Louder for the people in the back!
Very few things survive full forensic analysis, but that's not the goal. Even if your "one cool trick" does, entire (useful) attack chains do not. The goal is (and always has been) bypassing real time alerting. Anything else is gravy.
Note that we’re not fully trying to bypass forensic data, but just alerts that get sent to a SOC analyst for triage.