PersistenceSniper
Persistence detector
A tool for detecting and identifying persistent malware techniques in Windows machines using PowerShell
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
2k stars
42 watching
185 forks
Language: PowerShell
last commit: 5 months ago
Linked from 1 awesome list
incident-responsemalware-detectionpersistencepowershellpowershell-modulepowershell-scriptregistrytechniqueswindows
Related projects:
Repository | Description | Stars |
---|---|---|
joeavanzato/trawler | A PowerShell script designed to help Incident Responders discover potential indicators of compromise on Windows hosts by scanning for various persistence techniques. | 308 |
zonksec/persistence-aggressor-script | A PowerShell script designed to evade detection by persisting on a compromised system through multiple evasion techniques | 172 |
theflakes/reg_hunter | A tool for triaging and hunting Windows persistence mechanisms, providing forensic insights into system activity. | 142 |
threatexpress/persistence-aggressor-script | A tool for creating and managing persistent malware components that can operate in multiple listener scenarios, including local and foreign listeners. | 42 |
ntraiseharderror/kaiser | Toolset providing fileless persistence and anti-forensic capabilities for Windows 7 | 86 |
aegrah/panix | A Linux persistence tool designed to support security research and detection engineering. | 410 |
karneades/malware-persistence | A collection of information on malware persistence mechanisms and techniques. | 164 |
cyborgsecurity/poisonapple | A command-line tool for simulating and demonstrating persistence techniques on macOS systems. | 221 |
ewhitehats/invisiblepersistence | A Windows registry persistence mechanism that operates stealthily | 338 |
0xthirteen/staykit | A persistence kit for Cobalt Strike using a custom .NET assembly and leveraging various Windows techniques to maintain access after initial access is lost. | 465 |
hasherezade/persistence_demos | Demonstrates various persistence methods used by malware | 219 |
objective-see/blockblock | Provides continual protection by monitoring persistence locations across multiple platforms | 642 |
netspi/pesecurity | A PowerShell module to analyze Windows binary files for various security features and compilation settings. | 626 |
teknasyon-teknoloji/persistencekit | A library providing a simple way to store and retrieve Codable objects in various persistence layers | 155 |
d4stiny/peacemaker | A Windows kernel-mode utility designed to detect and analyze advanced malware techniques. | 417 |