Pentera Logo Pentera Logo White
resources
Feb 2026
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Purpose Attackers can utilize Living Off the Land Binaries (LOLBins) to execute commands, evade detection,...
Read now
“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”

Rubén Alonso | Head of Secure
Development Unit, Telefonica

“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”

Owen Fuller | Cybersecurity Engineering
Manager, Casey’s

ON-DEMAND WEBINAR

Flying Under the EDR Radar

Webinars
Oct 17, 2021

Attackers can evade modern EDR solutions using direct syscall techniques. Continuous validation is essential to uncover detection blind spots and strengthen defenses.

This webinar explores how advanced attackers bypass endpoint detection and response (EDR) solutions by operating below traditional detection layers. It explains how EDR tools rely on user-mode hooks and system call monitoring, and how attackers use direct syscall invocation to evade those mechanisms. The session dives into Windows internals and demonstrates how bypass techniques avoid common behavioral detection triggers.

A live demonstration contrasts traditional API-based injection, which triggers detection, with syscall-based injection that executes without alerting EDR. The webinar concludes with defensive recommendations, including monitoring abnormal call stack behavior and validating detection assumptions through realistic testing. The core message emphasizes continuously testing defenses against real-world evasion techniques.