Live Webcast

Evading Anti-virus Detection with Metasploit


To register for this live webcast, fill out the form below!

In this technical webinar for penetration testers, David Maloney discusses how to evade anti-virus detection on target machines to avoid detection. Participants will learn about:

  • Signatures, heuristics, and sandboxes
  • Single and stages payloads
  • Executable templates
  • Common misconceptions about encoding payloads
  • Dynamically creating executable templates


Thursday January 24th at 2:00PM ET


David Maloney, Software Engineer, Rapid7

David "thelightcosine" Maloney is a Software Engineer on Rapid7’s Metasploit team, where he is responsible for development of core features for the commercial Metasploit editions. Before Rapid7, he worked as a Security Engineer and Penetration Tester at Time Warner Cable and as an Application Security Specialist for a global insurance company. David has been a long-time community contributor to the Metasploit Framework. He is also a member of the Corelan Security Team. He is one of the founders of Hackerspace Charlotte and is an avid locksport enthusiast.