The VX-Files
More
Search
Ctrl +βK
Tools
1. Pre-Engagement
2. Information gathering
3. Vulnerability assessment
4. Exploitation
5. Post-Exploitation & Persistence
6. Privilege escalation & Lateral movement
7. Reporting & Remediation
Last updated
11 months ago