Packing Hooking/ Unhooking Run-time binary modification APC injection / Atombombing String concatenation PE injection DLL injection Kernel callbacks Breaking process- child relationship AMSI Patching Direct Syscalls PPID spoofing Dynamic API resolving Uncommon programming language ETWTi Patching Hook Injection Encoding Process Mitigation Policy Compression Process Injection P/Invoke & D/Invoke Encryption VM-based code execution Code signing bypass Packing Hooking/ Unhooking Run-time binary modification APC injection / Atombombing String concatenation PE injection DLL injection Kernel callbacks Breaking process- child relationship AMSI Patching Direct Syscalls PPID spoofing Dynamic API resolving Uncommon programming language ETWTi Patching Hook Injection Encoding Process Mitigation Policy Compression Process Injection P/Invoke & D/Invoke Encryption VM-based code execution Code signing bypass
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Packing
Hooking/
Unhooking
Run-time binary modification
APC injection / Atombombing
String concatenation
PE injection
DLL injection
Kernel callbacks
Breaking process-child relationship
AMSI Patching
Direct Syscalls
PPID spoofing
Dynamic API resolving
Uncommon programming language
ETWTi Patching
Hook Injection
Encoding
Process Mitigation Policy
Compression
Process Injection
P/Invoke & D/Invoke
Encryption
VM-based code execution
Code signing bypass