In the evolving landscape of system management, maintaining application persistence is paramount.
‘RedPersist’ stands out as a robust solution, offering a myriad of techniques to ensure uninterrupted system presence.
Dive into this comprehensive guide to explore its capabilities, from leveraging Eventviewer to harnessing the power of PowerShell profiles.
Below 3rd party libraries are used in this project.
TaskScheduler
Fody
Load the Visual Studio project up and go to “Tools” > “NuGet Package Manager” > “Package Manager Settings”
Open “NuGet Package Manager” > “Package Sources”
Install the Fody
Install-Package Costura.Fody -Version 3.3.3
Install the Taskscheduler
Install-Package TaskScheduler -Version 2.8.11
You can use it with execute-assembly or standalone executable
RedPersist.exe --method C:\Path\to\executable.exe
RedPersist.exe --help
–help/-h : Help Menu
RedPersist.exe --help
–eventviewer : Persistence via Eventviewer Helper
RedPersist.exe --eventviewer C:\Users\User\exe.exe
–startup : Persistence via Startup
RedPersist.exe --startup C:\Users\User\exe.exe
–autologon : Persistence via Autologon
RedPersist.exe --startup C:\Users\User\exe.exe
–screensaver : Persistence via Screensaver
RedPersist.exe --screensaver C:\Users\User\exe.exe
–wmi : Persistence via Wmi Event Subscription(To Notepad.exe)
RedPersist.exe --wmi C:\Users\User\exe.exe
–schedule : Persistence via Scheduled Tasks
RedPersist.exe --schedule TaskName C:\Users\User\exe.exe
–extension : Persistence via Extension Hijacking(TXT)
RedPersist.exe --extension C:\Users\User\exe.exe
–winlogon : Persistence via UserInitMprLogonScript
RedPersist.exe --winlogon TaskName C:\Users\User\exe.exe
–powershell : Persistence via Powershell Profile
RedPersist.exe--pwsh C:\Users\User\Documents\windowspowershell C:\Users\User\Documents\windowspowershell\profile.ps1 C:\Users\User\Desktop\exe.exe
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…