Hello people.

I was wondering if some of you have some literature/links to share about evading firewalls, excluding techniques as reverse shells where social engineering is needed as the user have to execute the binary that establish the connection.

Thank you!