Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/hasherezade/persistence_demos

Demos of various (also non standard) persistence methods used by malware
https://github.com/hasherezade/persistence_demos

Last synced: about 2 months ago
JSON representation

Demos of various (also non standard) persistence methods used by malware

Awesome Lists containing this project

README

        

# persistence_demos

[![Build status](https://ci.appveyor.com/api/projects/status/wr9barnysm7ovfgi?svg=true)](https://ci.appveyor.com/project/hasherezade/persistence-demos)

Demos for the presentation ["Wicked malware persistence methods"](https://speakerdeck.com/hshrzd/wicked-malware-persistence-methods).

+ com_hijack - loads a demo DLL via COM hijacking
+ extension_hijack - hijacks extensions handlers in order to run a demo app while the file with the given extension is opened
+ shim_persist - installs a shim that injects a demo DLL into explorer.exe
+ restricted_directory - drops a PE into a restricted directory (that cannot be accessed or deleted), and launches it