15% OFF GIFT VOUCHERS! SHOW ME

Close Notification

Your cart does not contain any items

Evasion Engineering

Building Custom Tools to Evade Modern Detection

Dennis Chow Michael LaSalvia

$130

Paperback

Forthcoming
Pre-Order now

QTY:

English
No Starch Press,US
06 October 2026
If your tooling is public, it's already known.

Defenders have studied every public offensive framework. They know Cobalt Strike's beacon patterns, Metasploit's shellcode signatures, and the behavioral fingerprints of every commodity implant. Once it's known, the tool gets burned.

As a red teamer, your job is to get in. When defenders know your tools, they know your moves-and you don't get in. Evasion Engineering teaches you to build custom offensive tooling in Go by understanding what modern defenses actually target and building around them.

You'll construct network enumerators, C2 implants, lateral movement tools, obfuscated loaders, and covert exfiltration channels. Each chapter then flips the perspective- the same techniques, examined from the detection side. Build the tool. Understand how it gets caught. Build better.

Dennis Chow (GIAC Security Expert #288) and Michael LaSalvia bring 36 combined years of experience inside Fortune 500 red team programs. They treat payload development as an engineering discipline- robustness, reusability, and reliability built in from the start, not bolted on after the fact.

You'll learn to-

Build enumeration tools that don't match known signatures

Develop C2 implants with custom protocols that bypass network inspection

Implement lateral movement via autonomous worm mechanics

Create hybrid-packed payloads that defeat AV and EDR

Exfiltrate data through covert channels under active monitoring

Map every technique to its detection surface and validate your results

If you've been relying on tools the defender already knows, this book is where that changes.

Requires Go 1.21.x and higher and Python 3.x
By:   ,
Imprint:   No Starch Press,US
Country of Publication:   United States
Dimensions:   Height: 235mm,  Width: 178mm, 
Weight:   369g
ISBN:   9781718505049
ISBN 10:   1718505043
Pages:   256
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Forthcoming
Foreword Introduction Part I: Red Teaming Fundamentals Chapter 1: Principles of Application Design and Development Chapter 2: Evasion Strategies Part II: Hands-On Evasive Tool Development Chapter 3: Enumerating with Traffic Redirection Chapter 4: Developing Command-and-Control Implants Chapter 5: Creating Lateral Exploits with Worms Chapter 6: Enumerating Locally Without LOLBins Chapter 7: Bypassing Detection with Hybrid Packing Chapter 8: Staging and Exfiltrating Data Covertly Part III: Testing and Validation Chapter 9: Building Detection Tools Chapter 10: Executing Controlled Reveals Appendix: Technical Requirements Index

Dennis Chow has worked in penetration testing, cloud security, and detection engineering across Amazon Web Services, UKG, and multiple Fortune 500 companies and US government agencies. He holds the GIAC Security Expert (GSE) certification. Michael LaSalvia has more than two decades of experience in offensive security and red teaming. Currently a manager of adversarial simulation at Protiviti, he has built and led red team programs for global enterprises including Fidelity National Financial, KPMG, Pfizer, and GSK.

See Also