In the evolving landscape of system management, maintaining application persistence is paramount.
‘RedPersist’ stands out as a robust solution, offering a myriad of techniques to ensure uninterrupted system presence.
Dive into this comprehensive guide to explore its capabilities, from leveraging Eventviewer to harnessing the power of PowerShell profiles.
Below 3rd party libraries are used in this project.
TaskScheduler
Fody
Load the Visual Studio project up and go to “Tools” > “NuGet Package Manager” > “Package Manager Settings”
Open “NuGet Package Manager” > “Package Sources”
Install the Fody
Install-Package Costura.Fody -Version 3.3.3
Install the Taskscheduler
Install-Package TaskScheduler -Version 2.8.11
You can use it with execute-assembly or standalone executable
RedPersist.exe --method C:\Path\to\executable.exe
RedPersist.exe --help
–help/-h : Help Menu
RedPersist.exe --help
–eventviewer : Persistence via Eventviewer Helper
RedPersist.exe --eventviewer C:\Users\User\exe.exe
–startup : Persistence via Startup
RedPersist.exe --startup C:\Users\User\exe.exe
–autologon : Persistence via Autologon
RedPersist.exe --startup C:\Users\User\exe.exe
–screensaver : Persistence via Screensaver
RedPersist.exe --screensaver C:\Users\User\exe.exe
–wmi : Persistence via Wmi Event Subscription(To Notepad.exe)
RedPersist.exe --wmi C:\Users\User\exe.exe
–schedule : Persistence via Scheduled Tasks
RedPersist.exe --schedule TaskName C:\Users\User\exe.exe
–extension : Persistence via Extension Hijacking(TXT)
RedPersist.exe --extension C:\Users\User\exe.exe
–winlogon : Persistence via UserInitMprLogonScript
RedPersist.exe --winlogon TaskName C:\Users\User\exe.exe
–powershell : Persistence via Powershell Profile
RedPersist.exe--pwsh C:\Users\User\Documents\windowspowershell C:\Users\User\Documents\windowspowershell\profile.ps1 C:\Users\User\Desktop\exe.exe
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…