performing-malware-persistence-investigation
mukul975/Anthropic-Cybersecurity-Skills
Systematically enumerate Windows and Linux persistence mechanisms, including registry run keys, services, scheduled tasks, WMI, autoruns, and rootkits, to understand how malware survives reboots and ensure incident response clean-up.