Abstract

This presentation was about writing custom post exploitation module in metasploit framework.

PDF