Skip to content

A comprehensive detection tool for identifying APT persistence techniques on Windows and Linux systems.

License

Notifications You must be signed in to change notification settings

lexathegoat/APTPersistence

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Supported Detection Techniques

Windows

  • Registry Run Keys(T1547.001)
  • Windows Services(T1543.003)
  • Scheduled Tasks(T1053.005)
  • WMI Event Subscriptions(1546.003)

Linux

  • Cron Jobs(T1053.003)
  • Systemd Services(T1543.002)
  • RC.local Scripts(T1037.004)
  • Shell Profile Modifications(T1546.004)
  • LD_PRELOAD Hijacking(T1574.006)

Detection Report Structure

{
  "timestamp": "2025-10-31T10:30:00",
  "technique": "Registry Run Key",
  "severity": "HIGH|MEDIUM|CRITICAL",
  "location": "Path or registry key",
  "details": "Detailed findings",
  "os": "Windows|Linux"
}

Severity Levels

  • CRITICAL = Immediate threat requiring urgent response
  • HIGH = Suspicious activity with high confidence
  • MEDIUM = Potentially suspicious requiring investigation

EDR Testing

The framework includes pre-configured test scenarios for validating EDR capabilities. Each scenario contains:

  • Test command for creating persistence
  • Cleanup command for safe removal
  • Expected EDR detection behaivor
  • MITRE ATT&CK technique mapping

Warning: Only execute test scenarios in authorized testing environments.

Legal Notice

THIS TOOL IS INTENDED FOR AUTHORIZED SECURITY TESTING AND DEFENSIVE OPERATIONS ONLY. UNAUTHORIZED USE AGAINST SYSTEMS YOU DO NOT OWN OR HAVE EXPLICIT PERMISSION TO TEST IS ILLEGAL!

License

MIT LICENSE

References

About

A comprehensive detection tool for identifying APT persistence techniques on Windows and Linux systems.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages