Pinned Repositories
living-off-the-land
Fileless attack with persistence
r77-rootkit
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
UACBypass
🚧 C# UAC Bypass technique using mock directories 🚧
f
f