Skip to content

Latest commit

 

History

History
10 lines (5 loc) · 422 Bytes

README.md

File metadata and controls

10 lines (5 loc) · 422 Bytes

ExplorerPersist

Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when it's get loaded into the explorer process , our malicoius code get executed. The persistence is triggered each time the explorer process is runned.

POC

ExplorerDLLHijacking.mp4