gavz / ExplorerPersistView on GitHub
Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when it's get loaded into the explorer process , our malicoius code get executed
83Jan 12, 2023Updated 3 years ago

Alternatives and similar repositories for ExplorerPersist

Users that are interested in ExplorerPersist are comparing it to the libraries listed below

Sorting:

Are these results useful?