MalOpSec — The EDR Crusade is an intensive, hands-on training that teaches both the inner workings of modern Windows EDR/AV stacks and the practical techniques attackers use to evade them. The course explains the key detection points an EDR monitors - from kernel hooks, minifilter activity and ETW telemetry to userland API instrumentation and persistence artifacts - and pairs that visibility model with the offensive methods used to reduce or eliminate those detection signals.
Throughout the program participants will reverse real malware patterns, re-implement improved versions of those techniques, and practice robust evasion, persistence and privilege-escalation workflows in controlled lab environments. During the course and for the full-day Warzone CTF on day four, students will have access to REVO, Retooling’s red-team adversary-emulation platform, to design, deploy and test adversary behavior at a professional grade. Each student receives significant source code - including the Pico implant scaffold and the evasion modules implemented during the labs - so they leave with reusable, well-documented artifacts for research and testing.
The CTF runs for an entire day in a dedicated lab environment: each participant gets a mini network containing an EDR instance to analyze and bypass. Student will enumerate EDR hooks, bypass telemetry and protections, deploy modules and persistence, exploit vulnerable binaries and drivers. The CTF may be completed in-class or remotely on the provided lab infrastructure. Two winning teams will be selected (one best Red, one best Blue) and each winning team will receive a ticket to OffensiveCon 2027.
Designed for experienced practitioners (red teamers, blue teamers, malware researchers and security engineers), the course balances theory, live demos and a 50% hands-on lab focus so attendees gain both deep understanding and practical skills to evaluate and harden real-world endpoint defenses.
As part of the course, theory sessions will be followed by exercises where participants will reverse and re-implement specific parts of real malware in order to fully understand the hidden corners of all the techniques involved. The 50% of the course will be dedicated to hands-on labs that will show how to translate the theory principles into practice.
Labs are designed to provide flexibility in terms of complexity and include bonus tracks to ensure that you always feel engaged and have something interesting to explore and learn.
This course is valuable not only for red team operators but also for blue team professionals. Blue team members can gain insights into how their detection systems may be bypassed, helping them enhance their security measures and stay one step ahead of potential threats.
This course equips security professionals with a deep understanding of modern EDRs and their AV systems, enabling them to better simulate advanced threat scenarios, improve their evasion detection skills, and contribute to the overall enhancement of security within enterprise networks.
Developers and Reverse engineers who want to understand tradecrafts from a different point of view, red-team members who want to go beyond using third-party implants, and researchers who want to develop anti-detection techniques of real malware/apt.
Laptop Requirements:
Software Requirements:
Silvio La Porta is CEO and Co-Founder at RETooling defining and developing Threat Actor emulation platform enabling red team to recreate a realist attack scenario. Previously he was a Senior Cyber Security Architect designing security products and researching advanced detection technology for complex malware/APT. Silvio previously was a lead research scientist with EMC Research Europe based in the Centre of Excellence in Cork, Ireland. His primary research focus areas were real-time network monitoring and data analysis in smart grids to detect malware activity in SCADA systems and corporate networks. He was also leading Security Service Level Agreement (Sec-SLA) and end user security/privacy protected data store projects for hybrid Cloud environment. He is a frequent speaker in professional and industry conferences. Before joining EMC, Silvio worked as a Malware Reverse Engineer in Symantec’s Security Response team in Dublin, Ireland. Silvio holds a PhD in Computer Network Security from the University of Pisa, Italy.
Silvio La Porta
Antonio Villani is the Co-Founder of RETooling. He is working full-time on the development of red-team and adversary emulation capabilities for his company. Previously he spent most of his time in the blueteam, reversing high level implants for top tier customers and providing detailed information to support cyber-defense and cyber threat intelligence teams. Now he analyzes complex implants to gain a deep understanding of the TTPs used by threat actors and to provide a high-quality reimplementation of them. As a researcher he published in top tier conferences and journals, and he participated in European research projects in the field of cyber resilience and data security. During his PhD he worked in the field of malware research and digital forensics.
Antonio Villani