// Memory Evasion Masterclass
Deep dive into reflective DLL loading, return address spoofing, IAT hooking, and the FOLIAGE sleep mask. Master Windows memory internals from PE parsing to full evasion chains. By kyleavery — presented at DEF CON 30.
Virtual memory, page protections, memory APIs, the Windows heap, and why scanners care about RWX.
02 BeginnerDOS headers, NT headers, sections, the IAT, and base relocations. Everything AceLdr manually parses.
03 BeginnerFinding any Windows API at runtime without a single import. PEB traversal and DJB2 hashing.
04 IntermediateLoading a DLL without Windows knowing. Thread hijacking, section mapping, and Beacon initialization.
05 IntermediateGetIp trick, OFFSET macro, linker scripts, and the ACELDR end marker. Code that works at any address.
06 IntermediateIntercepting 6 function calls by rewriting the IAT. Private heap isolation from scanners.
07 AdvancedJMP [RBX] gadgets, trampoline chains, and making API calls look legitimate on the stack.
08 AdvancedThe crown jewel: 10-step APC chain, RC4 encryption, thread context spoofing during sleep.
09 AdvancedBuild pipeline, Aggressor scripts, malleable C2 profiles, and the complete lifecycle.
github.com/kyleavery/AceLdrgithub.com/SecIdiot/FOLIAGEgithub.com/SecIdiot/TitanLdrgithub.com/forrest-orr/monetagithub.com/hasherezade/pe-sievegithub.com/CCob/BeaconEyegithub.com/thefLink/Hunt-Sleeping-Beaconsgithub.com/joe-desimone/patriot