COM-hunter is a COM Hijacking persistence tool written in C#.
[+] Usage:
.\COM-Hunter.exe
-> General Options:
-h, –help Shows help and exits.
-v, –version Shows current version and exits.
-a, –about Shows info, credits about the tool and exits.
-> Modes:
Search Search Mode
Persist Persist Mode
-> Search Mode:
Get-Entry Searches for valid CLSIDs entries.
Get-Tasksch Searches for valid CLSIDs entries via Task Scheduler.
Find-Persist Searches if someone already used a valid CLSID (Defence).
Find-Tasksch Searches if someone already used a valid CLSID via Task Scheduler (Defence).
-> Persist Mode:
General Uses General method to apply COM Hijacking Persistence in Registry.
Tasksch Try to do COM Hijacking Persistence via Task Scheduler.
TreatAs Uses TreatAs Registry key to apply COM Hijacking Persistence in Registry.
-> General Usage:
.\COM-Hunter.exe Persist General
-> Tasksch Usage:
.\COM-Hunter.exe Persist Tasksch
-> TreatAs Usage:
.\COM-Hunter.exe Persist TreatAs
.\COM-Hunter.exe Search Get-Entry
Find-Persist (Search Mode):
.\COM-Hunter.exe Search Find-Persist
General (Persist Mode):
.\COM-Hunter.exe Persist General ‘HKCU:Software\Classes\CLSID…’ C:\Users\nickvourd\Desktop\beacon.dll
Software\Classes\CLSID...
HKCU:Software\Classes\CLSID…
HKCU:\Software\Classes\CLSID…
HKCU\Software\Classes\CLSID…
HKEY_CURRENT_USER:Software\Classes\CLSID…
HKEY_CURRENT_USER:\Software\Classes\CLSID…
HKEY_CURRENT_USER\Software\Classes\CLSID…
Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…