Offensive threat modeling & IOC-proof ID generation
![A drawing of police lineup of birds in suits](https://agyild.website/posts/2020/03/offensive-threat-modeling-ioc-proof-id-generation/cover.jpg)
This the Part I of a two-part article, that talks about forensic and attribution resistant application of developmental tradecraft for offensive software development. In this first part, I am going to give some tips and examples on how to apply threat modeling methodology to development process and also share a simple technique that I have experimented with back when I researching fingerprinting-resistant data creation and storage methods.