Found 20 repositories(showing 20)
mdsecactivebreach
WMI Event Subscription Persistence in C#
MHaggis
Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques
darkquasar
A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics
n0pe-sled
No description available
woanware
Parses the WMI object database....looking for persistence
rikvanduijn
No description available
subesp0x10
No description available
bspence7337
A powershell script to create WMI Event subscription persistence
AxelPotato
WMI persistence code snippets
kelvinguo1988
The script realizes intranet lateral movement and permission persistence through WMI event subscription.
Erez-Goldberg
PowerShell reverse shell with AMSI bypass, PsExec download and persistence via WMI event subscription
quangtrm
Slides from ‘Next-gen Fileless Malware - Beyond WMI’ at Tradahacking 2018, analyzing advanced fileless malware techniques, WMI-based persistence, stealthy C&C communication, and detection challenges.
Potato-9257
TEST--WMI_Fileless_Persistence
AzadaBiola
No description available
cyberpanonius
All public tools (as far as I know) can’t parse properly offline WBEM (offline WMI) objects on newer editions of Windows. This tool is designed to parse the newer formats (objects.data and index.btr). It is based on the dissect.cim library (https://github.com/fox-it/dissect.cim)
coopmarshall
Use WMI and powershell commands to establish persistence
ayinedjimi
C++ WMI event consumer hunter for persistence mechanism detection
NathanKazen
This is Ultimate C2 using Discord bot and running on WMI persistence
wantingchen0852
Hands-on Windows persistence lab using PowerShell (Registry, Startup folder, PowerShell profile, WMI) on a BO-BOBO VM.
MarshallSecOps
End-to-end investigation of the APT29 emulation dataset using Splunk, including detection development, evidence-backed timelines, and MITRE ATT&CK mapping. The project covers decoded obfuscated PowerShell payloads, LSASS credential dumping, WinRM/WMI lateral movement, and covert credential staging and persistence, culminating in a full DFIR report.
All 20 repositories loaded