the posts in this section deal with the activities which are undertaken once a machine has been compromised - this phase is known as post exploitation

curiouser and curiouser

puzz00

diannaosec