Writing MSF Post Exploitation Module

Abstract

This presentation was about writing custom post exploitation module in metasploit framework.

PDF