Hexastrike / PyrsistenceSniper
PublicWe took PersistenceSniper, merged it with Python, and misspelled it on purpose. Meet PyrsistenceSniper.
PyrsistenceSniper is an offline forensic tool that detects Windows persistence mechanisms by scanning registry hives, filesystems, and artifacts from disk images or collections.
How It Works
You hear about PyrsistenceSniper from a cybersecurity friend as a quick way to spot hidden malware tricks on copied computer files without needing the original machine running.
Download the tool to your analysis computer and prepare it in just a few minutes so it's ready to use on any operating system.
Collect a folder of files from the suspicious computer, like a disk image or forensic copy containing Windows system parts.
Point the tool at your evidence folder and let it rapidly hunt for persistence tricks that let malware survive reboots.
Receive a clear, organized list of findings with details on suspicious files, signatures, and risk levels, ready to share or analyze.
You've uncovered exactly how the malware was sticking around, empowering you to clean it up and secure the system confidently.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.