Organizations continue to tout Application Whitelisting as one of the best counter-measures to deploy. We have developed several evasion techniques that put organizations at risk that use Application Whitelisting. We would like to share these techniques, and engage in dialogue about ways to improve or expand our research.