Submitted URL: https://ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Effective URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Submission Tags: falconsandbox
Submission: On September 02 via api from US

Summary

This website contacted 14 IPs in 2 countries across 11 domains to perform 52 HTTP transactions. The main IP is 2606:4700::6812:191, located in United States and belongs to CLOUDFLARENET, US. The main domain is www.ired.team.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on November 27th 2020. Valid for: a year.
This is the only time www.ired.team was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
21 gblobscdn.gitbook.com www.ired.team
gstatic.gitbook.com
8 gstatic.gitbook.com www.ired.team
gstatic.gitbook.com
6 s-usc1c-nss-216.firebaseio.com gstatic.gitbook.com
3 www.google-analytics.com gstatic.gitbook.com
2 docs.microsoft.com www.ired.team
2 lh5.googleusercontent.com www.ired.team
gstatic.gitbook.com
1 www.gitbook.com gstatic.gitbook.com
1 gitbook-28427.firebaseio.com gstatic.gitbook.com
1 app.gitbook.com gstatic.gitbook.com
1 cdn.lr-ingest.io gstatic.gitbook.com
1 fonts.gstatic.com fonts.googleapis.com
1 polyfill.io www.ired.team
1 unpkg.com www.ired.team
1 fonts.googleapis.com www.ired.team
1 www.ired.team
1 ired.team 1 redirects
52 16
Subject Issuer Validity Valid
www.ired.team
Cloudflare Inc ECC CA-3
2020-11-27 -
2021-11-26
a year crt.sh
upload.video.google.com
GTS CA 1O1
2021-08-16 -
2021-11-08
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-07-02 -
2022-07-01
a year crt.sh
polyfill.io
GlobalSign Atlas R3 DV TLS CA 2020
2021-06-04 -
2022-07-06
a year crt.sh
*.googleusercontent.com
GTS CA 1C3
2021-08-16 -
2021-11-08
3 months crt.sh
docs.microsoft.com
Microsoft RSA TLS CA 01
2021-07-26 -
2022-07-26
a year crt.sh
*.gstatic.com
GTS CA 1C3
2021-08-16 -
2021-11-08
3 months crt.sh
firebaseio.com
GTS CA 1D4
2021-07-01 -
2021-09-29
3 months crt.sh
*.google-analytics.com
GTS CA 1C3
2021-08-16 -
2021-11-08
3 months crt.sh

This page contains 3 frames:

Primary Page: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Frame ID: FCB2401E57DAB09E6CE0068D71AB8966
Requests: 45 HTTP requests in this frame

Frame: https://gitbook-28427.firebaseio.com/.lp?start=t&ser=36284854&cb=1&v=5
Frame ID: 860B9C1971622F79CDBB4908DBA1FCE8
Requests: 6 HTTP requests in this frame

Frame: https://s-usc1c-nss-216.firebaseio.com/.lp?dframe=t&id=5535247&pw=IZeNFHOpil&ns=gitbook-28427
Frame ID: 94BF20C23BCF0D0D66998743395EC056
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Calling Syscalls Directly from Visual Studio to Bypass AVs/EDRs - Red Teaming Experiments

Page URL History Show full URLs

  1. https://ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studi... HTTP 301
    https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studi... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<[^>]+data-react/i

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • script /\/polyfill\.min\.js/i

Page Statistics

52
Requests

98 %
HTTPS

93 %
IPv6

11
Domains

16
Subdomains

14
IPs

2
Countries

4438 kB
Transfer

10894 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs HTTP 301
    https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

52 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
www.ired.team/offensive-security/defense-evasion/
Redirect Chain
  • https://ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
  • https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
2 MB
446 KB
Document
General
Full URL
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:191 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4eca376416e6823ae7fecb6d01a070b46e0054dee158a63b96e6ab125438048b
Security Headers
Name Value
Content-Security-Policy default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Security-Policy default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.ired.team
:scheme
https
:path
/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
content-type
text/html; charset=utf-8
cf-ray
68896ebeb8dd5b92-FRA
age
5530
cache-control
public, max-age=86400, s-maxage=86400, stale-while-revalidate=3600, stale-if-error=43200
strict-transport-security
max-age=31536000; includeSubDomains
vary
Accept-Encoding, Authorization, Cookie, X-CDN-Host
cf-cache-status
HIT
content-security-policy
default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
function-execution-id
j57qh1tkzp95
referrer-policy
no-referrer-when-downgrade
x-cdn-cache-group
-LFEMnER3fywgFHoroYn
x-cloud-trace-context
119aaece666b038b96abb05da8219fdc
x-content-security-policy
default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
x-content-type-options
nosniff
x-dns-prefetch-control
off
x-download-options
noopen
x-permitted-cross-domain-policies
none
x-webkit-csp
default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
x-xss-protection
1; mode=block
server
cloudflare
content-encoding
gzip

Redirect headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cache-control
max-age=3600
expires
Thu, 02 Sep 2021 21:19:19 GMT
location
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=AkcqrNGvX2KLdmsshI9bzr49PKCQUnmMrSgKXVt8S%2FHGEZz81qJDuuEen9Rn364QUa%2BCleQ9SVHnm4rT%2BOyFvjE0pglSA5BgKEtvLMS3mGil8KhF%2BUEnWxhQYd76nLQT%2Fhqf%2Fr9jtyg%3D"}],"group":"cf-nel","max_age":604800}
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary
Accept-Encoding
server
cloudflare
cf-ray
68896ebe68db5c0e-FRA
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
css
fonts.googleapis.com/
2 KB
659 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Source+Code+Pro:500&display=swap
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
6da43a0ac4abcb5bc4b10164a762759e5cc81f37e00033643034a891fb490c82
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Thu, 02 Sep 2021 20:02:56 GMT
server
ESF
date
Thu, 02 Sep 2021 20:19:19 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Thu, 02 Sep 2021 20:19:19 GMT
emojione-sprite-40.min.css
unpkg.com/emojione-assets@4.0.0/sprites/
183 KB
17 KB
Stylesheet
General
Full URL
https://unpkg.com/emojione-assets@4.0.0/sprites/emojione-sprite-40.min.css
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7daf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5e939d7d3f9c9bfe632d16484c12354fa89a12738f30f738aa81c984e5b9a92
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
age
14165718
vary
Accept-Encoding
last-modified
Sat, 26 Oct 1985 08:15:00 GMT
server
cloudflare
etag
W/"2dc7c-MlEndlChcp6B66cJCh5yD8CB/Fo"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/css; charset=utf-8
access-control-allow-origin
*
x-cloud-trace-context
e0ac7d85fe9bfe99ddd0e0018c758a56
cache-control
public, max-age=31536000
cf-ray
68896ebf0a014a56-FRA
6c3c9dec9383137845be0f0ea2cf1bf4.css
gstatic.gitbook.com/css/
1 KB
1 KB
Stylesheet
General
Full URL
https://gstatic.gitbook.com/css/6c3c9dec9383137845be0f0ea2cf1bf4.css
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5ff636c13e4983198fbed7d325d1cbafbe544702de06f5874c46e359ce68b43

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
content-encoding
gzip
cf-cache-status
HIT
age
11517899
cf-polished
origSize=1701
x-guploader-uploadid
ABg5-UwiIdAcAjrmRlFxwdUIs61NAokkry_-iZ807hfyhPF7n05ywV-MhhKGJXAj1nhFXaaZ1Wx1tw1RuwfcZvRBTHA
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
text/css
last-modified
Wed, 07 Apr 2021 08:43:49 GMT
server
cloudflare
etag
W/"6c3c9dec9383137845be0f0ea2cf1bf4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=hL62rA==, md5=bDyd7JODE3hFvg8Oos8b9A==
x-goog-generation
1617785029532093
access-control-allow-origin
*
expires
Thu, 21 Apr 2022 20:23:08 GMT
cache-control
public, max-age=31536000
x-goog-stored-content-length
1701
cf-ray
68896ebf2ec55c08-FRA
cf-bgj
minify
polyfill.min.js
polyfill.io/v3/
101 B
567 B
Script
General
Full URL
https://polyfill.io/v3/polyfill.min.js?flags=gated&features=Intl
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.65.26 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
069a660398be8db8f9b6d8dad3f052d9a061b697b5354c24784c62d3df0a82f7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubdomains; preload
content-encoding
br
x-content-type-options
nosniff
content-type
text/javascript; charset=utf-8
age
3083170
detected-user-agent
Chrome/92.0.4515
server-timing
HIT, fastly;desc="Edge time";dur=0, HIT, fastly;desc="Edge time";dur=1
content-length
89
referrer-policy
origin-when-cross-origin
last-modified
Wed, 28 Jul 2021 20:34:45 GMT
date
Thu, 02 Sep 2021 20:19:19 GMT
vary
User-Agent, Accept-Encoding
access-control-allow-methods
GET,HEAD,OPTIONS
normalized-user-agent
chrome/92.0.0
access-control-allow-origin
*
cache-control
public, s-maxage=31536000, max-age=604800, stale-while-revalidate=604800, stale-if-error=604800
accept-ranges
bytes
timing-allow-origin
*
spaces%2F-LFEMnER3fywgFHoroYn%2Favatar.png
gblobscdn.gitbook.com/
28 KB
29 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/spaces%2F-LFEMnER3fywgFHoroYn%2Favatar.png?alt=media
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aee2771f5f57ecf568ffffd5c0d0fee81b7fb2b5540e10d856f2462abdbd5f92

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
HIT
age
11453744
x-guploader-uploadid
ABg5-UzTfWJh6V0B0k2lFPabkrMdmvV3nYkpS2yXi96O2qwxzor09DJgESW3o58wiAWT6dRVCB72aizzWA6t6Q6FplW3MkbWYA
x-goog-storage-class
STANDARD
x-goog-metageneration
3
x-goog-stored-content-encoding
identity
content-type
image/png
content-length
29066
last-modified
Sat, 08 Sep 2018 20:00:14 GMT
server
cloudflare
etag
"2965c5f978755802debc0291c5574853"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=ALxBKw==, md5=KWXF+Xh1WALevAKRxVdIUw==
x-goog-generation
1536436814766237
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
29066
x-goog-meta-firebasestoragedownloadtokens
1910800b-eed5-42ea-b282-39d0660128fe
accept-ranges
bytes
cf-ray
68896ebf3f76062d-FRA
expires
Sat, 23 Apr 2022 06:43:34 GMT
photo.jpg
lh5.googleusercontent.com/-BT5DyX_LUys/AAAAAAAAAAI/AAAAAAAAAF4/wkmG-hKpMQk/
7 KB
7 KB
Image
General
Full URL
https://lh5.googleusercontent.com/-BT5DyX_LUys/AAAAAAAAAAI/AAAAAAAAAF4/wkmG-hKpMQk/photo.jpg
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
3e46dc2084ab2945b5af16a2d88abcd6fa7e8aa5ef5a43fc6c83ce561b6c9577
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 16:28:32 GMT
x-content-type-options
nosniff
age
13847
content-disposition
inline;filename=""
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6707
x-xss-protection
0
server
fife
etag
"v5e"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sun, 29 Aug 2021 17:14:28 GMT
111.c397faa5.js
gstatic.gitbook.com/js/
3 MB
945 KB
Script
General
Full URL
https://gstatic.gitbook.com/js/111.c397faa5.js
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0d3314c9c8db9cdcb1d1a8d09ab70a3accfab8fae94e25f60da8dd2db7fecf1d

Request headers

Origin
https://www.ired.team
Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
content-encoding
gzip
cf-cache-status
HIT
age
2608564
cf-polished
origSize=3419136
x-guploader-uploadid
ADPycdvsvhxlz1a1AbBMWTH-CygsBhWpKrKIkQhNUSA7GWVAp7iG2RiyVSYbR_4Fvd8MczylzciYUr-njQl70aBrU60
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
application/javascript
expires
Wed, 03 Aug 2022 15:41:30 GMT
last-modified
Tue, 03 Aug 2021 15:39:24 GMT
server
cloudflare
etag
W/"da500dec2eac40cba0cc32e5c179f635"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=/2S3YQ==, md5=2lAN7C6sQMugzDLlwXn2NQ==
x-goog-generation
1628005164215937
access-control-allow-origin
*
access-control-expose-headers
Content-Length, Date, Server, Transfer-Encoding, X-GUploader-UploadID, X-Google-Trace
cache-control
public, max-age=31536000
x-goog-stored-content-length
3419136
cf-ray
68896ebfa94c2bc2-FRA
cf-bgj
minify
logo-ms-social.png
docs.microsoft.com/en-us/media/logos/
449 B
1 KB
Image
General
Full URL
https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:299::353e Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
2d59b358c254d5467046e6f341825949aafecfe46af27b541fae72850c9fc41f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
nel
{"report_to":"network-errors","max_age":604800,"success_fraction":0.01,"failure_fraction":1.0}
content-length
449
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge
x-rendering-stack
Static
last-modified
Tue, 23 Mar 2021 02:10:29 GMT
x-datacenter
wus
date
Thu, 02 Sep 2021 20:19:19 GMT
x-frame-options
SAMEORIGIN
report-to
{"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://mdec.nelreports.net/api/report?cat=mdocs"}]}
content-type
image/png
cache-control
public, max-age=1111
etag
"0x8D8EDA0D52AC0F3"
akamai-cache-status
RefreshHit from child
request-context
appId=cid-v1:b1c5b6ea-7ff0-41d3-9862-84c5e1dc3be7
expires
Thu, 02 Sep 2021 20:37:50 GMT
f4fa50c4003f87e7dc10459e500933c3.woff
gstatic.gitbook.com/fonts/
92 KB
93 KB
Font
General
Full URL
https://gstatic.gitbook.com/fonts/f4fa50c4003f87e7dc10459e500933c3.woff
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3e692de9565d90dd947a080d4d10cee72a83447ba053e08fdcac457d7197128a

Request headers

Origin
https://www.ired.team
Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
HIT
age
11452458
x-guploader-uploadid
ABg5-UxyEzdcNSdaJtXWOu_1a_Udqa_IwHrRlOjvAN1WdWLiRwt_LkJphbV5J8YSQYHy5mSn7RZDeP804aUQsKcyUKyG167dEA
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
font/woff
content-length
94368
last-modified
Wed, 07 Apr 2021 08:43:49 GMT
server
cloudflare
etag
"f4fa50c4003f87e7dc10459e500933c3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=FUjfEA==, md5=9PpQxAA/h+fcEEWeUAkzww==
x-goog-generation
1617785029592662
access-control-allow-origin
*
access-control-expose-headers
Content-Length, Date, Server, Transfer-Encoding, X-GUploader-UploadID, X-Google-Trace
cache-control
public, max-age=31536000
x-goog-stored-content-length
94368
accept-ranges
bytes
cf-ray
68896ebfd99d2bc2-FRA
expires
Wed, 20 Apr 2022 06:41:18 GMT
72e37e5bf95a8dba938c78b1d7d91253.woff
gstatic.gitbook.com/fonts/
92 KB
92 KB
Font
General
Full URL
https://gstatic.gitbook.com/fonts/72e37e5bf95a8dba938c78b1d7d91253.woff
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a18af7799b7d241fe5d00645492ccedcad39815e9f4125b7e3e90b18a1b77405

Request headers

Origin
https://www.ired.team
Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
HIT
age
2316402
x-guploader-uploadid
ADPycdsMBGzvEtar6fwzl64JyJK4WKK0Bd74wi-hbeByneuNB5lLwuQFyvXPfqo8g45bSTdkD2p6dOAS9JfQIKECKQA
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
font/woff
content-length
94040
last-modified
Tue, 03 Aug 2021 15:39:24 GMT
server
cloudflare
etag
"72e37e5bf95a8dba938c78b1d7d91253"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=TBIniA==, md5=cuN+W/lajbqTjHix19kSUw==
x-goog-generation
1625143784545370
access-control-allow-origin
*
access-control-expose-headers
Content-Length, Content-Type, Date, Server, Transfer-Encoding, X-GUploader-UploadID, X-Google-Trace
cache-control
public, max-age=31536000
x-goog-stored-content-length
94040
accept-ranges
bytes
cf-ray
68896ebfd99f2bc2-FRA
expires
Fri, 05 Aug 2022 17:19:24 GMT
fc3d4b35e4d07d4e0485cc2db0e57c77.woff
gstatic.gitbook.com/fonts/
92 KB
92 KB
Font
General
Full URL
https://gstatic.gitbook.com/fonts/fc3d4b35e4d07d4e0485cc2db0e57c77.woff
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b87e90677bdbc3c6bc296a368f57b2d72783c1a7c6e8e9325cd1645c18039cf2

Request headers

Origin
https://www.ired.team
Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
HIT
age
842929
x-guploader-uploadid
ADPycdtb5KbwN2Sbkz_IEMo1RkdGqca9ElKFdlf02bwdsUNzxiVZlDSLe2qNwEE3i-mcO4egj4jJ0m5gWAMs0-Uq_zXsMPECNQ
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
font/woff
content-length
93788
last-modified
Tue, 03 Aug 2021 15:39:24 GMT
server
cloudflare
etag
"fc3d4b35e4d07d4e0485cc2db0e57c77"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=7TN+QQ==, md5=/D1LNeTQfU4EhcwtsOV8dw==
x-goog-generation
1625143784549288
access-control-allow-origin
*
access-control-expose-headers
Content-Length, Content-Type, Date, Server, Transfer-Encoding, X-GUploader-UploadID, X-Google-Trace
cache-control
public, max-age=31536000
x-goog-stored-content-length
93788
accept-ranges
bytes
cf-ray
68896ebfd9a42bc2-FRA
expires
Fri, 05 Aug 2022 04:53:00 GMT
HI_XiYsKILxRpg3hIP6sJ7fM7PqtzsjDs-cq.woff2
fonts.gstatic.com/s/sourcecodepro/v14/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/sourcecodepro/v14/HI_XiYsKILxRpg3hIP6sJ7fM7PqtzsjDs-cq.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Source+Code+Pro:500&display=swap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f29cd3a2bdcacf9f9f7285c9b74d89f55634f4d43752d81a48914afa7442eb66
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://www.ired.team
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Tue, 31 Aug 2021 12:22:52 GMT
x-content-type-options
nosniff
age
201387
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13540
x-xss-protection
0
last-modified
Wed, 24 Mar 2021 17:51:24 GMT
server
sffe
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 31 Aug 2022 12:22:52 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjArc3FHP4Bp0ltWUOF%2Fimage.png
gblobscdn.gitbook.com/
41 KB
42 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjArc3FHP4Bp0ltWUOF%2Fimage.png?alt=media&token=5ff75d70-bcdb-4451-9082-b07ab0e4b6e2
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1e7af20bf828f0bef62fdc576b55c1ff6e2fce144321286548e6603f5de5b3c2

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
HIT
age
88084
x-guploader-uploadid
ADPycdszGLkcyW6tf8T_mrz7o-Pcg0Wfpo2s7uoPEPL4L0PjweIom5Hyc_C64ye61GhcdeIDy3BJ79DUxk3er0Epn9M
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
42185
last-modified
Sun, 07 Jul 2019 13:19:57 GMT
server
cloudflare
etag
"ca14c741761d2f3e3cd310eb2589cdeb"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=VButHw==, md5=yhTHQXYdLz480xDrJYnN6w==
x-goog-generation
1562505597293291
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
42185
x-goog-meta-firebasestoragedownloadtokens
5ff75d70-bcdb-4451-9082-b07ab0e4b6e2
accept-ranges
bytes
cf-ray
68896ec04a05062d-FRA
expires
Thu, 01 Sep 2022 19:51:15 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjBZIlBFPLR4UN-jdL5%2Fimage.png
gblobscdn.gitbook.com/
46 KB
46 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjBZIlBFPLR4UN-jdL5%2Fimage.png?alt=media&token=fe38d794-7ef3-429f-946d-097bee5f8565
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7edc4c63b721a6cf081a6f4b9a676d64abb7953ee6bb770f45d0b6a7ca5f1d79

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
HIT
age
272495
x-guploader-uploadid
ADPycdvfMlE5mQn-7P0H5qt0YAPVRDbHh5d_HYOJHf3YWHh_6b4Rv7qFLHd7vPCm0tutXr6NruHkPQPM3AzGcHt1cgI
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
46600
last-modified
Sun, 07 Jul 2019 13:19:57 GMT
server
cloudflare
etag
"fe685c9c5e46f45e0d699f9c1835d3e3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=PXQLdQ==, md5=/mhcnF5G9F4NaZ+cGDXT4w==
x-goog-generation
1562505597085480
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
46600
x-goog-meta-firebasestoragedownloadtokens
fe38d794-7ef3-429f-946d-097bee5f8565
accept-ranges
bytes
cf-ray
68896ec04a08062d-FRA
expires
Tue, 30 Aug 2022 16:37:44 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjAypSnABoamJA5qtKP%2Fimage.png
gblobscdn.gitbook.com/
27 KB
28 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjAypSnABoamJA5qtKP%2Fimage.png?alt=media&token=c3e845dc-f3f0-484b-b9cd-173e5b92c970
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
25599a4f79b3b74be393d2a0d55386ed73a28360af4f7b693a75593e8ff36a8b

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:20 GMT
cf-cache-status
MISS
x-guploader-uploadid
ADPycdtslvUIKjC6IX8wWpl0m7qUwBZFeXXo5gsyH7-jQBBgL2LDYgLsRaBFNgrQfCDecvRgdY646cBQm7pC0lKlKv0
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
27890
last-modified
Sun, 07 Jul 2019 13:19:57 GMT
server
cloudflare
etag
"9f676533c7e81b9c2aa11bc347c2a2e9"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=jIgsaA==, md5=n2dlM8foG5wqoRvDR8Ki6Q==
x-goog-generation
1562505597082428
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
27890
x-goog-meta-firebasestoragedownloadtokens
c3e845dc-f3f0-484b-b9cd-173e5b92c970
accept-ranges
bytes
cf-ray
68896ec04a09062d-FRA
expires
Fri, 02 Sep 2022 20:19:19 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjBZcR2cOj3bna9xZac%2Fimage.png
gblobscdn.gitbook.com/
90 KB
91 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjBZcR2cOj3bna9xZac%2Fimage.png?alt=media&token=59316efd-8f34-4808-b60f-43d2fb36f4b2
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bd8421a188c6b000167a66d7397edf18c54c7f18c24e0fe078d7c45aeae84ef4

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:20 GMT
cf-cache-status
MISS
x-guploader-uploadid
ADPycdt3KwpgwTfZQQGfjq8YfiufQGS_-dG1iAe7-VVFOsRv8pVJIvzqJ3UvFSOTYiZjW4qVPsJh_wOtaO_ivXa8l37vIdqblw
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
92397
last-modified
Sun, 07 Jul 2019 13:19:57 GMT
server
cloudflare
etag
"2b0fd2b58694f79194dbad709c1b407b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=JN5RqQ==, md5=Kw/StYaU95GU261wnBtAew==
x-goog-generation
1562505597695041
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
92397
x-goog-meta-firebasestoragedownloadtokens
59316efd-8f34-4808-b60f-43d2fb36f4b2
accept-ranges
bytes
cf-ray
68896ec04a0a062d-FRA
expires
Fri, 02 Sep 2022 20:19:20 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBbmzimlPcrRQgsuBT%2Fimage.png
gblobscdn.gitbook.com/
9 KB
9 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBbmzimlPcrRQgsuBT%2Fimage.png?alt=media&token=a250b915-a7e2-4760-8183-d576f1482b3d
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7f064bc8ed20d75e78805ec7c40459498070952acb3985faca22a35e3c9f78b5

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
HIT
age
88084
x-guploader-uploadid
ADPycdscxWJCdN0uJXVn6CE0NpJ8XaKBFo44BXyqnixS8artCjaueLgP6dZ0IZMms499WFhTdoQk9SqDWpjKg7YebOs
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
9204
last-modified
Sun, 07 Jul 2019 13:50:14 GMT
server
cloudflare
etag
"7e21e93c4eb6c35937cae29ac75c189d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=55IcWA==, md5=fiHpPE62w1k3yuKax1wYnQ==
x-goog-generation
1562507414312028
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
9204
x-goog-meta-firebasestoragedownloadtokens
a250b915-a7e2-4760-8183-d576f1482b3d
accept-ranges
bytes
cf-ray
68896ec04a0c062d-FRA
expires
Thu, 01 Sep 2022 19:51:15 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBbx9pxN_2vbFOEkEZ%2Fimage.png
gblobscdn.gitbook.com/
28 KB
28 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBbx9pxN_2vbFOEkEZ%2Fimage.png?alt=media&token=95617a95-5298-48cf-a2de-f2dcfe881df5
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2069c259c3eef690d62c0d9ca55a89498efbaedeb74b65070513ffbf60df6bb6

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
HIT
age
272495
x-guploader-uploadid
ADPycdtHerTrhQW1VIjZZlhB5wpA3DvkQCRqzr4RIyzQRawXUFpqX7WRoCI9OMptFwywVO66OX2P9P6kKTRxs9O0iaH9EdI94g
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
28334
last-modified
Sun, 07 Jul 2019 13:50:14 GMT
server
cloudflare
etag
"96ff9af4be090f6f1b9cd6b152632c9f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=NlADyQ==, md5=lv+a9L4JD28bnNaxUmMsnw==
x-goog-generation
1562507414384037
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
28334
x-goog-meta-firebasestoragedownloadtokens
95617a95-5298-48cf-a2de-f2dcfe881df5
accept-ranges
bytes
cf-ray
68896ec04a0d062d-FRA
expires
Tue, 30 Aug 2022 16:37:44 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBd_DMd_yudyBgGuWB%2Fimage.png
gblobscdn.gitbook.com/
25 KB
25 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBd_DMd_yudyBgGuWB%2Fimage.png?alt=media&token=dee1844a-d4b1-4ff9-b234-06b2af94cea2
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0dce5da46efff3e6f2a0becf8686d2a98b52c575e3d23affab7a091d8b27d1f9

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
HIT
age
88083
x-guploader-uploadid
ADPycdsdK6oUoVFaigu-Tv0CHXz1izKU92c0xYg5x5Xwgy_6SzmxAd5t8IfJNjBN_Avhv1_OIlsYS3gCdmdBq_eOevI
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
25134
last-modified
Sun, 07 Jul 2019 13:50:14 GMT
server
cloudflare
etag
"17b7f296cb9b1b39f97ebc9bd1e5f41e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=ThmbgQ==, md5=F7fylsubGzn5fryb0eX0Hg==
x-goog-generation
1562507414318112
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
25134
x-goog-meta-firebasestoragedownloadtokens
dee1844a-d4b1-4ff9-b234-06b2af94cea2
accept-ranges
bytes
cf-ray
68896ec04a10062d-FRA
expires
Thu, 01 Sep 2022 19:51:15 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBeB7V-PtWxmKUSdwo%2Fimage.png
gblobscdn.gitbook.com/
19 KB
20 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBeB7V-PtWxmKUSdwo%2Fimage.png?alt=media&token=6cae38da-10f6-4375-87dd-fa9553be721b
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
35167ba1fc4cf1fc06cf5c7d659855729ac71fa694a7cb007ac76d2cf5160883

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:20 GMT
cf-cache-status
MISS
x-guploader-uploadid
ADPycdut6k9H-nmT1p0WwroRK7evj9OY8K8ssP5y_oydlRTw6-p1glPKiB-_DbuqXtiIJ3EIxGlwn-hRBszcmaVJCVI
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
19691
last-modified
Sun, 07 Jul 2019 13:50:14 GMT
server
cloudflare
etag
"9202003a2104260df732b0ec0b13b60e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=RFG7fw==, md5=kgIAOiEEJg33MrDsCxO2Dg==
x-goog-generation
1562507414340087
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
19691
x-goog-meta-firebasestoragedownloadtokens
6cae38da-10f6-4375-87dd-fa9553be721b
accept-ranges
bytes
cf-ray
68896ec04a11062d-FRA
expires
Fri, 02 Sep 2022 20:19:19 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBgEfj9hapb_G_hQm8%2Fimage.png
gblobscdn.gitbook.com/
105 KB
106 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBgEfj9hapb_G_hQm8%2Fimage.png?alt=media&token=ba8aab2e-113c-433f-9490-03d371794790
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
395aee6ff583c57a3b9c68837e58ebd3ab82dc69277f22e8532b61fe97ed298c

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:19 GMT
cf-cache-status
MISS
x-guploader-uploadid
ADPycdsOFhvxFIV4WSX9jXhiLVVkUM-WgXiGkAJbsYowZsTehMSoPwr67RRycTTgwBF9zz_TyYXmbQ5P2--4VddIYqw
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
107667
last-modified
Sun, 07 Jul 2019 13:50:15 GMT
server
cloudflare
etag
"731d9f99b1f900e807fa1627250db841"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=u6c++Q==, md5=cx2fmbH5AOgH+hYnJQ24QQ==
x-goog-generation
1562507415058104
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
107667
x-goog-meta-firebasestoragedownloadtokens
ba8aab2e-113c-433f-9490-03d371794790
accept-ranges
bytes
cf-ray
68896ec04a12062d-FRA
expires
Thu, 01 Sep 2022 19:51:15 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBgbyzlmx2SIrGuGIk%2Fsyscall-debugging.gif
gblobscdn.gitbook.com/
796 KB
797 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBgbyzlmx2SIrGuGIk%2Fsyscall-debugging.gif?alt=media&token=a66279aa-f0d6-426c-bfeb-c95c8896aabb
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
26229819090dce19bc974819478b2daa7be55f4f7803259b68eb9f6af6587dbe

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:20 GMT
cf-cache-status
MISS
x-guploader-uploadid
ADPycdutiGpof83MoagTWaUDIqfMzUU5aSk0JLQqBQX8fUlUlElebphIElEzv-_-0ZGrVYI4apCeuRzd1gUiEJTv9Ik
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''syscall-debugging.gif
content-type
image/gif
content-length
815106
last-modified
Sun, 07 Jul 2019 13:50:15 GMT
server
cloudflare
etag
"3b64be8009f87c22037997bc714e1d19"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=KWhVFw==, md5=O2S+gAn4fCIDeZe8cU4dGQ==
x-goog-generation
1562507415745379
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
815106
x-goog-meta-firebasestoragedownloadtokens
a66279aa-f0d6-426c-bfeb-c95c8896aabb
accept-ranges
bytes
cf-ray
68896ec04a13062d-FRA
expires
Fri, 02 Sep 2022 20:19:19 GMT
logger.min.js
cdn.lr-ingest.io/
750 KB
153 KB
Script
General
Full URL
https://cdn.lr-ingest.io/logger.min.js
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::ac43:a339 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
63b4ed094872ff709380d21285efed1bd2112364ae340b6d6fc8360d1ed4c367
Security Headers
Name Value
Strict-Transport-Security max-age=31556926

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:20 GMT
content-encoding
br
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
217
x-cache
HIT
cross-origin-resource-policy
cross-origin
strict-transport-security
max-age=31556926
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
x-served-by
cache-fra19165-FRA
last-modified
Thu, 02 Sep 2021 19:47:58 GMT
server
cloudflare
x-timer
S1630612237.111029,VS0,VE1
etag
W/"5c4e36df0e643a4cb4ba25824d7ae1780a1505e5961385f2f779b48c94aa7073"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
x-fh-requested-host, accept-encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vkQ9F2ovmzU6DF5NBqnSWYFplM6b%2BqvB50%2FOu0HIbshTsKf8Ycv2Sa21%2BCbagAtpKizCsLLMDwQ81%2B9kFalhs7jzb8METqSJTv2lfw3RVI8kVTJzz1g7tAeeM%2FufCWI81S%2FZaHprALVqwsxYlVNq"}],"group":"cf-nel","max_age":604800}
content-type
text/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=14400
cf-ray
68896ec30d5f5b98-FRA
x-cache-hits
1
__session
app.gitbook.com/
52 B
581 B
Fetch
General
Full URL
https://app.gitbook.com/__session?proposed=724c679f-570a-4c8a-be38-96e695120051R
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
00133af31c069fed4aad3efc0c35c995b77a4b6fdf63955ba5939c85951fa60e

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:20 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
x-magic-hash
f46ac4bf6b6dc125a68e9ad566b48481631bb27eec2165532a7c0f538e93c4f6
x-cache
MISS
x-release
gitbook-28427-6.25.14
access-control-allow-origin
https://www.ired.team
server
cloudflare
etag
W/"34-8C3kKcXVV/X+7+5LqXfwjeqe7zc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Origin, Accept-Encoding
content-type
application/json; charset=utf-8
via
no cache
x-cloud-trace-context
d8fc7bd13d3ad5f68ae47429602f708d
cache-control
private
access-control-allow-credentials
true
function-execution-id
s1d5gjmfhq7x
cf-ray
68896ec588445c08-FRA
expires
Thu, 02 Sep 2021 20:19:20 GMT
98041b61-093a-4872-b7eb-fc4014f8efbf
https://www.ired.team/
426 KB
0
Other
General
Full URL
blob:https://www.ired.team/98041b61-093a-4872-b7eb-fc4014f8efbf
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ce683cd51bc0a4740e2ecdd92c146551ef62ffcce2d4937e999b34631f8590b9

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Content-Length
436210
.lp
gitbook-28427.firebaseio.com/ Frame 860B
422 B
664 B
Script
General
Full URL
https://gitbook-28427.firebaseio.com/.lp?start=t&ser=36284854&cb=1&v=5
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
d4950ba45b6f9f3baad466b67c2466143e2f4464fc7247aeaa024a541cadbe86
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 20:19:21 GMT
Server
nginx
Connection
keep-alive
Content-Length
422
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjArc3FHP4Bp0ltWUOF%2Fimage.png
gblobscdn.gitbook.com/
41 KB
42 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjArc3FHP4Bp0ltWUOF%2Fimage.png?alt=media&token=5ff75d70-bcdb-4451-9082-b07ab0e4b6e2
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1e7af20bf828f0bef62fdc576b55c1ff6e2fce144321286548e6603f5de5b3c2

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
88086
x-guploader-uploadid
ADPycdszGLkcyW6tf8T_mrz7o-Pcg0Wfpo2s7uoPEPL4L0PjweIom5Hyc_C64ye61GhcdeIDy3BJ79DUxk3er0Epn9M
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
42185
last-modified
Sun, 07 Jul 2019 13:19:57 GMT
server
cloudflare
etag
"ca14c741761d2f3e3cd310eb2589cdeb"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=VButHw==, md5=yhTHQXYdLz480xDrJYnN6w==
x-goog-generation
1562505597293291
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
42185
x-goog-meta-firebasestoragedownloadtokens
5ff75d70-bcdb-4451-9082-b07ab0e4b6e2
accept-ranges
bytes
cf-ray
68896ec91df6062d-FRA
expires
Thu, 01 Sep 2022 19:51:15 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjBZIlBFPLR4UN-jdL5%2Fimage.png
gblobscdn.gitbook.com/
46 KB
46 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjBZIlBFPLR4UN-jdL5%2Fimage.png?alt=media&token=fe38d794-7ef3-429f-946d-097bee5f8565
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7edc4c63b721a6cf081a6f4b9a676d64abb7953ee6bb770f45d0b6a7ca5f1d79

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
272497
x-guploader-uploadid
ADPycdvfMlE5mQn-7P0H5qt0YAPVRDbHh5d_HYOJHf3YWHh_6b4Rv7qFLHd7vPCm0tutXr6NruHkPQPM3AzGcHt1cgI
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
46600
last-modified
Sun, 07 Jul 2019 13:19:57 GMT
server
cloudflare
etag
"fe685c9c5e46f45e0d699f9c1835d3e3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=PXQLdQ==, md5=/mhcnF5G9F4NaZ+cGDXT4w==
x-goog-generation
1562505597085480
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
46600
x-goog-meta-firebasestoragedownloadtokens
fe38d794-7ef3-429f-946d-097bee5f8565
accept-ranges
bytes
cf-ray
68896ec91dfe062d-FRA
expires
Tue, 30 Aug 2022 16:37:44 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjAypSnABoamJA5qtKP%2Fimage.png
gblobscdn.gitbook.com/
27 KB
27 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjAypSnABoamJA5qtKP%2Fimage.png?alt=media&token=c3e845dc-f3f0-484b-b9cd-173e5b92c970
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
25599a4f79b3b74be393d2a0d55386ed73a28360af4f7b693a75593e8ff36a8b

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
1
x-guploader-uploadid
ADPycdtslvUIKjC6IX8wWpl0m7qUwBZFeXXo5gsyH7-jQBBgL2LDYgLsRaBFNgrQfCDecvRgdY646cBQm7pC0lKlKv0
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
27890
last-modified
Sun, 07 Jul 2019 13:19:57 GMT
server
cloudflare
etag
"9f676533c7e81b9c2aa11bc347c2a2e9"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=jIgsaA==, md5=n2dlM8foG5wqoRvDR8Ki6Q==
x-goog-generation
1562505597082428
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
27890
x-goog-meta-firebasestoragedownloadtokens
c3e845dc-f3f0-484b-b9cd-173e5b92c970
accept-ranges
bytes
cf-ray
68896ec92e02062d-FRA
expires
Fri, 02 Sep 2022 20:19:19 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjBZcR2cOj3bna9xZac%2Fimage.png
gblobscdn.gitbook.com/
90 KB
90 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjAqJPrVK--o5vqKZl_%2F-LjBZcR2cOj3bna9xZac%2Fimage.png?alt=media&token=59316efd-8f34-4808-b60f-43d2fb36f4b2
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bd8421a188c6b000167a66d7397edf18c54c7f18c24e0fe078d7c45aeae84ef4

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
1
x-guploader-uploadid
ADPycdt3KwpgwTfZQQGfjq8YfiufQGS_-dG1iAe7-VVFOsRv8pVJIvzqJ3UvFSOTYiZjW4qVPsJh_wOtaO_ivXa8l37vIdqblw
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
92397
last-modified
Sun, 07 Jul 2019 13:19:57 GMT
server
cloudflare
etag
"2b0fd2b58694f79194dbad709c1b407b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=JN5RqQ==, md5=Kw/StYaU95GU261wnBtAew==
x-goog-generation
1562505597695041
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
92397
x-goog-meta-firebasestoragedownloadtokens
59316efd-8f34-4808-b60f-43d2fb36f4b2
accept-ranges
bytes
cf-ray
68896ec92e0f062d-FRA
expires
Fri, 02 Sep 2022 20:19:20 GMT
6c3c9dec9383137845be0f0ea2cf1bf4.css
gstatic.gitbook.com/css/
1 KB
611 B
Stylesheet
General
Full URL
https://gstatic.gitbook.com/css/6c3c9dec9383137845be0f0ea2cf1bf4.css
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5ff636c13e4983198fbed7d325d1cbafbe544702de06f5874c46e359ce68b43

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
content-encoding
gzip
cf-cache-status
HIT
age
11517901
cf-polished
origSize=1701
x-guploader-uploadid
ABg5-UwiIdAcAjrmRlFxwdUIs61NAokkry_-iZ807hfyhPF7n05ywV-MhhKGJXAj1nhFXaaZ1Wx1tw1RuwfcZvRBTHA
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
text/css
last-modified
Wed, 07 Apr 2021 08:43:49 GMT
server
cloudflare
etag
W/"6c3c9dec9383137845be0f0ea2cf1bf4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=hL62rA==, md5=bDyd7JODE3hFvg8Oos8b9A==
x-goog-generation
1617785029532093
access-control-allow-origin
*
expires
Thu, 21 Apr 2022 20:23:08 GMT
cache-control
public, max-age=31536000
x-goog-stored-content-length
1701
cf-ray
68896ec939ea5c08-FRA
cf-bgj
minify
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBbmzimlPcrRQgsuBT%2Fimage.png
gblobscdn.gitbook.com/
9 KB
9 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBbmzimlPcrRQgsuBT%2Fimage.png?alt=media&token=a250b915-a7e2-4760-8183-d576f1482b3d
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7f064bc8ed20d75e78805ec7c40459498070952acb3985faca22a35e3c9f78b5

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
88086
x-guploader-uploadid
ADPycdscxWJCdN0uJXVn6CE0NpJ8XaKBFo44BXyqnixS8artCjaueLgP6dZ0IZMms499WFhTdoQk9SqDWpjKg7YebOs
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
9204
last-modified
Sun, 07 Jul 2019 13:50:14 GMT
server
cloudflare
etag
"7e21e93c4eb6c35937cae29ac75c189d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=55IcWA==, md5=fiHpPE62w1k3yuKax1wYnQ==
x-goog-generation
1562507414312028
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
9204
x-goog-meta-firebasestoragedownloadtokens
a250b915-a7e2-4760-8183-d576f1482b3d
accept-ranges
bytes
cf-ray
68896ec95e5f062d-FRA
expires
Thu, 01 Sep 2022 19:51:15 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBbx9pxN_2vbFOEkEZ%2Fimage.png
gblobscdn.gitbook.com/
28 KB
28 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBbx9pxN_2vbFOEkEZ%2Fimage.png?alt=media&token=95617a95-5298-48cf-a2de-f2dcfe881df5
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2069c259c3eef690d62c0d9ca55a89498efbaedeb74b65070513ffbf60df6bb6

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
272497
x-guploader-uploadid
ADPycdtHerTrhQW1VIjZZlhB5wpA3DvkQCRqzr4RIyzQRawXUFpqX7WRoCI9OMptFwywVO66OX2P9P6kKTRxs9O0iaH9EdI94g
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
28334
last-modified
Sun, 07 Jul 2019 13:50:14 GMT
server
cloudflare
etag
"96ff9af4be090f6f1b9cd6b152632c9f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=NlADyQ==, md5=lv+a9L4JD28bnNaxUmMsnw==
x-goog-generation
1562507414384037
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
28334
x-goog-meta-firebasestoragedownloadtokens
95617a95-5298-48cf-a2de-f2dcfe881df5
accept-ranges
bytes
cf-ray
68896ec95e64062d-FRA
expires
Tue, 30 Aug 2022 16:37:44 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBd_DMd_yudyBgGuWB%2Fimage.png
gblobscdn.gitbook.com/
25 KB
25 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBd_DMd_yudyBgGuWB%2Fimage.png?alt=media&token=dee1844a-d4b1-4ff9-b234-06b2af94cea2
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0dce5da46efff3e6f2a0becf8686d2a98b52c575e3d23affab7a091d8b27d1f9

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
88085
x-guploader-uploadid
ADPycdsdK6oUoVFaigu-Tv0CHXz1izKU92c0xYg5x5Xwgy_6SzmxAd5t8IfJNjBN_Avhv1_OIlsYS3gCdmdBq_eOevI
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
25134
last-modified
Sun, 07 Jul 2019 13:50:14 GMT
server
cloudflare
etag
"17b7f296cb9b1b39f97ebc9bd1e5f41e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=ThmbgQ==, md5=F7fylsubGzn5fryb0eX0Hg==
x-goog-generation
1562507414318112
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
25134
x-goog-meta-firebasestoragedownloadtokens
dee1844a-d4b1-4ff9-b234-06b2af94cea2
accept-ranges
bytes
cf-ray
68896ec97ec6062d-FRA
expires
Thu, 01 Sep 2022 19:51:15 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBeB7V-PtWxmKUSdwo%2Fimage.png
gblobscdn.gitbook.com/
19 KB
20 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBeB7V-PtWxmKUSdwo%2Fimage.png?alt=media&token=6cae38da-10f6-4375-87dd-fa9553be721b
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
35167ba1fc4cf1fc06cf5c7d659855729ac71fa694a7cb007ac76d2cf5160883

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
1
x-guploader-uploadid
ADPycdut6k9H-nmT1p0WwroRK7evj9OY8K8ssP5y_oydlRTw6-p1glPKiB-_DbuqXtiIJ3EIxGlwn-hRBszcmaVJCVI
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
19691
last-modified
Sun, 07 Jul 2019 13:50:14 GMT
server
cloudflare
etag
"9202003a2104260df732b0ec0b13b60e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=RFG7fw==, md5=kgIAOiEEJg33MrDsCxO2Dg==
x-goog-generation
1562507414340087
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
19691
x-goog-meta-firebasestoragedownloadtokens
6cae38da-10f6-4375-87dd-fa9553be721b
accept-ranges
bytes
cf-ray
68896ec98ee5062d-FRA
expires
Fri, 02 Sep 2022 20:19:19 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBgEfj9hapb_G_hQm8%2Fimage.png
gblobscdn.gitbook.com/
105 KB
106 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBgEfj9hapb_G_hQm8%2Fimage.png?alt=media&token=ba8aab2e-113c-433f-9490-03d371794790
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
395aee6ff583c57a3b9c68837e58ebd3ab82dc69277f22e8532b61fe97ed298c

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
2
x-guploader-uploadid
ADPycdsOFhvxFIV4WSX9jXhiLVVkUM-WgXiGkAJbsYowZsTehMSoPwr67RRycTTgwBF9zz_TyYXmbQ5P2--4VddIYqw
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''image.png
content-type
image/png
content-length
107667
last-modified
Sun, 07 Jul 2019 13:50:15 GMT
server
cloudflare
etag
"731d9f99b1f900e807fa1627250db841"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=u6c++Q==, md5=cx2fmbH5AOgH+hYnJQ24QQ==
x-goog-generation
1562507415058104
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
107667
x-goog-meta-firebasestoragedownloadtokens
ba8aab2e-113c-433f-9490-03d371794790
accept-ranges
bytes
cf-ray
68896ec9af3c062d-FRA
expires
Thu, 01 Sep 2022 19:51:15 GMT
assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBgbyzlmx2SIrGuGIk%2Fsyscall-debugging.gif
gblobscdn.gitbook.com/
796 KB
797 KB
Image
General
Full URL
https://gblobscdn.gitbook.com/assets%2F-LFEMnER3fywgFHoroYn%2F-LjB_qkyhCQvQXmTWkaq%2F-LjBgbyzlmx2SIrGuGIk%2Fsyscall-debugging.gif?alt=media&token=a66279aa-f0d6-426c-bfeb-c95c8896aabb
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:96f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
26229819090dce19bc974819478b2daa7be55f4f7803259b68eb9f6af6587dbe

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
cf-cache-status
HIT
age
1
x-guploader-uploadid
ADPycdutiGpof83MoagTWaUDIqfMzUU5aSk0JLQqBQX8fUlUlElebphIElEzv-_-0ZGrVYI4apCeuRzd1gUiEJTv9Ik
x-goog-storage-class
STANDARD
x-goog-metageneration
2
x-goog-stored-content-encoding
identity
content-disposition
inline; filename*=utf-8''syscall-debugging.gif
content-type
image/gif
content-length
815106
last-modified
Sun, 07 Jul 2019 13:50:15 GMT
server
cloudflare
etag
"3b64be8009f87c22037997bc714e1d19"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=KWhVFw==, md5=O2S+gAn4fCIDeZe8cU4dGQ==
x-goog-generation
1562507415745379
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
815106
x-goog-meta-firebasestoragedownloadtokens
a66279aa-f0d6-426c-bfeb-c95c8896aabb
accept-ranges
bytes
cf-ray
68896ec9af3f062d-FRA
expires
Fri, 02 Sep 2022 20:19:19 GMT
.lp
s-usc1c-nss-216.firebaseio.com/ Frame 94BF
420 B
649 B
Document
General
Full URL
https://s-usc1c-nss-216.firebaseio.com/.lp?dframe=t&id=5535247&pw=IZeNFHOpil&ns=gitbook-28427
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
5ceee7e932e91222dc89e5f15f527a9bf78394f930d145a6624cdb90584a2421
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Host
s-usc1c-nss-216.firebaseio.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs

Response headers

Server
nginx
Date
Thu, 02 Sep 2021 20:19:21 GMT
Content-Type
text/html; charset=utf-8
Content-Length
420
Connection
keep-alive
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
photo.jpg
lh5.googleusercontent.com/-BT5DyX_LUys/AAAAAAAAAAI/AAAAAAAAAF4/wkmG-hKpMQk/
7 KB
7 KB
Image
General
Full URL
https://lh5.googleusercontent.com/-BT5DyX_LUys/AAAAAAAAAAI/AAAAAAAAAF4/wkmG-hKpMQk/photo.jpg
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
fife /
Resource Hash
3e46dc2084ab2945b5af16a2d88abcd6fa7e8aa5ef5a43fc6c83ce561b6c9577
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 16:28:32 GMT
x-content-type-options
nosniff
age
13849
content-disposition
inline;filename=""
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6707
x-xss-protection
0
server
fife
etag
"v5e"
vary
Origin
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
public, max-age=86400, no-transform
timing-allow-origin
*
expires
Sun, 29 Aug 2021 17:14:28 GMT
.lp
s-usc1c-nss-216.firebaseio.com/ Frame 860B
15 B
256 B
Script
General
Full URL
https://s-usc1c-nss-216.firebaseio.com/.lp?id=5535247&pw=IZeNFHOpil&ser=39878571&ns=gitbook-28427
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
3d14e96bd08692f39b357173c908dcb0b21ee11d0bdb29b963ce7fcc836eb4fd
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 20:19:21 GMT
Server
nginx
Connection
keep-alive
Content-Length
15
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
.lp
s-usc1c-nss-216.firebaseio.com/ Frame 860B
15 B
256 B
Script
General
Full URL
https://s-usc1c-nss-216.firebaseio.com/.lp?id=5535247&pw=IZeNFHOpil&ser=39878572&ns=gitbook-28427&seg0=0&ts0=1&d0=eyJ0IjoiZCIsImQiOnsiciI6MSwiYSI6InMiLCJiIjp7ImMiOnsic2RrLmpzLjctMTQtMSI6MX19fX0.
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
416ebdae1319a43b48e3caf0a24100ab786aa6432e276fb735da780aa435b300
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 20:19:21 GMT
Server
nginx
Connection
keep-alive
Content-Length
15
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
logo-ms-social.png
docs.microsoft.com/en-us/media/logos/
449 B
1 KB
Image
General
Full URL
https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png
Requested by
Host: www.ired.team
URL: https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:6c00:299::353e Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
2d59b358c254d5467046e6f341825949aafecfe46af27b541fae72850c9fc41f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
nel
{"report_to":"network-errors","max_age":604800,"success_fraction":0.01,"failure_fraction":1.0}
content-length
449
x-xss-protection
1; mode=block
x-ua-compatible
IE=edge
x-rendering-stack
Static
last-modified
Tue, 23 Mar 2021 02:10:29 GMT
x-datacenter
wus
date
Thu, 02 Sep 2021 20:19:21 GMT
x-frame-options
SAMEORIGIN
report-to
{"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://mdec.nelreports.net/api/report?cat=mdocs"}]}
content-type
image/png
cache-control
public, max-age=1109
etag
"0x8D8EDA0D52AC0F3"
akamai-cache-status
Hit from child
request-context
appId=cid-v1:b1c5b6ea-7ff0-41d3-9862-84c5e1dc3be7
expires
Thu, 02 Sep 2021 20:37:50 GMT
/
www.gitbook.com/__amp/
7 B
159 B
XHR
General
Full URL
https://www.gitbook.com/__amp/
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aee408847d35e44e99430f0979c3357b85fe8dbb4535a494301198adbee85f27
Security Headers
Name Value
Strict-Transport-Security max-age=15768000

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Thu, 02 Sep 2021 20:19:22 GMT
cf-cache-status
DYNAMIC
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, POST
content-type
text/html;charset=utf-8
access-control-allow-origin
*
strict-transport-security
max-age=15768000
cf-ray
68896eca9ed52bc2-FRA
content-length
7
analytics.js
www.google-analytics.com/
48 KB
19 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:828::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
fd222137f245c06ddb4c4d44db41f12138dad6cf8ef5d4d4a5e500f38f0c8c62
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 11 Aug 2021 00:32:57 GMT
server
Golfe2
age
5241
date
Thu, 02 Sep 2021 18:52:00 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19747
expires
Thu, 02 Sep 2021 20:52:00 GMT
7f9239ce726764aa22093884902e018d.svg
gstatic.gitbook.com/images/
2 KB
1 KB
Image
General
Full URL
https://gstatic.gitbook.com/images/7f9239ce726764aa22093884902e018d.svg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
863db76a201dedb75ccb6392a1664138cfb5c60d71e2073056db22ca39a56fec

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:21 GMT
content-encoding
gzip
cf-cache-status
HIT
age
13080453
x-guploader-uploadid
ABg5-Uwp2ZHpfP2KRh3gmr5OfeDUxp0R7u-PLsf10qcUQXhVLjI--w_PdPdPrcA3PFb9bG3JCWQm3A0kt0wXHHc68KoZV03s2A
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
image/svg+xml
last-modified
Fri, 19 Mar 2021 17:17:25 GMT
server
cloudflare
etag
W/"7f9239ce726764aa22093884902e018d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=VnuT0A==, md5=f5I5znJnZKoiCTiEkC4BjQ==
x-goog-generation
1616174245138502
access-control-allow-origin
*
cache-control
public, max-age=31536000
x-goog-stored-content-length
2137
cf-ray
68896ecaddf55c08-FRA
expires
Mon, 04 Apr 2022 10:51:47 GMT
collect
www.google-analytics.com/j/
2 B
22 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j93&a=2052591664&t=pageview&_s=1&dl=https%3A%2F%2Fwww.ired.team%2Foffensive-security%2Fdefense-evasion%2Fusing-syscalls-directly-from-visual-studio-to-bypass-avs-edrs&dp=%2Foffensive-security%2Fdefense-evasion%2Fusing-syscalls-directly-from-visual-studio-to-bypass-avs-edrs&ul=en-us&de=UTF-8&dt=Calling%20Syscalls%20Directly%20from%20Visual%20Studio%20to%20Bypass%20AVs%2FEDRs%20-%20Red%20Teaming%20Experiments&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEDAAEABAAAAAC~&jid=1964339325&gjid=1434778293&cid=1561024576.1630613962&tid=UA-57505611-10&_gid=1060567509.1630613962&_r=1&_slc=1&cd1=-LFEMnER3fywgFHoroYn&cd2=-LFEMnEQwqZOY6DtfrzY&cd3=-MiYcdZb5gO7N2TdKMAa&cd4=master&cd5=-LjAqSVI10yo-MJuXTts&z=89223552
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
a048e640908046be06e00eab37742b5d5ff80964af58cfd22f7cb2de4dfe375f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Thu, 02 Sep 2021 20:19:21 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.ired.team
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/j/
2 B
22 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j93&a=2052591664&t=pageview&_s=1&dl=https%3A%2F%2Fwww.ired.team%2Foffensive-security%2Fdefense-evasion%2Fusing-syscalls-directly-from-visual-studio-to-bypass-avs-edrs&dp=%2Foffensive-security%2Fdefense-evasion%2Fusing-syscalls-directly-from-visual-studio-to-bypass-avs-edrs&ul=en-us&de=UTF-8&dt=Calling%20Syscalls%20Directly%20from%20Visual%20Studio%20to%20Bypass%20AVs%2FEDRs%20-%20Red%20Teaming%20Experiments&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=YEDAAEABAAAAAC~&jid=488765137&gjid=1468102276&cid=1561024576.1630613962&tid=UA-128974775-1&_gid=1060567509.1630613962&_r=1&_slc=1&z=689621035
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
a048e640908046be06e00eab37742b5d5ff80964af58cfd22f7cb2de4dfe375f
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Thu, 02 Sep 2021 20:19:21 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.ired.team
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2
expires
Fri, 01 Jan 1990 00:00:00 GMT
.lp
s-usc1c-nss-216.firebaseio.com/ Frame 860B
58 B
299 B
Script
General
Full URL
https://s-usc1c-nss-216.firebaseio.com/.lp?id=5535247&pw=IZeNFHOpil&ser=39878573&ns=gitbook-28427&seg0=1&ts0=1&d0=eyJ0IjoiZCIsImQiOnsiciI6MiwiYSI6Im0iLCJiIjp7InAiOiIvZW1iZWRzL2h0dHBzOiUyRiUyRm91dGZsYW5rJTJFbmwlMkZibG9nJTJGMjAxOSUyRjA2JTJGMTklMkZyZWQtdGVhbS10YWN0aWNzLWNvbWJpbmluZy1kaXJlY3Qtc3lzdGVtLWNhbGxzLWFuZC1zcmRpLXRvLWJ5cGFzcy1hdi1lZHIlMkYiLCJkIjp7Im91dGRhdGVkIjp0cnVlfX19fQ..&seg1=2&ts1=1&d1=eyJ0IjoiZCIsImQiOnsiciI6MywiYSI6Im0iLCJiIjp7InAiOiIvZW1iZWRzL2h0dHBzOiUyRiUyRmRvY3MlMkVtaWNyb3NvZnQlMkVjb20lMkZlbi11cyUyRndpbmRvd3MlMkZ3aW4zMiUyRmFwaSUyRndpbnRlcm5sJTJGbmYtd2ludGVybmwtbnRjcmVhdGVmaWxlIiwiZCI6eyJvdXRkYXRlZCI6dHJ1ZX19fX0.&seg2=3&ts2=1&d2=eyJ0IjoiZCIsImQiOnsiciI6NCwiYSI6Im0iLCJiIjp7InAiOiIvZW1iZWRzL2h0dHBzOiUyRiUyRmowMHJ1JTJFdmV4aWxsaXVtJTJFb3JnJTJGc3lzY2FsbHMlMkZudCUyRjY0JTJGIiwiZCI6eyJvdXRkYXRlZCI6dHJ1ZX19fX0.&seg3=4&ts3=1&d3=eyJ0IjoiZCIsImQiOnsiciI6NSwiYSI6InEiLCJiIjp7InAiOiIvc3BhY2VzLy1MRkVNbkVSM2Z5d2dGSG9yb1luL3VzZXJQYWdlUmF0aW5ncy8tTGpBcVNWSTEweW8tTUp1WFR0cy8tTWlicFc0V1ZhWTBPaEtuRTRwcSIsImgiOiIifX19
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
20131f48fbd9fd765e322e3afec8e8ece21c6ef7be5f2b296c9f028627df16bd
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 20:19:21 GMT
Server
nginx
Connection
keep-alive
Content-Length
58
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
.lp
s-usc1c-nss-216.firebaseio.com/ Frame 860B
190 B
432 B
Script
General
Full URL
https://s-usc1c-nss-216.firebaseio.com/.lp?id=5535247&pw=IZeNFHOpil&ser=39878574&ns=gitbook-28427
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
309dee2c2d416deabb73cae35dbef806ae00f1c401be82df35607be3ab551bef
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 20:19:22 GMT
Server
nginx
Connection
keep-alive
Content-Length
190
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
.lp
s-usc1c-nss-216.firebaseio.com/ Frame 860B
70 B
311 B
Script
General
Full URL
https://s-usc1c-nss-216.firebaseio.com/.lp?id=5535247&pw=IZeNFHOpil&ser=39878575&ns=gitbook-28427&seg0=5&ts0=1&d0=eyJ0IjoiYyIsImQiOnsidCI6Im4iLCJkIjp7fX19
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2600:1901:0:94b6:: Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
nginx /
Resource Hash
efb03fd285c04565fb592bea3f05d43eb45da9f03af6f94e01d3c10ba14f288e
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Thu, 02 Sep 2021 20:19:22 GMT
Server
nginx
Connection
keep-alive
Content-Length
70
Strict-Transport-Security
max-age=31556926; includeSubDomains; preload
Content-Type
application/javascript; charset=utf-8
chunk.966.9bcdd26c.js
gstatic.gitbook.com/js/
1 MB
135 KB
Script
General
Full URL
https://gstatic.gitbook.com/js/chunk.966.9bcdd26c.js
Requested by
Host: gstatic.gitbook.com
URL: https://gstatic.gitbook.com/js/111.c397faa5.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:86f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5b08085db82bdd556abf8dfe2c049e433274cd77fe15cadaa1437af9b5e928eb

Request headers

Referer
https://www.ired.team/offensive-security/defense-evasion/using-syscalls-directly-from-visual-studio-to-bypass-avs-edrs
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Thu, 02 Sep 2021 20:19:25 GMT
content-encoding
gzip
cf-cache-status
HIT
age
12890811
cf-polished
origSize=1540766
x-guploader-uploadid
ABg5-UwpHqO3lEk5fGY24xMrxzKaUmsztOxRaJLPxdyRgqAeFBO9HlwfZkZiK-VlxtbNPv4e6b89Z03c6mD4LNmS6aO9oovXkg
x-goog-storage-class
STANDARD
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
content-type
application/javascript
last-modified
Fri, 19 Mar 2021 17:17:25 GMT
server
cloudflare
etag
W/"1ee0a04f04f79506addc6f9cc9ade2c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=6ui4QQ==, md5=HuCgTwT3lQat3G+cya3iwA==
x-goog-generation
1616174245205973
access-control-allow-origin
*
expires
Wed, 06 Apr 2022 15:32:34 GMT
cache-control
public, max-age=31536000
x-goog-stored-content-length
1540766
cf-ray
68896ee6cd275c08-FRA
cf-bgj
minify

Verdicts & Comments Add Verdict or Comment

36 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| GITBOOK_STATE object| __LOADABLE_LOADED_CHUNKS__ object| GitBook object| __SENTRY__ function| _lrMutationObserver object| __SDKCONFIG__ number| 2f1acc6c3a606b082e5eef5e54414ffb function| Intercom function| Mousetrap function| setImmediate function| clearImmediate object| Prism object| __algolia object| regeneratorRuntime function| _LRLogger boolean| _lr_loaded function| pLPCommand1 function| pRTLPCB1 boolean| __isReactDndBackendSetUp string| GoogleAnalyticsObject function| ga object| google_tag_data object| gaplugins object| gaGlobal object| gaData

1 Cookies

Domain/Path Name / Value
.ired.team/ Name: amplitude_id_fef1e872c952688acd962d30aa545b9eired.team
Value: eyJkZXZpY2VJZCI6IjcyNGM2NzlmLTU3MGEtNGM4YS1iZTM4LTk2ZTY5NTEyMDA1MVIiLCJ1c2VySWQiOm51bGwsIm9wdE91dCI6ZmFsc2UsInNlc3Npb25JZCI6MTYzMDYxMzk2MDkxNCwibGFzdEV2ZW50VGltZSI6MTYzMDYxMzk2MDkxNCwiZXZlbnRJZCI6MCwiaWRlbnRpZnlJZCI6MCwic2VxdWVuY2VOdW1iZXIiOjB9

1 Console Messages

Source Level URL
Text
console-api log URL: https://gstatic.gitbook.com/js/111.c397faa5.js(Line 1)
Message:
Application ready

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Security-Policy default-src 'self' gstatic.gitbook.com *.gitbook-staging.com *.gitbook.com *.firebaseio.com wss://*.firebaseio.com *.cloudfunctions.net *.googleapis.com *.gstatic.com data: *.google.com *.github.com *.algolianet.com *.algolia.net sentry.io *.logrocket.io *.lr-ingest.io *.stripe.com *.clearbit.com *.google-analytics.com d3hb14vkzrxvla.cloudfront.net d1j8pt39hxlh3d.cloudfront.net *.iframe.ly blob: cdn.jsdelivr.net cdnjs.cloudflare.com api.amplitude.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io https://nexus-websocket-a.intercom.io https://nexus-websocket-b.intercom.io https://nexus-long-poller-a.intercom.io https://nexus-long-poller-b.intercom.io wss://nexus-websocket-a.intercom.io wss://nexus-websocket-b.intercom.io https://uploads.intercomcdn.com https://uploads.intercomusercontent.com https://share.intercom.io https://intercom-sheets.com https://www.intercom-reporting.com https://www.youtube.com https://player.vimeo.com https://fast.wistia.net https://js.intercomcdn.com https://intercom.help; script-src 'self' gstatic.gitbook.com 'unsafe-inline' *.firebaseio.com *.google.com polyfill.io cdn.lr-ingest.io cdn.logrocket.io *.stripe.com *.clearbit.com *.google-analytics.com *.iframe.ly *.gstatic.com cdnjs.cloudflare.com *.intercom.io *.intercomcdn.com gitbookio.github.io https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; style-src 'self' gstatic.gitbook.com 'unsafe-inline' fonts.googleapis.com unpkg.com cdnjs.cloudflare.com cdn.jsdelivr.net; img-src * data: blob: https://js.intercomcdn.com https://static.intercomassets.com https://downloads.intercomcdn.com https://uploads.intercomusercontent.com https://gifs.intercomcdn.com https://messenger-apps.intercom.io https://*.intercom-attachments.com; frame-src *; object-src 'none'; child-src 'self' blob:; worker-src 'self' blob:; frame-ancestors https:
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

app.gitbook.com
cdn.lr-ingest.io
docs.microsoft.com
fonts.googleapis.com
fonts.gstatic.com
gblobscdn.gitbook.com
gitbook-28427.firebaseio.com
gstatic.gitbook.com
ired.team
lh5.googleusercontent.com
polyfill.io
s-usc1c-nss-216.firebaseio.com
unpkg.com
www.gitbook.com
www.google-analytics.com
www.ired.team
151.101.65.26
2600:1901:0:94b6::
2606:4700:3033::ac43:a339
2606:4700:3036::ac43:b213
2606:4700::6810:7daf
2606:4700::6812:191
2606:4700::6812:86f
2606:4700::6812:96f
2a00:1450:4001:800::2003
2a00:1450:4001:80f::200e
2a00:1450:4001:810::2001
2a00:1450:4001:828::200e
2a00:1450:4001:82f::200a
2a02:26f0:6c00:299::353e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