Attacker can use the scripts to gain reverse shell of a target's machine.
listen
penetration-testing
attacker
client-server
shell-prompt
reverseshell
command-line-interface
victim
-
Updated
Mar 16, 2019 - C