Malware persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.
This is an extract with only links to the tools and resources taken from the main article about malware persistence.
A Javascript library which removes people from video footage in near realtime. Built on top of tensorflow.js.
Upload an image or send a link, and it'll remove the background and leave you the foreground on a transparent image. Useful!
A blog about tools for stripping DRM out of files. Review of, news about, and releases of software for accomplishing this task.