Zer0Byte

Geekiest Techno News

Linux/unix & Windows Post-explotation Commands

Ok geeks, @mubix from Room362.com compiled a list of linux and windows commands on google docs that can be useful after eheem eheem 😛 tunneling into someone’s computer. These commands listed are normal commands but most of the time they are not mentioned or posted by penetration testers. Really a good Compilation. Linux Post-Explotation Commands https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM-1N-EWPRz2770K4/edit?hl=en_US  [ Read More ]