<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Persistence-via-Startup-Folder on Jesus Oseguera</title><link>https://r0tbyt3.dev/tags/persistence-via-startup-folder/</link><description>Recent content in Persistence-via-Startup-Folder on Jesus Oseguera</description><generator>Hugo</generator><language>en-us</language><atom:link href="https://r0tbyt3.dev/tags/persistence-via-startup-folder/index.xml" rel="self" type="application/rss+xml"/><item><title>Persistence via Startup Folder</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-startup-folder/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/malware-development/persistence/persistence-via-startup-folder/</guid><description>Persistence via Startup Folder Persistence via Startup Folder - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Abusing WMI for Persistence Introduction to Windows Persistence Persistence via COM Object Hijacking Persistence via Electron Applications Persistence via File System Persistence via Windows Registry Persistence via Windows Services Persistence via Windows Tasks</description></item><item><title>Persistence via Startup Folder</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/persistence-via-startup-folder/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/windows-security-and-administration/windows-exploitation/persistence-via-startup-folder/</guid><description>Persistence via Startup Folder Persistence via Startup Folder - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: AlwaysInstallElevated Privilege Escalation Check Brute Force vs Password Spraying Windows Check HKCU AlwaysInstallElevated Check HKLM AlwaysInstallElevated DLL Hijacking Elevate Process to SYSTEM Enable SeDebugPrivilege Exploitation Enable WDigest for Credential Capture Jail Breaking Lateral Movement Techniques Living Off the Land (LOTL) Techniques Maintaining Persistence Techniques Move File to Startup Folder Privilege Escalation Techniques Python Jail Breaking Registry Kill Switch</description></item></channel></rss>