• Windows - Persistence

    Techniques and methodologies for maintaining access to Windows hosts after a successful security compromise.

  • Linux - Persistence

    Maintaining access to linux hosts after gaining a foothold via security compromise.