Local Persistence

Persistence techniques will changes by each stage. For example, attacker will use different method of persistence techniques for Privilege access, Domain privilege access machine and lateral movement machine.

Available Persistence techniques:

https://github.com/last-byte/PersistenceSniper - useful for persistence techniques detection.

Last updated