persistence_demos

Persistence tactics

Demonstrates various persistence methods used by malware

Demos of various (also non standard) persistence methods used by malware

GitHub

219 stars
15 watching
47 forks
Language: C++
last commit: almost 2 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
karneades/malware-persistence A collection of information on malware persistence mechanisms and techniques. 165
hasherezade/malware_training_vol1 Teaches various techniques used by malware authors to analyze Windows malware 1,942
cyborgsecurity/poisonapple A command-line tool for simulating and demonstrating persistence techniques on macOS systems. 221
threatexpress/persistence-aggressor-script A tool for creating and managing persistent malware components that can operate in multiple listener scenarios, including local and foreign listeners. 42
aegrah/panix A modular Linux persistence framework providing various techniques to achieve persistent access on Linux systems 465
d00mfist/persistentjxa Tools and scripts for persistent macOS applications using JXA 264
teknasyon-teknoloji/persistencekit A library providing a simple way to store and retrieve Codable objects in various persistence layers 154
henselman-petrusek/eirene.jl A Julia library for analyzing point data using homological persistence techniques 117
demi6od/smashing_the_browser An in-depth exploration of browser exploitation techniques and vulnerability discovery 446
cretezy/redux_persist A tool to persist Redux state in Flutter applications 130
last-byte/persistencesniper Automated detection of malicious persistence techniques in Windows machines. 1,930
dxa4481/xssoauthpersistence Exploring various techniques for maintaining persistence via Cross-Site Scripting (XSS) and OAuth 77
hardik05/damn_vulnerable_c_program An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. 681
ntraiseharderror/kaiser Toolset providing fileless persistence and anti-forensic capabilities for Windows 7 87
0xthirteen/staykit A persistence kit for Cobalt Strike using a custom .NET assembly and leveraging various Windows techniques to maintain access after initial access is lost. 468