An open API service indexing awesome lists of open source software.

https://github.com/cocomelonc/offzone-2024-malware-persistence-workshop

OFFZONE 2024 Malware Persistence workshop
https://github.com/cocomelonc/offzone-2024-malware-persistence-workshop

Last synced: 12 days ago
JSON representation

OFFZONE 2024 Malware Persistence workshop

Awesome Lists containing this project

README

        

# OFFZONE Malware Persistence Workshop

![banner](./image.png)

DRAFT - THIS IS NOT FINAL VERSION!!!!

[https://offzone.moscow/program/malware-persistence-techniques/](https://offzone.moscow/program/malware-persistence-techniques/)

- [1. MITRE ATT&CK - Registry Run Keys](https://attack.mitre.org/techniques/T1547/001/)
- [2. MITRE ATT&CK - Event Triggered Execution: PowerShell Profile](https://attack.mitre.org/techniques/T1546/013/)
- [3. MITRE ATT&CK - Event Triggered Execution: Screensaver](https://attack.mitre.org/techniques/T1546/002/)
- [4. MITRE ATT&CK - Event Triggered Execution: AppInit DLLs](https://attack.mitre.org/techniques/T1546/010/)
- [5. MITRE ATT&CK- Boot or Logon Autostart Execution: Winlogon Helper DLL](https://attack.mitre.org/techniques/T1547/004/)
- [6. MITRE ATT&CK - Create or Modify System Process: Windows Service](https://attack.mitre.org/techniques/T1543/003/)
- [7. MITRE ATT&CK - Event Triggered Execution: Accessibility Features](https://attack.mitre.org/techniques/T1546/008/)
- [10. MITRE ATT&CK - COM hijacking](https://attack.mitre.org/techniques/T1546/015/)
- [11. MITRE ATT&CK - Netsh Helper DLL](https://attack.mitre.org/techniques/T1546/007/)
- [12. MITRE ATT&CK - Port Monitors persistence technique](https://attack.mitre.org/techniques/T1547/010/)
- [13. MITRE ATT&CK - T1547.001](https://attack.mitre.org/techniques/T1547/001/)
- [15. MITRE ATT&CK - Change Default File Association](https://attack.mitre.org/techniques/T1546/001/)

Meow-meow =^..^=