All Projects → TestingPens → Malwarepersistencescripts

TestingPens / Malwarepersistencescripts

A collection of scripts I've written to help red and blue teams with malware persistence techniques.

Programming Languages

powershell
5483 projects

Projects that are alternatives of or similar to Malwarepersistencescripts

Wadcoms.github.io
WADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (+318.45%)
Mutual labels:  persistence, redteam, blueteam
Slackpirate
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Stars: ✭ 512 (+397.09%)
Mutual labels:  redteam, blueteam
Mxtract
mXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+384.47%)
Mutual labels:  malware, redteam
Arsenal
Extensible Red Team Framework
Stars: ✭ 99 (-3.88%)
Mutual labels:  malware, redteam
Fireelf
fireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+322.33%)
Mutual labels:  malware, redteam
Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+5754.37%)
Mutual labels:  redteam, blueteam
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+603.88%)
Mutual labels:  malware, redteam
Gray hat csharp code
This repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (+192.23%)
Mutual labels:  redteam, blueteam
Snoop
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+760.19%)
Mutual labels:  redteam, blueteam
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+8619.42%)
Mutual labels:  malware, redteam
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+999.03%)
Mutual labels:  persistence, malware
Ultimateapplockerbypasslist
The goal of this repository is to document the most common techniques to bypass AppLocker.
Stars: ✭ 1,186 (+1051.46%)
Mutual labels:  redteam, blueteam
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (+306.8%)
Mutual labels:  malware, redteam
Repo Supervisor
Scan your code for security misconfiguration, search for passwords and secrets. 🔍
Stars: ✭ 482 (+367.96%)
Mutual labels:  redteam, blueteam
Pidense
🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Stars: ✭ 358 (+247.57%)
Mutual labels:  redteam, blueteam
Theharvester
E-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+5895.15%)
Mutual labels:  redteam, blueteam
MicrosoftWontFixList
A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
Stars: ✭ 854 (+729.13%)
Mutual labels:  blueteam, redteam
Lolbas
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 3,810 (+3599.03%)
Mutual labels:  redteam, blueteam
1earn
个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (+653.4%)
Mutual labels:  redteam, blueteam
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-30.1%)
Mutual labels:  redteam, blueteam

Malware Persistence Scripts

A collection of scripts I've written to help red and blue teams with malware persistence techniques. I take no responsibility for how they're used.

Red Team Goals

These are techniques that I regularly use to ensure that my agents can survive reboots. Majority of my persistence scripts are written in PowerShell since it's an excuse for me to learn it. May these scripts help you evade many a blue team.

Blue Team Goals

I'm trying to help blue teams to add robust rule sets to their detection techniques. Most of the time I try to focus on simple userland tactics which don't require privilege escalation. Additionally, I try to find ways to trigger my agents based on user behaviour rather than system behaviour. May these techniques help you catch those pesky hackers.

Scripts

user_event_persistence.ps1

It looks through newest 500 events in the Windows event logs on the target system and schedules a user task, using the most commonly occurring event ID as a trigger, to run a specified application.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].