fix: typo in old post

This commit is contained in:
ae 2025-06-07 22:10:02 +03:00
parent 10cbf4d1ac
commit d2a8ec9a5a
Signed by: ae
GPG Key ID: 995EFD5C1B532B3E

View File

@ -646,7 +646,7 @@ As hinted in the previous sections, the loader utilizes a few trivial obfuscatio
If we take a look at the whole [repository](https://git.umbrella.haus/ae/airborne), we can identify the PoC injector (utilizing plain `CreateRemoteThread`) as quite apparent weak link in the chain. Projects like [BypassAV by matro7sh](https://github.com/matro7sh/BypassAV) display a variety of a lot better techniques, if one is interested in improving in that area:
![Map of essentail AV/EDR bypass methods](/images/understanding-srdi/bypass-av.png)
![Map of essential AV/EDR bypass methods](/images/understanding-srdi/bypass-av.png)
## References