This is the third post on the post-exploitation method based on code caves. In the first part I showed you how to create a basic…
Posts published in “Postexplotation”
This is the second part of the set of posts about Post Explotation Backdooring. If you haven’t read the previous post, I recommend you do…
A few months ago I was in a post-exploitation course taught by my ex colleagueOscarAkaElvis (creator of the tool to audit Airgeddon, which I recommend…
Recently I am doing some very interesting Pentester Academy courses. Thanks to them I am learning a lot, since they deal with very particular topics…