ad-persistence
Warn
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides specific command-line syntax for creating backdoors using standard Windows utilities like
schtasks,reg, andsc. These allow for code execution at system startup or on a recurring schedule. - [COMMAND_EXECUTION]: It includes procedures for using offensive tools such as Mimikatz and Rubeus to perform advanced domain-level attacks, including Skeleton Key memory injection and Golden Ticket forgery, which facilitate persistent high-privileged access.
- [DATA_EXFILTRATION]: Instructions are provided for extracting critical domain credentials, such as
krbtgthashes and DSRM administrator hashes, which can be used to bypass authentication mechanisms indefinitely. - [REMOTE_CODE_EXECUTION]: The skill documents methods for executing arbitrary payloads through persistence triggers like WMI event subscriptions and COM hijacking, often utilizing PowerShell commands to deliver remote code.
Audit Metadata