Media Summary: In this video we'll be exploring how to attack, detect and defend against COM 1) Enumeration of COM hijackable keys manually through PowerShell and via scripts. 2) Code execution via TreatAs and ProgID ... This video is a quick demonstration of COM

Persistence Com Hijacking - Detailed Analysis & Overview

In this video we'll be exploring how to attack, detect and defend against COM 1) Enumeration of COM hijackable keys manually through PowerShell and via scripts. 2) Code execution via TreatAs and ProgID ... This video is a quick demonstration of COM In this video, I cover the process of establishing Join Andrew Prince as he demonstrates how you can hunt for evidence of adversaries attempting to establish You can register now for the Snyk "Fetch The Flag" CTF and SnykCon conference at ! Come solve some great ...

Link to a Box folder with a file with an index of the most recent videos, go to the second page and look for a file named Security ... Welcome to Chapter 2 of the Session Hijacking Advance Learning Series! In this video, we dive deep into one of the most ... Be better than yesterday - This video showcases how DLL I'm working through the Tryhackme Pentest+ path as I study for the CompTIA Pentest+ [PK0-003] certification exam in 2026. Cyber Security Certification Notes & Cheat Sheets (2nd link) Cyber Security ... A brief rundown of the possible rekindling of Microsoft COM

In this video, I explore the process of establishing

Photo Gallery

COM Hijacking (Persistence)
Persistence - COM Hijacking
All About DLL Hijacking - My Favorite Persistence Method
Windows Context Menu (Right Click) COM Hijacking for Persistence
Windows Post Exploitation - Persistence With Metasploit
RED TEAM Operator: Windows Persistence course.
How Hackers Establish Persistence
KOVTER Malware Analysis - Fileless Persistence in Registry
COM Hijacking, this is nasty
Session Hijacking – Chapter 2: Understanding Session Persistence & Network Protocols
COM Hijacking Persistence
Understanding DLL Hijacking for Payload Execution
View Detailed Profile
COM Hijacking (Persistence)

COM Hijacking (Persistence)

In this video we'll be exploring how to attack, detect and defend against COM

Persistence - COM Hijacking

Persistence - COM Hijacking

1) Enumeration of COM hijackable keys manually through PowerShell and via scripts. 2) Code execution via TreatAs and ProgID ...

All About DLL Hijacking - My Favorite Persistence Method

All About DLL Hijacking - My Favorite Persistence Method

00:00 - Intro 00:25 - Why DLL

Windows Context Menu (Right Click) COM Hijacking for Persistence

Windows Context Menu (Right Click) COM Hijacking for Persistence

This video is a quick demonstration of COM

Windows Post Exploitation - Persistence With Metasploit

Windows Post Exploitation - Persistence With Metasploit

In this video, I cover the process of establishing

RED TEAM Operator: Windows Persistence course.

RED TEAM Operator: Windows Persistence course.

RED TEAM Operator: Windows

How Hackers Establish Persistence

How Hackers Establish Persistence

Join Andrew Prince as he demonstrates how you can hunt for evidence of adversaries attempting to establish

KOVTER Malware Analysis - Fileless Persistence in Registry

KOVTER Malware Analysis - Fileless Persistence in Registry

You can register now for the Snyk "Fetch The Flag" CTF and SnykCon conference at https://snyk.co/john ! Come solve some great ...

COM Hijacking, this is nasty

COM Hijacking, this is nasty

Link to a Box folder with a file with an index of the most recent videos, go to the second page and look for a file named Security ...

Session Hijacking – Chapter 2: Understanding Session Persistence & Network Protocols

Session Hijacking – Chapter 2: Understanding Session Persistence & Network Protocols

Welcome to Chapter 2 of the Session Hijacking Advance Learning Series! In this video, we dive deep into one of the most ...

COM Hijacking Persistence

COM Hijacking Persistence

COM objects are

Understanding DLL Hijacking for Payload Execution

Understanding DLL Hijacking for Payload Execution

Be better than yesterday - This video showcases how DLL

Tryhackme Pentest+ Path 2026 | Windows Local Persistence (Attacks and Exploits)

Tryhackme Pentest+ Path 2026 | Windows Local Persistence (Attacks and Exploits)

I'm working through the Tryhackme Pentest+ path as I study for the CompTIA Pentest+ [PK0-003] certification exam in 2026.

COM Hijacking Windows Persistence | RedTeamWorld

COM Hijacking Windows Persistence | RedTeamWorld

COM Hijacking Windows

RTO: Windows Persistence - DLL Proxying - Introduction

RTO: Windows Persistence - DLL Proxying - Introduction

RED TEAM Operator: Windows

Hey, I'm Still In Here: An Overview of macOS Persistence Techniques – Leo Pitt (SO-CON 2020)

Hey, I'm Still In Here: An Overview of macOS Persistence Techniques – Leo Pitt (SO-CON 2020)

There is more to macOS

Windows Persistence Techniques P1 | Account Tampering | TryHackMe Windows Local Persistence P1

Windows Persistence Techniques P1 | Account Tampering | TryHackMe Windows Local Persistence P1

Cyber Security Certification Notes & Cheat Sheets https://buymeacoffee.com/notescatalog/extras (2nd link) Cyber Security ...

DLL Hijacking with Invoke PrintDemon

DLL Hijacking with Invoke PrintDemon

DLL

Microsoft COM Hijacking

Microsoft COM Hijacking

A brief rundown of the possible rekindling of Microsoft COM

Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs

Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs

In this video, I explore the process of establishing