Malware Persistence
Techniques that adversaries use to keep access to systems across restarts.
Contents
Techniques
Generic
Linux
Cloud
Access persistence tool for AWS. The corresponding article describes the techniques adversaries can use to hide themselves within a cloud environment and its AWSDoor implementation to simplify and automate the deployment of persistence techniques in AWS environments.
Detection Testing
Linux
Generic
Collection
macOS
Windows
Instead of using CSV output and copy these file to the server, you can use the AutorunsToWinEventLog script to convert the Autoruns output to Windows event logs and rely on standard Windows event log forwarding.
Powershell module to hunt for persistence implanted in Windows machines.
Extract various persistence mechanisms, e.g. by using the config file UserClassesASEPs to extract user's CLSID information.