This is the third post on the post-exploitation method based on code caves. In the first part I showed you how to create a basic…
Posts published in “Code Caves”
This is the second part of the set of posts about Post Explotation Backdooring. If you haven’t read the previous post, I recommend you do…
A few months ago I was in a post-exploitation course taught by my ex colleagueOscarAkaElvis (creator of the tool to audit Airgeddon, which I recommend…