Hi, my question is how do i get to combine several evasion techniques to deliver a payload to a vulnerable host bypass the NIDS? Is there a way i could append a malformed payload from metasploit?
...