Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/alphaSeclab/persistence
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
https://github.com/alphaSeclab/persistence
android-persistence ios-persistence linux-persistence macos-persistence persistence windows-persistence
Last synced: 21 days ago
JSON representation
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
- Host: GitHub
- URL: https://github.com/alphaSeclab/persistence
- Owner: alphaSeclab
- Created: 2020-06-01T08:47:29.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-06-01T08:50:19.000Z (over 4 years ago)
- Last Synced: 2024-11-09T17:13:08.714Z (about 1 month ago)
- Topics: android-persistence, ios-persistence, linux-persistence, macos-persistence, persistence, windows-persistence
- Size: 42 KB
- Stars: 98
- Watchers: 10
- Forks: 30
- Open Issues: 0
-
Metadata Files:
- Readme: Readme.md
- Changelog: history/Persistence_20200601164506.json
Awesome Lists containing this project
- awesome-hacking-lists - alphaSeclab/persistence - Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts. (Others)
README
# [所有收集类项目](https://github.com/alphaSeclab/all-my-collection-repos)
# Persistence
- 跟驻留/持久化有关的工具和文章,多平台。包括80个工具和350左右文章。
- [English Version](https://github.com/alphaSeclab/persistence/blob/master/Readme_en.md)# 目录
- [Windows](#778ee28406147330e50ce8e39e1e0510) -> [(8)工具](#a563fd944f51033ab1823cc51ce5cc84) [(42)文章](#9473a67a0be440ab564685f35d01322b)
- [Linux](#d85c33dfafdf2941e8865e38d7abdc70) -> [(1)工具](#3fff7861fe9a68d96798413b150bf775) [(3)文章](#edadf03a82a99fb2d7bfda27c4d320d4)
- [macOS](#92795e827b3b796c276aeb42cd7ba7bc) -> [(10)文章](#920d31fa243672149cb4b16f6bd5c43c)
- [Android](#96c32cb67d39a39ca6ebcbf437ad5be0) -> [(2)工具](#6f8c8181aaceb3707bf31e05ef01aff7) [(3)文章](#0c8cc0e282af1c3976f089a32f0490ef)
- [iOS](#f2fca029044e3c784f5b8fedc992ade4) -> [(2)工具](#11669583787f71136e12da932d6e60b6) [(1)文章](#79422f0e817849c95cc8b24650f95d94)
- [新添加](#1006e9d79182efe6f1cb25f4da74e7e1)
- [(67) 工具](#f14b1b535106867820036c96a82f55ed)
- [(212) 文章](#426ad781ce4166338e198a70e025885d)
- [(23) 文章-pentestlab](#e63f08b4b1c54539573027e192270441)
- [(54) 文章-恶意代码](#396a097eb8cc253fd43f518f1ea43168)
- [(3) 文章-hackingarticles](#91f798eff3ccabbbb76ab957994aec46)***
- [**336**星][4m] [C#] [fireeye/sharpersist](https://github.com/fireeye/sharpersist) Windows persistence toolkit
- [**107**星][12m] [PS] [r4wd3r/rid-hijacking](https://github.com/r4wd3r/rid-hijacking) Windows RID Hijacking persistence technique
- [**98**星][5y] [PS] [enigma0x3/invoke-altdsbackdoor](https://github.com/enigma0x3/invoke-altdsbackdoor) obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Data Streams
- [**66**星][3y] [Py] [darkquasar/wmi_persistence](https://github.com/darkquasar/wmi_persistence) Python脚本,直接解析 OBJECTS.DATA 文件(无需访问用户WMI 名称空间)查找 WMI persistence
- [**60**星][2m] [Go] [giuliocomi/backoori](https://github.com/giuliocomi/backoori) Tool aided persistence via Windows URI schemes abuse
- [**17**星][8m] [Go] [mthbernardes/badarchitect](https://github.com/mthbernardes/badarchitect) Abusing SketchUp to make persistence on Windows
- [**6**星][4m] [C] [1captainnemo1/persistentcreverseshell](https://github.com/1captainnemo1/persistentcreverseshell) A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process , spawning a POWERSHELL on the attacker machine.
- [**5**星][4m] [C++] [rtcrowley/offensive-netsh-helper](https://github.com/rtcrowley/offensive-netsh-helper) Maintain Windows Persistence with an evil Netshell Helper DLL***
- 2020.04 [hackingarticles] [Windows Persistence using Netsh](https://www.hackingarticles.in/windows-persistence-using-netsh/)
- 2020.04 [hackingarticles] [Windows Persistence using Bits Job](https://www.hackingarticles.in/windows-persistence-using-bits-job/)
- 2020.04 [hackingarticles] [Windows Persistence using WinLogon](https://www.hackingarticles.in/windows-persistence-using-winlogon/)
- 2020.01 [hackingarticles] [Windows Persistence using Application Shimming](https://www.hackingarticles.in/windows-persistence-using-application-shimming/)
- 2020.01 [hackingarticles] [Multiple Ways to Persistence on Windows 10 with Metasploit](https://www.hackingarticles.in/multiple-ways-to-persistence-on-windows-10-with-metasploit/)
- 2020.01 [pentestlab] [Persistence – WMI Event Subscription](https://pentestlab.blog/2020/01/21/persistence-wmi-event-subscription/)
- 2019.10 [secjuice] [Abusing Windows 10 Narrator 'Feedback-Hub' for Fileless Persistence](https://www.secjuice.com/abusing-windows-10-for-fileless-persistence/)
- 2019.10 [aliyun] [windows中常见后门持久化方法总结](https://xz.aliyun.com/t/6461)
- 2019.07 [rootedconmadrid] [Sheila Ayelen Berta - The Art of Persistence: "Mr. Windows… I don’t wanna go :(" [RootedCON2019-ENG]](https://www.youtube.com/watch?v=J8aMjF78l48)
- 2019.07 [rootedconmadrid] [Sheila Ayelen Berta - The Art of Persistence: "Mr. Windows… I don’t wanna go :(" [RootedCON2019-ESP]](https://www.youtube.com/watch?v=xXzDPI7MCuY)
- 2019.05 [mdsec] [Persistence: “the continued or prolonged existence of something”: Part 3 – WMI Event Subscription](https://www.mdsec.co.uk/2019/05/persistence-the-continued-or-prolonged-existence-of-something-part-3-wmi-event-subscription/)
- 2019.05 [remoteawesomethoughts] [Windows 10 - Task Scheduler service - Privilege Escalation/Persistence through DLL planting](https://remoteawesomethoughts.blogspot.com/2019/05/windows-10-task-schedulerservice.html)
- 2019.03 [hackingarticles] [Windows Persistence with PowerShell Empire](https://www.hackingarticles.in/windows-persistence-with-powershell-empire/)
- 2019.02 [freebuf] [常见的几种windows后门持久化方式](https://www.freebuf.com/vuls/195906.html)
- 2019.01 [fuzzysecurity] [Windows用户模式下恶意软件驻留方式汇总(2014年11月)](http://fuzzysecurity.com/tutorials/19.html)
- 2019.01 [4hou] [如何检测并清除WMI持久化后门](http://www.4hou.com/technology/14024.html)
- 2018.10 [4hou] [利用Windows库文件进行持久化攻击](http://www.4hou.com/web/14044.html)
- 2018.10 [aliyun] [如何检测并清除WMI持久性后门](https://xz.aliyun.com/t/2873)
- 2018.10 [360] [如何滥用Windows库文件实现本地持久化](https://www.anquanke.com/post/id/161492/)
- 2018.10 [countercept] [Abusing Windows Library Files for Persistence](https://countercept.com/blog/abusing-windows-library-files-for-persistence/)
- 2018.10 [countercept] [Abusing Windows Library Files for Persistence](https://countercept.com/our-thinking/abusing-windows-library-files-for-persistence/)
- 2018.09 [oddvar] [Persistence using Universal Windows Platform apps (APPX)](https://oddvar.moe/2018/09/06/persistence-using-universal-windows-platform-apps-appx/)
- 2018.08 [swordshield] [Sticking Around: Common Windows Malware Persistence Mechanisms](https://www.swordshield.com/blog/windows-malware-persistence-mechanisms/)
- 2018.07 [BSidesTLV] [Abusing WMI Providers For Persistence - Philip Tsukerman](https://www.youtube.com/watch?v=mkvGcf63_9k)
- 2018.05 [pentestingexperts] [Advance Persistent Threat – Lateral Movement Detection in Windows Infrastructure – Part I](http://www.pentestingexperts.com/advance-persistent-threat-lateral-movement-detection-in-windows-infrastructure-part-i/)
- 2018.04 [infosecinstitute] [Advance Persistent Threat - Lateral Movement Detection in Windows Infrastructure - Part II](http://resources.infosecinstitute.com/advance-persistent-threat-lateral-movement-detection-windows-infrastructure-part-ii/)
- 2018.03 [infosecinstitute] [Advance Persistent Threat – Lateral Movement Detection in Windows Infrastructure – Part I](http://resources.infosecinstitute.com/advance-persistent-threat-lateral-movement-detection-windows-infrastructure-part/)
- 2017.03 [360] [DoubleAgent:代码注入和持久化技术--允许在任何Windows版本上控制任何进程](https://www.anquanke.com/post/id/85775/)
- 2017.01 [inspired] [WMI Persistence with Cobalt Strike](https://blog.inspired-sec.com/archive/2017/01/20/WMI-Persistence.html)
- 2016.09 [4hou] [如何在系统日志中记录WMI Persistence?](http://www.4hou.com/technology/1860.html)
- 2016.09 [4hou] [Study Notes of WMI Persistence using wmic.exe](http://www.4hou.com/technology/2027.html)
- 2016.08 [3gstudent] [Study Notes of WMI Persistence using wmic.exe](https://3gstudent.github.io/3gstudent.github.io/Study-Notes-of-WMI-Persistence-using-wmic.exe/)
- 2016.07 [JackkTutorials] [How to make a persistent backdoor (Metasploit / Kali Linux)](https://www.youtube.com/watch?v=-g8d2YonOxc)
- 2016.06 [rootedconmadrid] [Abel Valero - Windows BootKits: Como analizar malware persistente en MBR/VBR [RootedCON 2016 - ESP]](https://www.youtube.com/watch?v=cnHmOw1Q6SI)
- 2016.06 [rootedconmadrid] [Abel Valero - Windows BootKits: Como analizar malware persistente en MBR/VBR [RootedCON 2016 - ENG]](https://www.youtube.com/watch?v=FTE-7CHaAbM)
- 2016.04 [sans] [Windows Command Line Persistence?](https://isc.sans.edu/forums/diary/Windows+Command+Line+Persistence/20949/)
- 2016.04 [windowsir] [Cool Stuff, re: WMI Persistence](http://windowsir.blogspot.com/2016/04/cool-stuff-re-wmi-persistence.html)
- 2016.03 [quarkslab] [Windows Filtering Platform: Persistent state under the hood](https://blog.quarkslab.com/windows-filtering-platform-persistent-state-under-the-hood.html)
- 2015.09 [blackmoreops] [Create Kali Bootable Installer USB Drive in Windows 10 (Kali Bootable Non-Persistence USB Drive)](https://www.blackmoreops.com/2015/09/24/create-kali-bootable-installer-usb-drive-in-windows-10-kali-bootable-non-persistence-usb-drive/)
- 2013.09 [cylance] [Windows Registry Persistence, Part 2: The Run Keys and Search-Order](https://www.cylance.com/en_us/blog/windows-registry-persistence-part-2-the-run-keys-and-search-order.html)
- 2013.08 [cylance] [Windows Registry Persistence, Part 1: Introduction, Attack Phases and Windows Services](https://www.cylance.com/en_us/blog/windows-registry-persistence-part-1-introduction-attack-phases-and-windows-services.html)
- 2012.11 [sans] [Case Leads: DFIR Lessons from Sandy; The Advanced Persistent Intruder; The Secure Breach; Windows8 Forensics; South Carolina Tax Info Protected by "TWO FIREWALLS"](https://digital-forensics.sans.org/blog/2012/11/02/case-leads-dfir-lessons-from-sandy-the-advanced-persistent-intruder-the-secure-breach-windows8-forensics-south-carolina-tax-info-protected-by-two-firewalls)***
- [**433**星][4m] [Shell] [d4rk007/redghost](https://github.com/d4rk007/redghost) 用bash编写的Linux后渗透框架,旨在帮助red团队进行持久性、侦察、特权升级和不留痕迹
***
- 2018.11 [topsec] [Linux下的Rootkit驻留技术分析](http://blog.topsec.com.cn/linux%e4%b8%8b%e7%9a%84rootkit%e9%a9%bb%e7%95%99%e6%8a%80%e6%9c%af%e5%88%86%e6%9e%90/)
- 2018.11 [freebuf] [Linux下的Rootkit驻留技术分析](https://www.freebuf.com/articles/system/188211.html)
- 2016.07 [freebuf] [Linux Rootkit 系列五:感染系统关键内核模块实现持久化](http://www.freebuf.com/articles/system/109034.html)***
- 2019.11 [CodeColorist] [Two macOS persistence tricks abusing plugins](https://medium.com/p/6e55189be49c)
- 2019.06 [aliyun] [macOS恶意软件驻留技术分析](https://xz.aliyun.com/t/5463)
- 2019.04 [aliyun] [利用macOS 的 Folder Actions 功能实现持久化控制](https://xz.aliyun.com/t/4776)
- 2019.03 [specterops] [Folder Actions for Persistence on macOS](https://medium.com/p/8923f222343d)
- 2019.03 [blacksunhackers] [macOS Persistence via iTerm](https://blacksunhackers.club/2019/03/macOS-persistence-via-iterm/)
- 2018.11 [4hou] [攻击者如何借助授权插件,实现macOS持久化凭据窃取](http://www.4hou.com/system/14157.html)
- 2018.03 [mac4n6] [OMG, Seriously? - APFS Encrypted Plaintext Password found in ANOTHER (More Persistent!) macOS Log File](https://www.mac4n6.com/blog/2018/3/30/omg-seriously-apfs-encrypted-plaintext-password-found-in-another-more-persistent-macos-log-file)
- 2018.02 [freebuf] [如何通过Emond在macOS上实现持久化访问](http://www.freebuf.com/articles/system/161745.html)
- 2018.01 [xorrior] [Leveraging Emond on macOS For Persistence](https://posts.specterops.io/leveraging-emond-on-macos-for-persistence-a040a2785124)
- 2018.01 [xorrior] [Leveraging Emond on macOS For Persistence](http://xorrior.com/emond-persistence/)***
- [**33**星][12m] [Kotlin] [cesarferreira/seguro](https://github.com/cesarferreira/seguro) Secure persistence using AES+CBC encryption on Android with no dependencies.
- [**31**星][6m] [Kotlin] [irontec/android-room-example](https://github.com/irontec/android-room-example) Android Kotlin app showcasing the Room persistence library***
- 2017.07 [freebuf] [修改Metasploit安卓Payload源码以实现持久化访问](http://www.freebuf.com/sectool/141234.html)
- 2017.06 [freebuf] [MSF外网持久控制Android手机并渗透测试局域网](http://www.freebuf.com/sectool/136574.html)
- 2015.02 [checkpoint] [Clever and Persistent Android Banking Trojan Discovered | Check Point Software Blog](https://blog.checkpoint.com/2015/02/05/clever-persistent-android-banking-trojan-discovered/)***
- [**199**星][6m] [Swift] [lucas34/swiftqueue](https://github.com/lucas34/swiftqueue) Job Scheduler for IOS with Concurrent run, failure/retry, persistence, repeat, delay and more
- [**138**星][7m] [Swift] [justeat/justpersist](https://github.com/justeat/justpersist) JustPersist is the easiest and safest way to do persistence on iOS with Core Data support out of the box. It also allows you to migrate to any other persistence framework with minimal effort.***
- 2015.07 [nokiaguy] [iOS8开发技术(Swift版):数据持久化-李宁-专题视频课程](https://blog.csdn.net/nokiaguy/article/details/83551150)
***
- [**1742**星][5m] [Py] [rootm0s/winpwnage](https://github.com/rootm0s/winpwnage) UAC绕过、提升、持久化和执行方法
- [**986**星][26d] [Py] [synack/knockknock](https://github.com/synack/knockknock) displays persistent items (scripts, commands, binaries, etc.), that are set to execute automatically on OS X
- [**983**星][3y] [C] [cybellum/doubleagent](https://github.com/cybellum/doubleagent) Zero-Day Code Injection and Persistence Technique
- [**792**星][17d] [C] [pmem/pmdk](https://github.com/pmem/pmdk) a collection of libraries and tools for System Administrators and Application Developers to simplify managing and accessing persistent memory devices
- [**538**星][4y] [PS] [enigma0x3/generate-macro](https://github.com/enigma0x3/generate-macro) This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.
- [**347**星][1m] [TeX] [plailect/keyshuffling](https://github.com/plailect/keyshuffling) Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain
- [**310**星][22d] [Py] [shaypal5/cachier](https://github.com/shaypal5/cachier) Persistent, stale-free, local and cross-machine caching for Python functions.
- [**266**星][2y] [C++] [ewhitehats/invisiblepersistence](https://github.com/ewhitehats/invisiblepersistence) Persisting in the Windows registry "invisibly"
- [**220**星][5y] [PS] [jseidl/babadook](https://github.com/jseidl/babadook) Connection-less Powershell Persistent and Resilient Backdoor
- [**215**星][10m] [PS] [harmj0y/damp](https://github.com/harmj0y/damp) The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification
- [**194**星][10m] [Ruby] [sfeley/candy](https://github.com/sfeley/candy) Transparent persistence for MongoDB
- [**192**星][2m] [Py] [scrapy/queuelib](https://github.com/scrapy/queuelib) Collection of persistent (disk-based) queues
- [**162**星][3y] [miserlou/mackenzie](https://github.com/miserlou/mackenzie) AWS Lambda Infection Toolkit // Persistent Lambda Malware PoC
- [**152**星][1y] [ObjC] [objective-see/reikey](https://github.com/objective-see/reikey) Malware and other applications may install persistent keyboard "event taps" to intercept your keystrokes. ReiKey can scan, detect, and monitor for such taps!
- [**150**星][20d] [Py] [checkymander/imessagesbackdoor](https://github.com/checkymander/iMessagesBackdoor) A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.
- [**141**星][6m] [C++] [hasherezade/iat_patcher](https://github.com/hasherezade/iat_patcher) Persistent IAT hooking application - based on bearparser
- [**126**星][2y] [zonksec/persistence-aggressor-script](https://github.com/zonksec/persistence-aggressor-script) initial commit
- [**124**星][4m] [PS] [p0w3rsh3ll/autoruns](https://github.com/p0w3rsh3ll/autoruns) help do live incident response and enumerate autoruns artifacts that may be used by legitimate programs as well as malware to achieve persistence.
- [**111**星][4m] [Go] [schollz/linkcrawler](https://github.com/schollz/linkcrawler) Cross-platform persistent and distributed web crawler
- [**105**星][3y] [Py] [n00py/norknork](https://github.com/n00py/norknork) Powershell Empire Persistence finder
- [**99**星][2y] [PS] [testingpens/malwarepersistencescripts](https://github.com/testingpens/malwarepersistencescripts) A collection of scripts I've written to help red and blue teams with malware persistence techniques.
- [**95**星][23d] [Batchfile] [huntresslabs/evading-autoruns](https://github.com/huntresslabs/evading-autoruns) 几种用于逃避常见的驻留枚举工具的技术(Evading Autoruns,Derbycon 2017)
- [**94**星][22d] [C++] [hasherezade/persistence_demos](https://github.com/hasherezade/persistence_demos) Demos of various (also non standard) persistence methods used by malware
- [**91**星][4m] [0xthirteen/staykit](https://github.com/0xthirteen/staykit) Cobalt Strike kit for Persistence
- [**73**星][4m] [Py] [s1egesystems/ghostdelivery](https://github.com/s1egesystems/ghostdelivery) .vbs script to deliver payload with persistence.
- [**70**星][16d] [C#] [mdsecactivebreach/wmipersistence](https://github.com/mdsecactivebreach/wmipersistence) WMI Event Subscription Persistence in C#
- [**69**星][4m] [C++] [tobozo/esp32-blecollector](https://github.com/tobozo/esp32-blecollector) ᛡᛒ BLE Scanner + Data persistence on SD Card for M5Stack, Odroid-Go, ESP32-Wrover-Kit and other models
- [**66**星][30d] [yeti-791/apt-guide](https://github.com/yeti-791/apt-guide) APT学习指南(Advanced persistent threat learning Guide)
- [**64**星][5y] [PS] [enigma0x3/outlookpersistence](https://github.com/enigma0x3/outlookpersistence)
- [**64**星][1m] [Py] [n00py/post-ex](https://github.com/n00py/post-ex) Post-exploitation scripts for OS X persistence and privesc
- [**61**星][1m] [3gstudent/bitsadminexec](https://github.com/3gstudent/bitsadminexec) 利用bitsadmin 实现驻留,以及自动运行
- [**61**星][1y] [JS] [dxa4481/xssoauthpersistence](https://github.com/dxa4481/xssoauthpersistence) Maintaining account persistence via XSS and Oauth
- [**58**星][4y] [PS] [killswitch-gui/persistence-survivability](https://github.com/killswitch-gui/persistence-survivability) Powershell Persistence Locator
- [**49**星][1m] [Go] [schollz/crawdad](https://github.com/schollz/crawdad) Cross-platform persistent and distributed web crawler
- [**40**星][3y] [PS] [n0pe-sled/wmi-persistence](https://github.com/n0pe-sled/WMI-Persistence)
- [**39**星][22d] [C] [pmem/valgrind](https://github.com/pmem/valgrind) Enhanced Valgrind for Persistent Memory
- [**38**星][1y] [C] [ntraiseharderror/kaiser](https://github.com/ntraiseharderror/kaiser) Fileless persistence, attacks and anti-forensic capabilties.
- [**35**星][2y] [PS] [3gstudent/office-persistence](https://github.com/3gstudent/office-persistence) Use powershell to test Office-based persistence methods
- [**34**星][3y] [PS] [3gstudent/waitfor-persistence](https://github.com/3gstudent/waitfor-persistence) Use Waitfor.exe to maintain persistence
- [**33**星][3m] [tom4t0/cobalt-strike-persistence](https://github.com/tom4t0/cobalt-strike-persistence) cobalt strike 自启动脚本
- [**30**星][3y] [PS] [3gstudent/com-object-hijacking](https://github.com/3gstudent/com-object-hijacking) use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)
- [**30**星][10m] [PHP] [echo-devim/xbackdoor](https://github.com/echo-devim/xbackdoor) A tool for the persistent XSS exploitation with a focus for mobile web browsers
- [**29**星][20d] [PHP] [n1215/lara-todo-persistence](https://github.com/n1215/lara-todo-persistence) LaravelとEloquentの永続化パターンサンプル
- [**29**星][7m] [PS] [ahhh/wifi_trojans](https://github.com/ahhh/wifi_trojans) A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network via rouge access points.
- [**29**星][4m] [Py] [rikvanduijn/wmi-persistence](https://github.com/rikvanduijn/wmi-persistence)
- [**27**星][5m] [Py] [threatresponse/mad-king](https://github.com/threatresponse/mad-king) Proof of Concept Zappa Based AWS Persistence and Attack Platform
- [**25**星][2y] [Py] [catalyst256/netscaler-cookie-decryptor](https://github.com/catalyst256/netscaler-cookie-decryptor) Python application to decrypt Netscaler Load Balancer Persistence Cookies
- [**21**星][4m] [Shell] [rustybird/qubes-split-browser](https://github.com/rustybird/qubes-split-browser) Tor Browser in a Qubes DisposableVM, with persistent bookmarks and login credentials
- [**20**星][26d] [karneades/malware-persistence](https://github.com/karneades/malware-persistence) Collection of malware persistence and hunting information. Be a persistent persistence hunter!
- [**19**星][5y] [Visual Basic .NET] [enigma0x3/old-powershell-payload-excel-delivery](https://github.com/enigma0x3/old-powershell-payload-excel-delivery) This version touches disk for registry persistence.
- [**15**星][2y] [Py] [nullarray/shellware](https://github.com/nullarray/shellware) Persistent bind shell via pythonic shellcode execution, and registry tampering.
- [**14**星][6m] [HTML] [abzcoding/aptdetector](https://github.com/abzcoding/aptdetector) Advanced Persistent Threat Detection Using Network Analysis
- [**14**星][19d] [C] [windriver-opensourcelabs/cryptfs-tpm2](https://github.com/windriver-opensourcelabs/cryptfs-tpm2) Store and restore a persistent passphrase with TPM 2.0
- [**8**星][4m] [PS] [bspence7337/invoke-wmipersist](https://github.com/bspence7337/invoke-wmipersist) A powershell script to create WMI Event subscription persistence
- [**7**星][1y] [Java] [tryan18/xcom](https://github.com/tryan18/xcom) Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware
- [**4**星][2y] [pradeepjairamani/typo3-xss-poc](https://github.com/pradeepjairamani/typo3-xss-poc) Typo3 -v9.1.0 Persistent Cross Site Scripting(XSS) Assigned CVE Number: CVE-2018-6905
- [**3**星][4y] [JS] [tobypinder/ludumdare32](https://github.com/tobypinder/ludumdare32) [Merged into /tobypinder] Apt - Advanced Persistent Threat
- [**2**星][2y] [Py] [aroradhruv03/apthreatdetectionsys](https://github.com/aroradhruv03/apthreatdetectionsys) Advanced Persistent Threat /Intrusion Detection Sys
- [**2**星][9m] [Py] [azmatt/cerebro](https://github.com/azmatt/cerebro) Keyword Persistent Monitor
- [**2**星][3y] [JS] [adrienjoly/persistent-harmony](https://github.com/adrienjoly/persistent-harmony) A wrapper class to create persistent javascript objects, relying on harmony proxies.
- [**1**星][1y] [harsh2602/apt-detection-via-graph-analytics](https://github.com/harsh2602/apt-detection-via-graph-analytics) This is a public repo for the Graph Analytics project done for the Advanced and Persistent Threats (CS 594-III) during Spring Semester for 2016
- [**1**星][1y] [security-breachlock/cve-2018-16639](https://github.com/security-breachlock/CVE-2018-16639) Non-Persistent XSS in Typesetter CMS
- [**1**星][2y] [PS] [subesp0x10/wmi-persistence](https://github.com/subesp0x10/wmi-persistence)
- [**0**星][1y] [security-breachlock/cve-2018-16623](https://github.com/security-breachlock/CVE-2018-16623) XSS Persistent in Kirby CMS
- [**0**星][1y] [security-breachlock/cve-2018-16632](https://github.com/security-breachlock/CVE-2018-16632) Persistent Cross site Scripting in Mezzanine
- [**0**星][1y] [security-breachlock/cve-2018-17301](https://github.com/security-breachlock/CVE-2018-17301) Non-persistent XSS in EspoCRM
- [**None**星][ObjC] [objective-see/blockblock](https://github.com/objective-see/blockblock) BlockBlock provides continual protection by monitoring persistence locations.***
- 2020.03 [freebuf] [权限维持及后门持久化技巧总结](https://www.freebuf.com/articles/system/229209.html)
- 2020.03 [thegreenplace] [Implementing Raft: Part 3 - Persistence and Optimizations](https://eli.thegreenplace.net/2020/implementing-raft-part-3-persistence-and-optimizations/)
- 2020.01 [BlackHat] [Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence](https://www.youtube.com/watch?v=sEN3NipF_FY)
- 2019.11 [aliyun] [持久化研究-Scheduled Tasks](https://xz.aliyun.com/t/6822)
- 2019.11 [aliyun] [持久化研究-Time Providers](https://xz.aliyun.com/t/6738)
- 2019.11 [aliyun] [Cobaltstrike Server持久化 & Cobaltstrike与Metasploit相互派生shell](https://xz.aliyun.com/t/6722)
- 2019.10 [HackersOnBoard] [Black Hat USA 2016 Account Jumping Post Infection Persistency & Lateral Movement in AWS](https://www.youtube.com/watch?v=WuKaa1fIdwg)
- 2019.09 [4hou] [使用公共语言运行时获取持久性(下)](https://www.4hou.com/web/20362.html)
- 2019.09 [4hou] [使用公共语言运行时获取持久性(上)](https://www.4hou.com/web/20361.html)
- 2019.09 [myonlinesecurity] [Some changes to Remcos Rat persistence method](https://myonlinesecurity.co.uk/some-changes-to-remcos-rat-persistence-method/)
- 2019.09 [netspi] [Maintaining Azure Persistence via Automation Accounts](https://blog.netspi.com/maintaining-azure-persistence-via-automation-accounts/)
- 2019.09 [Bank] [Automated host recon, persistence and exfiltration](https://medium.com/p/85d49423dcc2)
- 2019.09 [trendmicro] [Spam Campaign Abuses PHP Functions for Persistence, Uses Compromised Devices for Evasion and Intrusion](https://blog.trendmicro.com/trendlabs-security-intelligence/spam-campaign-abuses-php-functions-for-persistence-uses-compromised-devices-for-evasion-and-intrusion/)
- 2019.08 [contextis] [Common Language Runtime Hook for Persistence](https://www.contextis.com/en/blog/common-language-runtime-hook-for-persistence)
- 2019.08 [trendmicro] [Uncovering a MyKings Variant With Bootloader Persistence via Managed Detection and Response](https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-a-mykings-variant-with-bootloader-persistence-via-managed-detection-and-response/)
- 2019.08 [topsec] [ATT&CK之后门持久化](http://blog.topsec.com.cn/attack%e4%b9%8b%e5%90%8e%e9%97%a8%e6%8c%81%e4%b9%85%e5%8c%96/)
- 2019.08 [stealthbits] [Detecting Persistence through Active Directory Extended Rights](https://blog.stealthbits.com/detecting-persistence-through-active-directory-extended-rights/)
- 2019.08 [trendmicro] [LokiBot Gains New Persistence Mechanism, Uses Steganography to Hide Its Tracks](https://blog.trendmicro.com/trendlabs-security-intelligence/lokibot-gains-new-persistence-mechanism-uses-steganography-to-hide-its-tracks/)
- 2019.07 [HackerSploit] [Pivoting And Persistence With Armitage](https://www.youtube.com/watch?v=kRXVQdzRbzI)
- 2019.07 [two06] [Persistence with KeePass -Part 2](https://medium.com/p/3e328b24e117)
- 2019.06 [two06] [Persistence with KeePass - Part 1](https://medium.com/p/d2e705326aa6)
- 2019.06 [HackmanitGmbH] [RuhrSec 2019: "Don't Trust The Locals: Exploiting Persistent ...", Marius Steffens & Dr. Ben Stock](https://www.youtube.com/watch?v=-_MokuOQ3Ss)
- 2019.06 [X13Cubed] [Detecting Persistence in Memory](https://www.youtube.com/watch?v=shF8hAprD4g)
- 2019.06 [stealthbits] [Domain Persistence with Subauthentication Packages](https://blog.stealthbits.com/domain-persistence-with-subauthentication-packages/)
- 2019.06 [4hou] [Use COM Object hijacking to maintain persistence——Hijack Outlook](https://www.4hou.com/technology/18449.html)
- 2019.06 [0x00sec] [Achieving Persistent Access to Burp Collaborator Sessions](https://0x00sec.org/t/achieving-persistent-access-to-burp-collaborator-sessions/14311)
- 2019.06 [JosephDelgadillo] [Learn System Hacking E18: Persistence Module](https://www.youtube.com/watch?v=Irptj9Fzoo0)
- 2019.06 [3gstudent] [Use COM Object hijacking to maintain persistence——Hijack Outlook](https://3gstudent.github.io/3gstudent.github.io/Use-COM-Object-hijacking-to-maintain-persistence-Hijack-Outlook/)
- 2019.05 [mdsec] [Persistence: “the continued or prolonged existence of something”: Part 2 – COM Hijacking](https://www.mdsec.co.uk/2019/05/persistence-the-continued-or-prolonged-existence-of-something-part-2-com-hijacking/)
- 2019.05 [mdsec] [Persistence: “the continued or prolonged existence of something”: Part 1 – Microsoft Office](https://www.mdsec.co.uk/2019/05/persistence-the-continued-or-prolonged-existence-of-something-part-1-microsoft-office/)
- 2019.04 [NDSSSymposium] [NDSS 2019 Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation](https://www.youtube.com/watch?v=Fec-LvGfFII)
- 2019.02 [netspi] [Get-AzurePasswords: Exporting Azure RunAs Certificates for Persistence](https://blog.netspi.com/exporting-azure-runas-certificates/)
- 2019.02 [hosakacorp] [systemd user persistence in metasploit](https://hosakacorp.net/p/systemd-user-msf.html)
- 2019.02 [360] [Chrome扩展在持久化中的应用](https://www.anquanke.com/post/id/170725/)
- 2019.02 [360] [CloudGoat云靶机 Part-2:绕过CloudTrail实现持久访问](https://www.anquanke.com/post/id/170618/)
- 2019.02 [robtlee73] [Leveraging Data Science to Discover Persistent Threats - SANS Threat Hunting Summit 2018](https://www.youtube.com/watch?v=9ITZTxYUMwg)
- 2019.02 [360] [S4U2Self在活动目录持久化中的应用](https://www.anquanke.com/post/id/170535/)
- 2019.01 [lukeberner] [How I abused 2FA to maintain persistence after a password change (Google, Microsoft, Instagram…](https://medium.com/p/7e3f455b71a1)
- 2019.01 [4hou] [PowerShell无文件持久化技术与常用的防御绕过技术](http://www.4hou.com/web/15593.html)
- 2019.01 [arxiv] [[1901.00620] A Secure and Persistent Memory System for Non-volatile Memory](https://arxiv.org/abs/1901.00620)
- 2019.01 [sans] [Examples of Recent APT Persistence Mechanisms](https://www.sans.org/cyber-security-summit/archives/file/summit_archive_1493922358.pdf)
- 2019.01 [sans] [Detecting Persistence with the Kansa PowerShell Framework](https://www.sans.org/cyber-security-summit/archives/file/summit_archive_1524591258.pdf)
- 2019.01 [sans] [Viewing the Nodes in the Noise: Leveraging Data Science to Discover Persistent Threat](https://www.sans.org/cyber-security-summit/archives/file/summit_archive_1536345034.pdf)
- 2018.12 [crowdstrike] [Adversary Extends Persistence by Modifying System Binaries](https://www.crowdstrike.com/blog/adversary-extends-persistence-by-modifying-system-binaries/)
- 2018.12 [windowsir] [Hunting and Persistence](http://windowsir.blogspot.com/2018/12/hunting-and-persistence.html)
- 2018.11 [andreafortuna] [Process Injection and Persistence using Application Shimming](https://www.andreafortuna.org/dfir/malware-analysis/process-injection-and-persistence-using-application-shimming/)
- 2018.10 [4hou] [仔细分析源代码也许是寻找新的持久化攻击方式的唯一办法](http://www.4hou.com/web/14125.html)
- 2018.10 [auth0] [Credential Stuffing is a Persistent Threat to Your Users](https://auth0.com/blog/credential-stuffing-is-a-persistent-threat-to-your-users/)
- 2018.10 [xorrior] [Persistent Credential Theft with Authorization Plugins](https://posts.specterops.io/persistent-credential-theft-with-authorization-plugins-d17b34719d65)
- 2018.10 [hexacorn] [How to find new persistence tricks?](http://www.hexacorn.com/blog/2018/10/14/how-to-find-new-persistence-tricks/)
- 2018.10 [defensivedepth] [Osquery Cheat Sheet – Process Interrogation & Persistence Techniques](https://defensivedepth.com/2018/10/10/osquery-cheat-sheet-process-interrogation-persistence-techniques/)
- 2018.10 [hexacorn] [Lateral Movement and Persistence: tactics vs techniques](http://www.hexacorn.com/blog/2018/10/05/lateral-movement-and-persistence-tactics-vs-techniques/)
- 2018.10 [MSbluehat] [BlueHat v18 || Killsuit the equation group's swiss army knife for persistence, evasion, and data exfil](https://www.slideshare.net/MSbluehat/bluehat-v18-killsuit-the-equation-groups-swiss-army-knife-for-persistence-evasion-and-data-exfil)
- 2018.10 [ACoD] [Philo Track 1/30/18 12 Universal Persistent Bugs, Paul Vixie](https://www.youtube.com/watch?v=OM1Oav44F5A)
- 2018.09 [sophos] [The persistent nuisance of cryptomining looks set to grow](https://news.sophos.com/en-us/2018/09/21/the-persistent-nuisance-of-cryptomining-looks-set-to-grow/)
- 2018.09 [360] [如何利用Outlook Today主页实现本地持久化](https://www.anquanke.com/post/id/160044/)
- 2018.09 [bwtech789] [Outlook Today Homepage Persistence](https://medium.com/p/33ea9b505943)
- 2018.08 [4hou] [Turla Outlook 后门使用明智的策略进行隐身和持久](http://www.4hou.com/info/news/13216.html)
- 2018.08 [X13Cubed] [Persistence Mechanisms](https://www.youtube.com/watch?v=ImGaqVHAbCk)
- 2018.08 [freebuf] [修改PHP扩展作为持久后门](http://www.freebuf.com/articles/web/179713.html)
- 2018.07 [trendmicro] [The Need for Managed Detection and Response: Persistent and Prevalent Threats in North America’s Security Landscape](https://blog.trendmicro.com/trendlabs-security-intelligence/the-need-for-managed-detection-and-response-persistent-and-prevalent-threats-in-north-americas-security-landscape/)
- 2018.07 [syspanda] [威胁狩猎: 查找恶意代码的驻留机制](https://www.syspanda.com/index.php/2018/07/18/threat-hunting-looking-finding-persistence-mechanisms/)
- 2018.07 [obscuritylabs] [Cross-Platform VPN Persistence(and phishing!) with Viscosity](https://blog.obscuritylabs.com/vpn-persistence-and-phishing-with-viscosity/)
- 2018.06 [redcanary] [Behind the Scenes of an Active Breach (Part 1): Establishing Persistence](https://redcanary.com/blog/active-breach-establishing-persistence/)
- 2018.05 [secjuice] [My Journey Into Infosec : Persistence, persistence and yet more persistence.](https://medium.com/p/1f02bbc2b388)
- 2018.05 [ironcastle] [Adding Persistence Via Scheduled Tasks, (Mon, May 7th)](https://www.ironcastle.net/adding-persistence-via-scheduled-tasks-mon-may-7th/)
- 2018.05 [sans] [Adding Persistence Via Scheduled Tasks](https://isc.sans.edu/forums/diary/Adding+Persistence+Via+Scheduled+Tasks/23633/)
- 2018.04 [freebuf] [利用DiskShadow服务实现免杀持久化控制以及活动目录数据库提取](http://www.freebuf.com/articles/system/168115.html)
- 2018.04 [oddvar] [利用Image File Execution Options中的GlobalFlags实现驻留, 绕过Autoruns.exe检测](https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/)
- 2018.04 [360] [DiskShadow工具介绍:VSS绕过、持久化感染和活动目录数据库提取](https://www.anquanke.com/post/id/103117/)
- 2018.03 [deepsec] [Advanced and In-Depth Persistent Defence](https://blog.deepsec.net/advanced-and-in-depth-persistent-defence/)
- 2018.03 [bohops] [利用DiskShadow.exe实现VSS逃逸/驻留/Active Directory数据库提取](https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/)
- 2018.03 [rastamouse] [基本的驻留策略和技巧](https://rastamouse.me/2018/03/a-view-of-persistence/)
- 2018.03 [oddvar] [利用RunOnceEx实现驻留, 能够躲避Autoruns.exe监测](https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/)
- 2018.03 [virusbulletin] [VB2017 paper: The life story of an IPT - Inept Persistent Threat actor](https://www.virusbulletin.com/blog/2018/03/vb2017-paper-life-story-ipt-inept-persistent-threat-actor/)
- 2018.03 [misteralfa] [[Facebook][ F5 BIG-IP ] PERSISTENCE COOKIE INFORMATION LEAKAGE](http://misteralfa-hack.blogspot.com/2018/03/facebook-f5-big-ip-persistence-cookie.html)
- 2018.03 [360] [利用INF-SCT获取并进行绕过、规避和持久化技术](https://www.anquanke.com/post/id/100815/)
- 2018.03 [bohops] [Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)](https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/)
- 2018.03 [4hou] [利用INF-SCT文件执行绕过,规避查杀和持久性的技术](http://www.4hou.com/technology/10508.html)
- 2018.03 [stealthbits] [Creating Persistence with DCShadow](https://blog.stealthbits.com/creating-persistence-with-dcshadow/)
- 2018.02 [bohops] [执行INF-SCT文件的若干方式(LaunchINFSection),实现绕过/躲避杀软/驻留. (INF-SCT: INF配置文件中配置的SCT文件)](https://bohops.com/2018/02/26/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence/)
- 2018.02 [bohops] [Vshadow: Abusing the Volume Shadow Service for Evasion, Persistence, and Active Directory Database Extraction](https://bohops.com/2018/02/10/vshadow-abusing-the-volume-shadow-service-for-evasion-persistence-and-active-directory-database-extraction/)
- 2018.02 [nextplatform] [Momentum Gathers for Persistent Memory Preppers](https://www.nextplatform.com/2018/02/07/momentum-gathers-persistent-memory-preppers/)
- 2018.02 [vimeo] [Introduction to INNUENDO's New Persistence Framework](https://vimeo.com/253864191)
- 2018.01 [stealthbits] [Gain System Access and Persistence with SQL Native Attacks – SQL Attacks](https://blog.stealthbits.com/gain-system-access-and-persistence-with-sql-native-attacks-sql-attacks/)
- 2018.01 [f5] [Cookies, Sessions, and Persistence](https://f5.com/resources/white-papers/cookies-sessions-and-persistence)
- 2018.01 [freebuf] [来自后方世界的隐匿威胁:后门与持久代理(二)](http://www.freebuf.com/articles/system/150314.html)
- 2017.12 [freebuf] [Cobalt Strike实战技巧持久性权限控制姿势](http://www.freebuf.com/sectool/157952.html)
- 2017.12 [paloaltonetworks] [Abusing the Service Control Manager to Establish Persistence for Non-Service App](https://unit42.paloaltonetworks.com/unit42-abusing-service-control-manager-establish-persistence-non-service-applications/)
- 2017.12 [securestate] [Quick Reference: Empire Persistence Modules](https://warroom.rsmus.com/quick-reference-empire-persistence-modules/)
- 2017.11 [countercept] [Hunting for Junction Folder Persistence](https://countercept.com/blog/hunting-for-junction-folder-persistence/)
- 2017.11 [malwarebytes] [挖矿新姿势: 使用浏览器访问内嵌 JS挖矿脚本的网站之后, 即便关闭浏览器, 挖矿依然在继续](https://blog.malwarebytes.com/cybercrime/2017/11/persistent-drive-by-cryptomining-coming-to-a-browser-near-you/)
- 2017.11 [countercept] [Hunting for Junction Folder Persistence](https://countercept.com/our-thinking/hunting-for-junction-folder-persistence/)
- 2017.10 [digitalforensicstips] [Persistent Monitoring on a Budget](http://digitalforensicstips.com/2017/10/persistent-monitoring-on-a-budget/)
- 2017.10 [stealthbits] [Attack Step 3: Persistence with NTFS Extended Attributes – File System Attacks](https://blog.stealthbits.com/attack-step-3-persistence-ntfs-extended-attributes-file-system-attacks)
- 2017.10 [freebuf] [来自后方世界的隐匿威胁:后门与持久代理(一)](http://www.freebuf.com/articles/system/149839.html)
- 2017.09 [harmj0y] [An ACE in the Hole - Stealthy Host Persistence via Security Descriptors](https://www.slideshare.net/harmj0y/an-ace-in-the-hole-stealthy-host-persistence-via-security-descriptors)
- 2017.09 [nats] [Guest Post: Use cases for persistent logs with NATS Streaming](https://nats.io/blog/use-cases-for-persistent-logs-with-nats-streaming/)
- 2017.08 [3gstudent] [Use Logon Scripts to maintain persistence](https://3gstudent.github.io/3gstudent.github.io/Use-Logon-Scripts-to-maintain-persistence/)
- 2017.08 [3gstudent] [Use COM Object hijacking to maintain persistence——Hijack explorer.exe](https://3gstudent.github.io/3gstudent.github.io/Use-COM-Object-hijacking-to-maintain-persistence-Hijack-explorer.exe/)
- 2017.08 [3gstudent] [Use COM Object hijacking to maintain persistence——Hijack CAccPropServicesClass and MMDeviceEnumerator](https://3gstudent.github.io/3gstudent.github.io/Use-COM-Object-hijacking-to-maintain-persistence-Hijack-CAccPropServicesClass-and-MMDeviceEnumerator/)
- 2017.08 [360] [BadGPO:组策略对象在持久化及横向渗透中的应用](https://www.anquanke.com/post/id/86531/)
- 2017.07 [activecanopy] [May QBot Persistence and Attack Details](https://activecanopy.com/recent-qbot-attack/)
- 2017.07 [3gstudent] [Use msdtc to maintain persistence](https://3gstudent.github.io/3gstudent.github.io/Use-msdtc-to-maintain-persistence/)
- 2017.07 [paloaltonetworks] [TwoFace Webshell: Persistent Access Point for Lateral](https://unit42.paloaltonetworks.com/unit42-twoface-webshell-persistent-access-point-lateral-movement/)
- 2017.07 [3gstudent] [Use CLR to maintain persistence](https://3gstudent.github.io/3gstudent.github.io/Use-CLR-to-maintain-persistence/)
- 2017.07 [3gstudent] [Office Persistence on x64 operating system](https://3gstudent.github.io/3gstudent.github.io/Office-Persistence-on-x64-operating-system/)
- 2017.07 [virusbulletin] [Advanced and inept persistent threats to be discussed at VB2017](https://www.virusbulletin.com/blog/2017/07/advanced-and-inept-persistent-threats-be-discussed-vb2017/)
- 2017.07 [3gstudent] [Use Office to maintain persistence](https://3gstudent.github.io/3gstudent.github.io/Use-Office-to-maintain-persistence/)
- 2017.06 [stealthbits] [Persistence using AdminSDHolder and SDProp](https://blog.stealthbits.com/persistence-using-adminsdholder-and-sdprop/)
- 2017.06 [4hou] [Active Directory权限持久控制之恶意的安全支持提供者(SSP)](http://www.4hou.com/system/5475.html)
- 2017.06 [3gstudent] [Use AppDomainManager to maintain persistence](https://3gstudent.github.io/3gstudent.github.io/Use-AppDomainManager-to-maintain-persistence/)
- 2017.06 [3gstudent] [Use Waitfor.exe to maintain persistence](https://3gstudent.github.io/3gstudent.github.io/Use-Waitfor.exe-to-maintain-persistence/)
- 2017.06 [csyssec] [内存持久战之防御措施](http://www.csyssec.org/20170605/memorysafety-defense/)
- 2017.06 [blacksunhackers] [利用 AppVerifier 实现函数Hook 及驻留](http://blacksunhackers.club/2017/06/leveraging-application-verifier-for-function-hooking-and-persistence/)
- 2017.05 [csyssec] [内存持久战之内存安全性](http://www.csyssec.org/20170513/memorysafety/)
- 2017.05 [trustedsec] [Episode 2.7 Tavis breaks the Internet, Executive Orders, Diskless Persistence Methods, and more!](https://www.trustedsec.com/2017/05/episode-2-7-tavis-breaks-internet-executive-orders-diskless-persistence-methods/)
- 2017.05 [freebuf] [如何创建Powershell持久隐蔽后门](http://www.freebuf.com/articles/system/133640.html)
- 2017.05 [4hou] [Active Directory域渗透的权限持久控制之组策略](http://www.4hou.com/technology/4554.html)
- 2017.05 [360] [PowerShell注入技巧:无盘持久性和绕过技术](https://www.anquanke.com/post/id/86012/)
- 2017.05 [fireeye] [FIN7 组织使用数据库(.sdb后缀)实现驻留](https://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.html)
- 2017.05 [binarydefense] [PowerShell Injection with Fileless Payload Persistence and Bypass Techniques](https://blog.binarydefense.com/powershell-injection-diskless-persistence-bypass-techniques)
- 2017.04 [4hou] [利用Office加载项进行持久化控制的6种姿势](http://www.4hou.com/technology/4509.html)
- 2017.04 [360] [利用Office插件实现恶意程序持久化](https://www.anquanke.com/post/id/85966/)
- 2017.04 [mwrinfosecurity] [Add-In Opportunities for Office Persistence](https://labs.mwrinfosecurity.com/blog/add-in-opportunities-for-office-persistence/)
- 2017.04 [4hou] [零日漏洞DoubleAgent的代码注入和持久性攻击技术分析](http://www.4hou.com/technology/4066.html)
- 2017.03 [puri] [Yet Another EFI/UEFI Exploit, this one Utilizing NVRAM and Persistent Storage](https://puri.sm/posts/efi-uefi-vault7-exploit-utilizing-nvram-and-persistent-storage/)
- 2017.03 [DemmSec] [Guide to Pentesting - Episode 18 - Persistence](https://www.youtube.com/watch?v=kSQeuxdoAcM)
- 2017.02 [auth0] [Serverless REST API with Angular, Persistence and Security](https://auth0.com/blog/serverless-angular-app-with-persistence-and-security/)
- 2017.01 [adsecurity] [Sneaky Persistence Active Directory Trick #18: Dropping SPNs on Admin Accounts for Later Kerberoasting](https://adsecurity.org/?p=3466)
- 2016.11 [vkremez] [Netcat Shell and Persistence](https://www.vkremez.com/2016/11/netcat-shell-and-persistence.html)
- 2016.10 [n00py] [Using email for persistence on OS X](https://www.n00py.io/2016/10/using-email-for-persistence-on-os-x/)
- 2016.10 [Cooper] [Hack.lu 2016 badGPO - Using GPOs for Persistence and Lateral Movement](https://www.youtube.com/watch?v=PnFszVBEwBY)
- 2016.09 [3gstudent] [Netsh persistence](https://3gstudent.github.io/3gstudent.github.io/Netsh-persistence/)
- 2016.09 [360] [使用Netshell执行恶意DLL并实现对目标主机的持久化攻击](https://www.anquanke.com/post/id/84648/)
- 2016.09 [endgame] [How to Hunt: Detecting Persistence & Evasion with the COM](https://www.endgame.com/blog/technical-blog/how-hunt-detecting-persistence-evasion-com)
- 2016.09 [deepsec] [DeepSec2016 Talk: badGPO – Using GPOs for Persistence and Lateral Movement – Yves Kraft & Immanuel Willi](http://blog.deepsec.net/deepsec2016-talk-badgpo-using-gpos-persistence-lateral-movement-yves-kraft-immanuel-willi/)
- 2016.08 [blacksunhackers] [Post Exploitation Persistence With Application Shims (Intro)](http://blacksunhackers.club/2016/08/post-exploitation-persistence-with-application-shims-intro/)
- 2016.08 [radware] [Dry Lighting Cracks against the Cloud: The Rise of the Advanced Persistent DoS (APDoS)](https://blog.radware.com/security/2016/08/the-rise-of-advanced-persistent-dos-apdos/)
- 2016.08 [netspi] [Establishing Registry Persistence via SQL Server with PowerUpSQL](https://blog.netspi.com/establishing-registry-persistence-via-sql-server-powerupsql/)
- 2016.07 [objective] [Analyzing 'Mac File Opener' Persistence](https://objective-see.com/blog/blog_0x11.html)
- 2016.07 [paloaltonetworks] [Technical Walkthrough: Office Test Persistence Method Used In Recent Sofac](https://unit42.paloaltonetworks.com/unit42-technical-walkthrough-office-test-persistence-method-used-in-recent-sofacy-attacks/)
- 2016.07 [malwarebytes] [Untangling Kovter’s persistence methods](https://blog.malwarebytes.com/threat-analysis/2016/07/untangling-kovter/)
- 2016.07 [korznikov] [RCE by abusing NAC to gain Domain Persistence.](http://www.korznikov.com/2016/07/rce-by-abusing-nac-to-gain-domain.html)
- 2016.06 [sentinelone] [Persistence Makes Perfect](https://www.sentinelone.com/blog/malware-variants-like-rawpos-demonstrates-problem-signatures/)
- 2016.06 [k7computing] [Interesting Persistence Technique](https://blog.k7computing.com/?p=5737)
- 2016.06 [k7computing] [Interesting Persistence Technique](http://blog.k7computing.com/2016/06/interesting-persistence-technique/)
- 2016.06 [imperva] [Black Hat SEO attacks: Persistent Multi-Vector Attacks Prey on Thousands of Legitimate Websites](https://www.imperva.com/blog/2016/06/black-hat-seo-attacks/)
- 2016.05 [enigma0x3] [Userland Persistence with Scheduled Tasks and COM Handler Hijacking](https://enigma0x3.net/2016/05/25/userland-persistence-with-scheduled-tasks-and-com-handler-hijacking/)
- 2016.05 [cybereason] [Cybereason, SANS Webinar: The End of IOCs: A Case Study on Resolving Persistent Attacks Using Tactics, Techniques, and Procedures](https://www.cybereason.com/blog/cybereason-sans-webinar-the-end-of-iocs-a-case-study-on-resolving-persistent-attacks-using-tactics-techniques-and-procedures)
- 2016.05 [cmu] [Persistent Little IP, Aren't You?](https://insights.sei.cmu.edu/cert/2016/05/persistent-little-ip-arent-you.html)
- 2016.05 [room362] [WPAD Persistence ·](https://malicious.link/post/2016/wpad-persistence/)
- 2016.05 [zonksec] [Persistence Aggressor Script](https://zonksec.com/blog/persistence-aggressor-script/)
- 2016.04 [welivesecurity] [Insider threats: A persistent and widespread problem](https://www.welivesecurity.com/2016/04/26/insider-threats-persistent-widespread-problem/)
- 2016.04 [jerrygamblin] [Persistent Reverse-SSH Tunnel on a RaspberryPi](https://jerrygamblin.com/2016/04/23/persistent-reverse-ssh-tunnels-on-a-raspberrypi/)
- 2016.04 [nextplatform] [Programming For Persistent Memory Takes Persistence](https://www.nextplatform.com/2016/04/21/programming-persistent-memory-takes-persistence/)
- 2016.04 [netspi] [Maintaining Persistence via SQL Server – Part 2: Triggers](https://blog.netspi.com/maintaining-persistence-via-sql-server-part-2-triggers/)
- 2016.03 [adsecurity] [Sneaky Active Directory Persistence #17: Group Policy](https://adsecurity.org/?p=2716)
- 2016.03 [adsecurity] [Sneaky Active Directory Persistence #16: Computer Accounts & Domain Controller Silver Tickets](https://adsecurity.org/?p=2753)
- 2016.03 [netspi] [Maintaining Persistence via SQL Server – Part 1: Startup Stored Procedures](https://blog.netspi.com/sql-server-persistence-part-1-startup-stored-procedures/)
- 2016.02 [powershellempire] [Nothing Lasts Forever: Persistence with Empire](http://www.harmj0y.net/blog/empire/nothing-lasts-forever-persistence-with-empire/)
- 2016.02 [checkpoint] [HummingBad: A Persistent Mobile Chain Attack | Check Point Software Blog](https://blog.checkpoint.com/2016/02/04/hummingbad-a-persistent-mobile-chain-attack/)
- 2016.02 [cybereason] [NSA: Hackers use persistence, not zero days, to breach companies](https://www.cybereason.com/blog/nsa-hackers-use-persistence-not-zero-days-to-breach-companies)
- 2016.01 [countercept] [Effective Persistent Threats - Sophistication, Economics & Complexity](https://countercept.com/blog/effective-persistent-threats-sophistication-economics-and-complexity/)
- 2016.01 [acolyer] [Blurred Persistence: Efficient Transactions in Persistent Memory](https://blog.acolyer.org/2016/01/21/blurred-persistence/)
- 2016.01 [] [自建CDN防御DDoS(1):知己知彼,建设持久防线](http://www.91ri.org/15084.html)
- 2015.12 [arno0x0x] [Configure Fail2Ban for permanent and persistent bans](https://arno0x0x.wordpress.com/2015/12/30/fail2ban-permanent-persistent-bans/)
- 2015.12 [rapid7] [12 Days of HaXmas: Advanced Persistent Printer](https://blog.rapid7.com/2015/12/26/advanced-persistant-mfp/)
- 2015.11 [malwarejake] [Kerberos silver tickets - unique attacker persistence](http://malwarejake.blogspot.com/2015/11/kerberos-silver-tickets-unique-attacker.html)
- 2015.11 [secist] [详解:kali之持久加密U盘的制作](http://www.secist.com/archives/1265.html)
- 2015.10 [] [巧用DSRM密码同步将域控权限持久化](http://www.91ri.org/14442.html)
- 2015.10 [freebuf] [域控权限持久化之DSRM](http://www.freebuf.com/articles/system/80968.html)
- 2015.10 [room362] [DotNet's DNVM For Persistence On Developer Machines ·](https://malicious.link/post/2015/dotnet-dnvm-for-persistence-on-developer-machines/)
- 2015.10 [cybereason] [A New Persistent Attack Methodology Targeting Microsoft OWA](https://www.cybereason.com/blog/microsoft-owa-apt)
- 2015.09 [cybertriage] [Maximizing Your Non-Persistent Agent’s Effectiveness](https://www.cybertriage.com/2015/maximizing-your-non-persistent-agents-effectiveness/)
- 2015.08 [cybertriage] [Do You Need Persistent Agents to Fight Persistent Threats?](https://www.cybertriage.com/2015/do-you-need-persistent-agents-to-fight-persistent-threats/)
- 2015.08 [secist] [MSF之persistence权限维持](http://www.secist.com/archives/740.html)
- 2015.07 [shellntel] [Using PowerShell & Unicorn to Get Persistence](https://www.shellntel.com/blog/2015/7/25/using-powershell-unicorn-to-get-persistence)
- 2015.04 [paragonie] [Implementing Secure User Authentication in PHP Applications with Long-Term Persistence (Login with "Remember Me" Cookies)](https://paragonie.com/blog/2015/04/secure-authentication-php-with-long-term-persistence)
- 2015.02 [virusbulletin] [VB2014 paper: Caphaw - the advanced persistent pluginer](https://www.virusbulletin.com/blog/2015/02/paper-caphaw-advanced-persistent-pluginer/)
- 2015.01 [insinuator] [The Persistent Problem of State in IPv6 (Security)](https://insinuator.net/2015/01/the-persistent-problem-of-state-in-ipv6-security/)
- 2014.11 [begriffs] [Type-Safe DB Access with Persistent](https://begriffs.com/posts/2014-11-18-typesafe-db-persistent.html)
- 2014.10 [firebitsbr] [Setar variável persistente do $GOPATH no Fedora 20](https://firebitsbr.wordpress.com/2014/10/23/1374/)
- 2014.10 [enigma0x3] [Persistence using Microsoft Outlook](https://enigma0x3.net/2014/10/14/persistence-using-microsoft-outlook/)
- 2014.10 [knapsy] [Persistence VM Writeup](http://blog.knapsy.com/blog/2014/10/05/persistence-vm-writeup/)
- 2014.09 [leonjza] [From Persistence](https://leonjza.github.io/blog/2014/09/18/from-persistence/)
- 2014.09 [room362] [OSX Persistence via PHP Webshell ·](https://malicious.link/post/2014/osx-persistence-via-php-webshell/)
- 2014.09 [sans] [Odd Persistent Password Bruteforcing](https://isc.sans.edu/forums/diary/Odd+Persistent+Password+Bruteforcing/18621/)
- 2014.09 [kaspersky] [A solution for small businesses’ persistent IT security issues](https://www.kaspersky.com/blog/a-solution-for-small-businesses-persistent-it-security-issues/2509/)
- 2014.07 [securityintelligence] [Citadel’s New Trick: Persistent Device Remote Control](https://securityintelligence.com/citadels-new-trick-persistent-device-remote-control/)
- 2014.07 [malwarebytes] [PUPS are Persistent](https://blog.malwarebytes.com/threat-analysis/2014/07/pups-are-persistent/)
- 2014.06 [bluescreenofjeff] [Semi-Persistence](https://bluescreenofjeff.com/2014-06-26-Semipersistence/)
- 2014.06 [trendmicro] [Best security practices for preventing advanced persistent attacks](http://blog.trendmicro.com/best-security-practices-preventing-advanced-persistent-attacks/)
- 2014.05 [offensive] [Kali Encrypted USB Persistence](https://www.offensive-security.com/kali-linux/kali-encrypted-usb-persistence/)
- 2013.12 [welivesecurity] [Did you say "Advanced" Persistent Threats?](https://www.welivesecurity.com/2013/12/06/did-you-say-advanced-persistent-threats/)
- 2013.08 [wordfence] [Got a persistent scraper? Here’s how to deal with them, permanently!](https://www.wordfence.com/blog/2013/08/got-a-persistent-scraper-heres-how-to-deal-with-them-permanently/)
- 2013.07 [windowsir] [HowTo: Detecting Persistence Mechanisms](http://windowsir.blogspot.com/2013/07/howto-detecting-persistence-mechanisms.html)
- 2013.05 [firebitsbr] [Exploit Python – F5 BIG-IP Cookie Persistence](https://firebitsbr.wordpress.com/2013/05/06/exploit-python-f5-big-ip-cookie-persistence/)
- 2012.10 [trendmicro] [PE_XPAJ: Persistent File Infector](https://blog.trendmicro.com/trendlabs-security-intelligence/pe_xpaj-persistent-file-infector/)
- 2012.08 [privacy] [Shaping Tomorrow’s Security Today 4: Advanced Persistent Protection](http://privacy-pc.com/articles/shaping-tomorrow%e2%80%99s-security-today-4-advanced-persistent-protection.html)
- 2011.10 [krebsonsecurity] [Chasing APT: Persistence Pays Off](https://krebsonsecurity.com/2011/10/chasing-apt-persistence-pays-off/)
- 2011.09 [trendmicro] [The Persistent Threat of Fake AV](http://blog.trendmicro.com/the-persistent-threat-of-fake-av/)
- 2011.08 [securityinnovation] [Use Named Queries with Java Persistence API (JPA)](https://blog.securityinnovation.com/blog/2011/08/use-named-queries-with-java-persistence-api-jpa.html)
- 2011.05 [krebsonsecurity] [Advanced Persistent Tweets: Zero-Day in 140 Characters](https://krebsonsecurity.com/2011/05/advanced-persistent-tweets-zero-day-in-140-characters/)
- 2010.12 [immunityinc] [Aleatory Persistent Threat](https://www.immunityinc.com/downloads/APT_kiwicon.pdf)
- 2010.10 [sans] [Digital Forensics: Persistence Registry keys](https://digital-forensics.sans.org/blog/2010/10/20/digital-forensics-autorun-registry-keys)
- 2010.09 [depthsecurity] [Super-Persistent Cookies - evercookie JavaScript API](https://depthsecurity.com/blog/super-persistent-cookies-evercookie-javascript-api)
- 2010.08 [trendmicro] [The Persistence of FAKEAV](https://blog.trendmicro.com/trendlabs-security-intelligence/the-persistence-of-fakeav/)
- 2010.08 [immunityinc] [Aleatory Persistent Threat](https://www.immunityinc.com/downloads/APT.pdf)
- 2010.04 [rapid7] [Persistent Meterpreter over Reverse HTTPS](https://blog.rapid7.com/2010/04/13/persistent-meterpreter-over-reverse-https/)
- 2005.02 [sans] [More CA BrightStor ARCserve Backup... Is your IDS/IPS Dead?... And Persistent Netcat Listener with While Loop](https://isc.sans.edu/forums/diary/More+CA+BrightStor+ARCserve+Backup+Is+your+IDSIPS+Dead+And+Persistent+Netcat+Listener+with+While+Loop/458/)
- 2003.04 [imperialviolet] [Persistence](https://www.imperialviolet.org/2003/04/17/persistence.html)***
- 2020.05 [pentestlab] [Persistence – COM Hijacking](https://pentestlab.blog/2020/05/20/persistence-com-hijacking/)
- 2020.03 [pentestlab] [Persistence – DLL Hijacking](https://pentestlab.blog/2020/03/04/persistence-dll-hijacking/)
- 2020.02 [pentestlab] [Persistence – RID Hijacking](https://pentestlab.blog/2020/02/12/persistence-rid-hijacking/)
- 2020.02 [pentestlab] [Persistence – WaitFor](https://pentestlab.blog/2020/02/04/persistence-waitfor/)
- 2020.01 [pentestlab] [Persistence – Modify Existing Service](https://pentestlab.blog/2020/01/22/persistence-modify-existing-service/)
- 2020.01 [pentestlab] [Persistence – Winlogon Helper DLL](https://pentestlab.blog/2020/01/14/persistence-winlogon-helper-dll/)
- 2020.01 [pentestlab] [Persistence – Image File Execution Options Injection](https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/)
- 2020.01 [pentestlab] [Persistence – AppInit DLLs](https://pentestlab.blog/2020/01/07/persistence-appinit-dlls/)
- 2020.01 [pentestlab] [Persistence – Change Default File Association](https://pentestlab.blog/2020/01/06/persistence-change-default-file-association/)
- 2019.12 [pentestlab] [Persistence – Application Shimming](https://pentestlab.blog/2019/12/16/persistence-application-shimming/)
- 2019.12 [pentestlab] [Persistence – Office Application Startup](https://pentestlab.blog/2019/12/11/persistence-office-application-startup/)
- 2019.11 [pentestlab] [Persistence – Accessibility Features](https://pentestlab.blog/2019/11/13/persistence-accessibility-features/)
- 2019.11 [pentestlab] [Persistence – PowerShell Profile](https://pentestlab.blog/2019/11/05/persistence-powershell-profile/)
- 2019.11 [pentestlab] [Persistence – Scheduled Tasks](https://pentestlab.blog/2019/11/04/persistence-scheduled-tasks/)
- 2019.10 [pentestlab] [Persistence – BITS Jobs](https://pentestlab.blog/2019/10/30/persistence-bits-jobs/)
- 2019.10 [pentestlab] [Persistence – Netsh Helper DLL](https://pentestlab.blog/2019/10/29/persistence-netsh-helper-dll/)
- 2019.10 [pentestlab] [Persistence – Port Monitors](https://pentestlab.blog/2019/10/28/persistence-port-monitors/)
- 2019.10 [pentestlab] [Persistence – Time Providers](https://pentestlab.blog/2019/10/22/persistence-time-providers/)
- 2019.10 [pentestlab] [Persistence – Security Support Provider](https://pentestlab.blog/2019/10/21/persistence-security-support-provider/)
- 2019.10 [pentestlab] [Persistence – Screensaver](https://pentestlab.blog/2019/10/09/persistence-screensaver/)
- 2019.10 [pentestlab] [Persistence – Shortcut Modification](https://pentestlab.blog/2019/10/08/persistence-shortcut-modification/)
- 2019.10 [pentestlab] [Persistence – New Service](https://pentestlab.blog/2019/10/07/persistence-new-service/)
- 2019.10 [pentestlab] [Persistence – Registry Run Keys](https://pentestlab.blog/2019/10/01/persistence-registry-run-keys/)***
- 2020.01 [fortinet] [Using a Security-Driven Network to Address Persistent IoT Botnets](https://www.fortinet.com/blog/industry-trends/security-driven-network-addressing-IoT-botnets.html)
- 2019.11 [flashpoint] [Threat Actors Demonstrate Persistent Interest in ATM Malware](https://www.flashpoint-intel.com/blog/threat-actors-demonstrate-persistent-interest-in-atm-malware/)
- 2019.09 [4hou] [剖析僵尸网络使用的多种持久化方法:MyKings新变种分析](https://www.4hou.com/technology/19801.html)
- 2019.09 [4hou] [垃圾邮件攻击活动滥用PHP函数实现驻留,并使用被入侵的设备绕过检测](https://www.4hou.com/web/20185.html)
- 2019.09 [trendmicro] [Spam Campaign Abuses PHP Functions for Persistence, Uses Compromised Devices for Evasion and Intrusion](https://blog.trendmicro.com/trendlabs-security-intelligence/spam-campaign-abuses-php-functions-for-persistence-uses-compromised-devices-for-evasion-and-intrusion/)
- 2019.08 [sentinelone] [Gootkit Banking Trojan | Part 2: Persistence & Other Capabilities](https://www.sentinelone.com/blog/gootkit-banking-trojan-persistence-other-capabilities/)
- 2019.05 [proofpoint] [New KPOT v2.0 stealer brings zero persistence and in-memory features to silently steal credentials](https://www.proofpoint.com/us/threat-insight/post/new-kpot-v20-stealer-brings-zero-persistence-and-memory-features-silently-steal)
- 2019.05 [sans] [Finding Registry Malware Persistence with RECmd](https://digital-forensics.sans.org/blog/2019/05/07/malware-persistence-recmd)
- 2019.04 [sans] [Offline Autoruns Revisited - Auditing Malware Persistence](https://digital-forensics.sans.org/blog/2019/04/29/offline-autoruns-revisited)
- 2019.01 [ColinHardy] [Using WhatsApp for Malware Persistence](https://www.youtube.com/watch?v=yaGPWmvjKu4)
- 2018.10 [arxiv] [[1810.07321] Malware triage for early identification of Advanced Persistent Threat activities](https://arxiv.org/abs/1810.07321)
- 2018.07 [sucuri] [Persistent Malicious Redirect Variants](https://blog.sucuri.net/2018/07/persistent-malicious-redirect-variants.html)
- 2018.06 [az4n6] [Malicious PowerShell in the Registry: Persistence](http://az4n6.blogspot.com/2018/06/malicious-powershell-in-registry.html)
- 2018.05 [lastline] [Web Security for Advanced Malware and Persistent Threats – Revisited](https://www.lastline.com/blog/web-security-for-advanced-malware-and-persistent-threats-revisited/)
- 2018.05 [virusbulletin] [Hide'n'Seek IoT botnet adds persistence](https://www.virusbulletin.com/blog/2018/05/hidenseek-iot-botnet-adds-persistence/)
- 2018.05 [secplicity] [The Hide ‘N Seek IoT Botnet Just Unlocked a New Achievement: Persistence](https://www.secplicity.org/2018/05/08/the-hide-n-seek-iot-botnet-just-unlocked-a-new-achievement-persistence/)
- 2018.05 [bitdefender] [Hide and Seek IoT Botnet resurfaces with new tricks, persistence](https://labs.bitdefender.com/2018/05/hide-and-seek-iot-botnet-resurfaces-with-new-tricks-persistence/)
- 2018.03 [vkremez] [Let's Learn: Internals of Iranian-Based Threat Group "Chafer" Malware: Autoit and PowerShell Persistence](https://www.vkremez.com/2018/03/investigating-iranian-threat-group.html)
- 2018.03 [lastline] [The Persistent Threat of Account and Identity Theft Malware](https://www.lastline.com/blog/account-and-identity-theft-malware/)
- 2018.01 [cylance] [Threat Spotlight: Kovter Malware Fileless Persistence Mechanism](https://www.cylance.com/en_us/blog/threat-spotlight-kovter-malware-fileless-persistence-mechanism.html)
- 2018.01 [hyperiongray] [Malicious Excel DDE Execution with ML AV Bypass and Persistence](https://blog.hyperiongray.com/excel-dde-exploitation-and-ml-av-bypass/)
- 2017.10 [vmray] [Persistent Emotet Malware with a Crafty Social Engineering Technique](https://www.vmray.com/cyber-security-blog/persistent-emotet-malware-social-engineering-technique/)
- 2017.10 [vmray] [Persistent Emotet Malware with a Crafty Social Engineering Technique](https://www.vmray.com/blog/persistent-emotet-malware-social-engineering-technique/)
- 2017.10 [angelalonso] [Analysis of a malicious DOC used by Turla APT group; hunting persistence via PowerShell](http://blog.angelalonso.es/2017/10/analysis-of-malicious-doc-used-by-turla.html)
- 2017.09 [vkremez] [Let's Learn: Reversing Trickbot Banking Trojan's New "WormShare" Persistence Module](https://www.vkremez.com/2017/09/lets-learn-reversing-trickbot-banking.html)
- 2017.08 [vmray] [Poweliks Malware – Filelessly Persistent](https://www.vmray.com/blog/poweliks-fileless-malware-analysis/)
- 2017.07 [trustedsec] [Episode 2.8 – NSA and Exploit Tools, Petya, Russia, and Ransomware, systemd, Deathstar, and Office persistence methods](https://www.trustedsec.com/2017/07/episode-2-8-july-3rd-2017-nsa-exploit-tools-petya-russia-ransomware-systemd-deathstar-office-persistence-methods/)
- 2017.05 [hshrzd] [作者之前发布“诡异的恶意代码驻留方式”,一些读者询问 extension handler 劫持的细节,于是作者在这篇 Blog 中做了详细解析。](https://hshrzd.wordpress.com/2017/05/25/hijacking-extensions-handlers-as-a-malware-persistence-method/)
- 2017.05 [tarlogic] [Persistence in WordPress using backdoors in SQL](https://www.tarlogic.com/en/blog/backdoors-in-sql-wordpress/)
- 2016.11 [vkremez] [Post Exploitation: Persistence and Backdoor](https://www.vkremez.com/2016/11/post-exploitation-persistence-and.html)
- 2016.10 [securitygossip] [Persistent Data-only Malware: Function Hooks Without Code](http://securitygossip.com/blog/2016/10/12/2016-10-12/)
- 2016.10 [sjtu] [Persistent Data-only Malware: Function Hooks Without Code](https://loccs.sjtu.edu.cn/gossip/blog/2016/10/12/2016-10-12/)
- 2016.06 [esentire] [Malware and Advanced Persistent Threats - How Long is Too Long to go Undetected?](https://www.esentire.com/blog/malware-and-advanced-persistent-threats-how-long-is-too-long-to-go-undetected/)
- 2016.04 [cybrary] [S3SS10N Wednesday – Malware Persistence 101](https://www.cybrary.it/2016/04/s3ss10n-wednesday-malware-persistence-101/)
- 2016.03 [airbuscybersecurity] [Fileless Malware – A Behavioural Analysis Of Kovter Persistence](http://blog.airbuscybersecurity.com/post/2016/03/FILELESS-MALWARE-%E2%80%93-A-BEHAVIOURAL-ANALYSIS-OF-KOVTER-PERSISTENCE)
- 2015.09 [wroot] [Babadook: Connection-less Powershell Persistent and Resilient “Backdoor”](https://wroot.org/posts/babadook-connection-less-powershell-persistent-and-resilient-backdoor/)
- 2015.06 [f5] [Slave Malware Analysis: Evolving from IBAN Swaps to Persistent Webinjects](https://f5.com/labs/articles/threat-intelligence/malware/slave-malware-analysis-evolving-from-iban-swaps-to-persistent-webinjects-22439)
- 2015.06 [securelist] [The Duqu 2.0 persistence module](https://securelist.com/the-duqu-2-0-persistence-module/70641/)
- 2015.06 [openanalysis] [Malware Persistence: HKEY_CURRENT_USER Shell Extension Handlers](https://oalabs.openanalysis.net/2015/06/04/malware-persistence-hkey_current_user-shell-extension-handlers/)
- 2015.05 [jumpespjump] [Many ways of malware persistence (that you were always afraid to ask)](https://jumpespjump.blogspot.com/2015/05/many-ways-of-malware-persistence-that.html)
- 2014.10 [virusbulletin] [Paper: Invading the core: iWorm's infection vector and persistence mechanism](https://www.virusbulletin.com/blog/2014/10/paper-invading-core-iworm-s-infection-vector-and-persistence-mechanism/)
- 2014.10 [virusbulletin] [VB2014 paper: Methods of malware persistence on Mac OS X](https://www.virusbulletin.com/blog/2014/10/paper-methods-malware-persistence-mac-os-x/)
- 2014.10 [f5] [Tinba Malware: Domain Generation Algorithm Means New, Improved, and Persistent](https://f5.com/labs/articles/threat-intelligence/malware/tinba-malware-domain-generation-algorithm-means-new-improved-and-persistent-22440)
- 2014.08 [virusbulletin] [VB2014 preview: Methods of malware persistence on Mac OS X](https://www.virusbulletin.com/blog/2014/08/preview-methods-malware-persistence-mac-os-x/)
- 2014.07 [securityintelligence] [Bootkits: Deep Dive Into Persistence Mechanisms Used by Bootkits at HOPE X Conference](https://securityintelligence.com/bootkits-deep-dive-into-persistence-mechanisms-used-by-bootkits-at-hope-x-conference/)
- 2014.01 [igorkorkin] [30C3: Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware](https://igorkorkin.blogspot.com/2014/01/30c3-persistent-stealthy-remote.html)
- 2013.03 [sans] [Wipe the drive! Stealthy Malware Persistence - Part 4](https://isc.sans.edu/forums/diary/Wipe+the+drive+Stealthy+Malware+Persistence+Part+4/15460/)
- 2013.03 [sans] [Wipe the drive! Stealthy Malware Persistence - Part 3](https://isc.sans.edu/forums/diary/Wipe+the+drive+Stealthy+Malware+Persistence+Part+3/15448/)
- 2013.03 [sans] [Wipe the drive! Stealthy Malware Persistence - Part 2](https://isc.sans.edu/forums/diary/Wipe+the+drive+Stealthy+Malware+Persistence+Part+2/15406/)
- 2013.03 [sans] [Wipe the drive! Stealthy Malware Persistence Mechanism - Part 1](https://isc.sans.edu/forums/diary/Wipe+the+drive+Stealthy+Malware+Persistence+Mechanism+Part+1/15394/)
- 2012.09 [trendmicro] [Advanced Persistent Response Thwarts Malicious Digital Insider](https://blog.trendmicro.com/trendlabs-security-intelligence/advanced-persistent-response-thwarts-malicious-digital-insider/)
- 2012.06 [mcafee] [Combating Malware and Advanced Persistent Threats](https://securingtomorrow.mcafee.com/mcafee-labs/combating-malware-and-advanced-persistent-threats/)
- 2012.03 [pentestlab] [Metasploit Persistent Backdoor](https://pentestlab.blog/2012/03/17/metasploit-persistent-backdoor/)
- 2004.09 [sans] [System Store Trojan, Infection Persistence, Save the Pr0n](https://isc.sans.edu/forums/diary/System+Store+Trojan+Infection+Persistence+Save+the+Pr0n/311/)***
- 2020.05 [hackingarticles] [Persistence: Accessibility Features](https://www.hackingarticles.in/persistence-accessibility-features/)
- 2020.04 [hackingarticles] [Domain Persistence: Golden Ticket Attack](https://www.hackingarticles.in/domain-persistence-golden-ticket-attack/)
- 2020.04 [hackingarticles] [Persistence: RID Hijacking](https://www.hackingarticles.in/persistence-rid-hijacking/)# 贡献
内容为系统自动导出, 有任何问题请提issue