Reading time:
~6 min
Posted
by Rogan Dawes
on
10 March 2017
Categories:
Abuse,
Backdoor,
Build-it,
Conferences,
Empire,
Exploit,
Hardware,
Internals,
Linux,
Metasploit,
Programming,
Real-world,
Research,
Shells,
Tunnelling
(If you’re new to this project, read the intro first) For the past few months, I’ve been working on porting...
Reading time:
~6 min
Posted
by symeon
on
18 November 2016
This is my password,” said the King as he drew his sword. “The light is dawning, the lie broken. Now...
Reading time:
~4 min
Posted
by sara
on
11 February 2016
Is not a hack until you are 3 tunnels deep – Ian de Villiers External assessments. It’s about not only...