# Achieving Access

- [achieving access: implantv1](/0xtriboulet/archive/notice/achieving-access/achieving-access-implantv1.md): Using classic methodology to get develop a detectable payload on Windows 10 and Windows 11. We'll use this as a springboard to more successful implants in the following sections
- [achieving access: implantv2](/0xtriboulet/archive/notice/achieving-access/achieving-access-implantv2.md): Using a development workflow that allows for customizable reverse shell payloads
- [achieving access: implantv3](/0xtriboulet/archive/notice/achieving-access/achieving-access-implantv3.md): We reimplement the code we developed in implantv2 using the VX-API. This API is designed with malware development in mind and is a powerful addition to your development environments
