yara and ML detections
Craft position independent code and load reflective DLLs from PIC
Use indirect syscalls, reflective DLL injection, and module stomping
Upcoming Updates : Implement stack spoofing, sleep obfuscation, and related evasions
Apply payload encryption, obfuscation, and API hiding
Work end to end through showcase and capstone projects

Course Curriculum

Requirements

  • Comfortable programming in C and working with Windows tooling (mingw, CMake)
  • Windows host with virtualization support (required for course labs)
  • Apple Silicon devices are not supported for the required virtualization stack
  • 16GB RAM and at least 200GB free storage for lab VMs
  • Familiarity with x64dbg, IDA Pro, or WinDbg is helpful

Learning Resources Provided

Video & Text Content

We provide Video and Text based learning material, both of which complement each other. We also provide prepared Virtual Machines so you can download and use them in your own lab.

Technologies Used

The programming language used is C. We use Mingw compiler, Visual Studio 2022, X64Dbg, IDA Pro, and WinDbg for research and debugging. Elastic EDR is used for Detection and Evasion.

Note Taking & Community

Access to Notion template to help with learning, keeping track of work completed and additional notes. Discord server access for questions and engagement with other students.

Frequently Asked Questions

Your Instructor

Ahmed Kasmani

Ahmed Kasmani

Research Lead (Fortune 500), ex-Microsoft & CrowdStrike

Research Lead focused on malware reverse engineering and security research. Previously at Microsoft and CrowdStrike across Security Research, Security Engineering, and MDR. 15+ years in cyber, with front-line work on incidents like WannaCry, NotPetya, SolarWinds, and ProxyShell. Committed to making hands-on security training accessible and affordable.