https://github.com/cocomelonc/2022-08-26-malware-pers-9
Malware persistence via change default file association. C++ malware example
https://github.com/cocomelonc/2022-08-26-malware-pers-9
Last synced: 12 days ago
JSON representation
Malware persistence via change default file association. C++ malware example
- Host: GitHub
- URL: https://github.com/cocomelonc/2022-08-26-malware-pers-9
- Owner: cocomelonc
- Created: 2022-08-29T02:03:46.000Z (over 2 years ago)
- Default Branch: master
- Last Pushed: 2022-08-29T02:20:32.000Z (over 2 years ago)
- Last Synced: 2025-04-01T10:36:01.499Z (about 1 month ago)
- Language: C++
- Size: 7.81 KB
- Stars: 8
- Watchers: 2
- Forks: 2
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Malware development: persistence - part 9. C++ malware implementation.
Malware persistence technique - via hijacking default file association. C++ malware implementation example.
[https://cocomelonc.github.io/malware/2022/08/26/malware-pers-9.html](https://cocomelonc.github.io/malware/2022/08/26/malware-pers-9.html)