Skip to content
#

malware-resources

Here are 3 public repositories matching this topic...

Language: All
Filter by language

A complete hands-on reference of 46 Windows persistence techniques used by real-world APT groups. Each technique includes MITRE ATT&CK TTP mapping, known threat actor attribution, attack commands, verification steps, and cleanup — organized from No-Admin to Admin level. Built for red teamers, malware analysts, and cybersecurity learners.

  • Updated May 1, 2026
  • C

Improve this page

Add a description, image, and links to the malware-resources topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the malware-resources topic, visit your repo's landing page and select "manage topics."

Learn more