Torrent details for "Sektor 7 - Windows Persistence - Red Team Operator" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
794.3 MB
Info Hash:
3B68825EC73280CFD936AAC75875019FDD39ACE2
Added By:
Added:
Sept. 10, 2025, 12:30 a.m.
Stats:
|
(Last updated: Sept. 10, 2025, 12:32 a.m.)
| File | Size |
|---|---|
| 01 - Introduction to Windows Persistence.mp4 | 7.5 MB |
| 02 - Intro Addendum.mp4 | 20.4 MB |
| 03 - Course VM Setup.mp4 | 6.8 MB |
| 04 - Start Folder and Registry Keys.mp4 | 25.7 MB |
| 05 - Logon Scripts.mp4 | 16.1 MB |
| 06 - Shortcut Mods.mp4 | 22.4 MB |
| 07 - Screensavers.mp4 | 13.5 MB |
| 08 - Powershell Profile.mp4 | 14.3 MB |
| 09 - DLL Proxying - Introduction.mp4 | 6.3 MB |
| 10 - DLL Proxying - Demo.mp4 | 91.5 MB |
| 11 - Component Object Model - Introduction.mp4 | 13.9 MB |
| 12 - COMs Registry.mp4 | 18.4 MB |
| 13 - COM Hijacks and Proxies.mp4 | 56.3 MB |
| 14 - Elevated Scheduled Tasks.mp4 | 39.9 MB |
| 15 - Multiaction Tasks.mp4 | 23.0 MB |
| 16 - Modified Services.mp4 | 39.7 MB |
| 17 - IFEO - Debugger - SilentProcessExit - Verifier.mp4 | 62.6 MB |
| 18 - Application Shims.mp4 | 30.7 MB |
| 19 - Windows Management Instrumentation - Introduction.mp4 | 5.5 MB |
| 20 - WMI Event Subscription.mp4 | 24.6 MB |
| 21 - AppCert DLLs.mp4 | 36.0 MB |
| 22 - AppInit DLLs.mp4 | 28.2 MB |
| 23 - Netsh Helper DLLs.mp4 | 23.3 MB |
| 24 - Winlogon - SHELL-USERINIT.mp4 | 24.5 MB |
| 25 - Time Providers.mp4 | 37.2 MB |
| 26 - Port Monitors.mp4 | 33.8 MB |
| 27 - Local Security Authority - Introduction.mp4 | 8.4 MB |
| 28 - LSA-as-a-Persistence - SSPs.mp4 | 38.5 MB |
| 29 - LSA-as-a-Persistence - Password Filters.mp4 | 25.2 MB |
| ass1.txt | 103 bytes |
| ass2.txt | 158 bytes |
| ass3.txt | 298 bytes |
| ass4.txt | 535 bytes |
| commands.txt | 11.4 KB |
| logon.bat | 44 bytes |
| makelnk.vbs | 1.0 KB |
| compile.bat | 125 bytes |
| WorkFoldersShell.cpp | 1.7 KB |
| WorkFoldersShell.def | 45 bytes |
| compile.bat | 89 bytes |
| winspool.cpp | 868 bytes |
| bginfo.sdb | 1.2 KB |
| appcert.cpp | 1.5 KB |
| appcert.def | 30 bytes |
| compile.bat | 99 bytes |
| compile.bat | 73 bytes |
| sspap.cpp | 6.6 KB |
| sspap.def | 201 bytes |
| compile.bat | 87 bytes |
| nethelp.cpp | 955 bytes |
| nethelp.def | 30 bytes |
| compile.bat | 108 bytes |
| passfilter.cpp | 979 bytes |
| passfilter.def | 88 bytes |
| compile.bat | 79 bytes |
| portmon.cpp | 2.6 KB |
| portmon.def | 34 bytes |
| compile.bat | 102 bytes |
| timeprov.cpp | 1.8 KB |
| timeprov.def | 68 bytes |
| compile.bat | 84 bytes |
| verifier.cpp | 2.6 KB |
| vrf.dll | 73.0 KB |
| aes.py | 776 bytes |
| compile.bat | 110 bytes |
| compileDLL.bat | 90 bytes |
| compileSrv.bat | 112 bytes |
| implant.cpp | 5.0 KB |
| implant.dll | 88.0 KB |
| implant.exe | 113.5 KB |
| implantDLL.cpp | 704 bytes |
| implantsrv.cpp | 6.0 KB |
| implantsrv.exe | 95.5 KB |
| notepad-thread64.bin | 279 bytes |
Name
DL
Uploader
Size
S/L
Added
-
794.2 MB
[5
/
0]
2023-06-02
| Uploaded by SunRiseZone | Size 794.2 MB | Health [ 5 /0 ] | Added 2023-06-02 |
NOTE
SOURCE: Sektor 7 - Windows Persistence - Red Team Operator
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Welcome to Persistence in Windows course! Real threat actors utilize various Tactics, Techniques and Procedures (aka TTPs). One of the tactic is Persistence - a way to survive a breached machine restart and preserve access to a target environment. There is a lot of focus on what methods adversaries use to exploit a particular vulnerability or how their C2 channels and infrastructure look like. Less often you find discussions about persistence. This course is aiming to change that. You will learn almost 30 different persistence techniques working on Windows 10. Most of them were used by nation-state threat actors, like EquationGroup, Turla, APT29, ProjectSauron or malware, including Flame or Stuxnet. As usual you will get not only full explanation of each technique with examples, but also a working code templates (written in C) and a complete development environment you can experiment with
×


