Evasion Engineering (Building Custom Red Team Tools for Modern Defenses)
List Price:
$59.99
| Expected release date is Jul 7th 2026 |
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Dennis Chow, Michael Lasalvia
Format:
Paperback
Pages:
256
Publisher:
No Starch Press (July 7, 2026)
Imprint:
No Starch Press
Release Date:
July 7, 2026
Language:
English
Audience:
General/trade
ISBN-13:
9781718505049
ISBN-10:
1718505043
Weight:
13oz
Dimensions:
7" x 9.25"
File:
RandomHouse-PRH_Book_Company_PRH_PRT_Onix_delta_active_D20260412T082301_155922976-20260412.xml
Folder:
RandomHouse
List Price:
$59.99
Country of Origin:
United States
Pub Discount:
65
Case Pack:
24
As low as:
$46.19
Publisher Identifier:
P-RH
Discount Code:
A
QuickShip:
Yes
Overview
Build offensive tools the defender hasn't catalogued. Then learn how they'd catch you.
Detection engineers have studied every public framework. They know Cobalt Strike's beacon patterns, Metasploit's shellcode signatures, and the behavioral fingerprints of every commodity implant. The moment a tool goes public, its days are numbered.
Evasion Engineering is for red teamers who can't afford to be predictable.
Built around Go and a rigorous software engineering approach, this book teaches you to develop custom payloads from requirements to deployment, not by copying public tooling, but by understanding what modern defenses target and building around it. You'll construct network enumerators, C2 infrastructure, lateral movement tools, obfuscated loaders, and covert exfiltration channels. Each chapter then flips the perspective: the same techniques, examined from the detection side.
Dennis Chow (GIAC Security Expert #288) and Michael LaSalvia bring 36 combined years operating inside Fortune 500 red team programs. Their three Rs framework treats payload development as an engineering discipline: robustness, reusability, reliability.
You'll learn to:
Covers Go 1.21.x and higher, and Python 3.x
Detection engineers have studied every public framework. They know Cobalt Strike's beacon patterns, Metasploit's shellcode signatures, and the behavioral fingerprints of every commodity implant. The moment a tool goes public, its days are numbered.
Evasion Engineering is for red teamers who can't afford to be predictable.
Built around Go and a rigorous software engineering approach, this book teaches you to develop custom payloads from requirements to deployment, not by copying public tooling, but by understanding what modern defenses target and building around it. You'll construct network enumerators, C2 infrastructure, lateral movement tools, obfuscated loaders, and covert exfiltration channels. Each chapter then flips the perspective: the same techniques, examined from the detection side.
Dennis Chow (GIAC Security Expert #288) and Michael LaSalvia bring 36 combined years operating inside Fortune 500 red team programs. Their three Rs framework treats payload development as an engineering discipline: robustness, reusability, reliability.
You'll learn to:
- Build enumeration tools that don't match known signatures
- Develop C2 channels with custom protocols that bypass network inspection
- Implement lateral movement via autonomous worm mechanics
- Create hybrid-packed payloads that defeat AV and EDR
- Exfiltrate data through covert channels under active monitoring
- Map every technique to its detection surface and validate your results
Covers Go 1.21.x and higher, and Python 3.x









