Attacker can use the scripts to gain reverse shell of a target's machine.
listen penetration-testing attacker client-server shell-prompt reverseshell command-line-interface victim
-
Updated
Mar 16, 2019 - C