#
attacker
Here are 3 public repositories matching this topic...
Attacker can use the scripts to gain reverse shell of a target's machine.
listen
penetration-testing
attacker
client-server
shell-prompt
reverseshell
command-line-interface
victim
-
Updated
Mar 16, 2019 - C
Parallel geometric attacks on neural network key exchange protocol
-
Updated
Aug 3, 2018 - C
Improve this page
Add a description, image, and links to the attacker topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the attacker topic, visit your repo's landing page and select "manage topics."