As red teamers, we often explore how attackers manipulate system components to achieve persistence, evade detection, or alter behavior. The Windows Registry, a critical configuration database, is a prime target for such operations. In this article, Iβll share a C++ program that demonstrates registry manipulation, explain its mechanics, and discuss its implications in offensive security all while emphasizing ethical use in authorized penetration testing. Whether youβre a red teamer, blue teamer, or developer, this guide offers insights into registry-based techniques and how to defend against them.