FruityC2 post-exploitation framework based on the deployment of agents on compromised machines. Agents are managed from a web interface under the control of an operator - Family Cyber Team Offical Blog

Breaking

Post Top Ad

Responsive Ads Here

Post Top Ad

Responsive Ads Here

Monday, October 30, 2017

FruityC2 post-exploitation framework based on the deployment of agents on compromised machines. Agents are managed from a web interface under the control of an operator

FruityC2 adalah tool post-exploitation untuk target yang OS nya vuln untuk di exploitasi dan dikontrol via aplikasi hacking tools yang berbasis web.

Lebih detail : https://github.com/xtr4nge/FruityC2

No comments:

Post a Comment

Post Top Ad

Responsive Ads Here