Skip to content
#

windows-internal

Here is 1 public repository matching this topic...

A complete hands-on reference of 46 Windows persistence techniques used by real-world APT groups. Each technique includes MITRE ATT&CK TTP mapping, known threat actor attribution, attack commands, verification steps, and cleanup — organized from No-Admin to Admin level. Built for red teamers, malware analysts, and cybersecurity learners.

  • Updated May 7, 2026
  • C

Improve this page

Add a description, image, and links to the windows-internal topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the windows-internal topic, visit your repo's landing page and select "manage topics."

Learn more