Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
-
Updated
Sep 15, 2022 - C++
Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
Weaponizing for privileged file writes bugs with PrintNotify Service
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, ProjectSauron, APT29, EquationGroup, including Stuxnet / Flame.
This guide empowers non-tech Windows users to detect persistence threats, highlighting signs like cmd windows at startup, registry checks, and spotting malicious commands in PowerShell, cmd, rundll32, and wmic.
RINGW0RM is Ring0 rootkit and UEFI bootkit plugin formatted for PulsarRAT as a plugin, which was built upon a customized Chaos and Elysium combination (this was not planned to be dropped lol)
RatInject: C++ tool for stealthy Windows persistence via registry-based techniques.
A lightweight red team beacon with COM-based persistence and HTTP-based exfiltration.
This case study analyzed a low-complexity but real-world-relevant example of attacker persistence using the built-in Windows utility schtasks.exe.
Add a description, image, and links to the windows-persistence topic page so that developers can more easily learn about it.
To associate your repository with the windows-persistence topic, visit your repo's landing page and select "manage topics."