malware-persistence
Malware persistence info
A collection of information on malware persistence mechanisms and techniques.
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
165 stars
8 watching
15 forks
last commit: 11 months ago
Linked from 2 awesome lists
malwaremalware-analysismalware-detectionmalware-persistencepersistencethreat-huntingthreat-intelligence
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Demonstrates various persistence methods used by malware | 219 |
| | A tool for triaging and hunting Windows persistence mechanisms, providing forensic insights into system activity. | 143 |
| | Automated detection of malicious persistence techniques in Windows machines. | 1,930 |
| | A tool for creating and managing persistent malware components that can operate in multiple listener scenarios, including local and foreign listeners. | 42 |
| | A PowerShell script designed to help Incident Responders discover potential indicators of compromise on Windows hosts by scanning for various persistence techniques. | 310 |
| | Toolset providing fileless persistence and anti-forensic capabilities for Windows 7 | 87 |
| | A Julia library for analyzing point data using homological persistence techniques | 117 |
| | A command-line tool for simulating and demonstrating persistence techniques on macOS systems. | 221 |
| | A lightweight persistence layer for storing user data and other relevant objects in Swift | 830 |
| | Helps Threat Intelligence researchers hunt for new malware by efficiently scanning large collections of files with Yara rules | 698 |
| | A tool to persist Redux state in Flutter applications | 130 |
| | A PowerShell script designed to evade detection by persisting on a compromised system through multiple evasion techniques | 173 |
| | A persistence kit for Cobalt Strike using a custom .NET assembly and leveraging various Windows techniques to maintain access after initial access is lost. | 468 |
| | Provides a simple framework for persisting Smalltalk model objects in a self-contained, incremental manner. | 17 |
| | Exploring various techniques for maintaining persistence via Cross-Site Scripting (XSS) and OAuth | 77 |