bars
eCPTX Certified Penetration Tester eXtreme
search
circle-xmark
⌘
Ctrl
k
Home
Certifications
More
ellipsis
chevron-down
copy
Copy
chevron-down
Preparing the Attack
Establishing A Shell Through The Victim's Browser
Previous
Custom Undetectable Macro Development
chevron-left
Next
Reconnaissance & Enumeration
chevron-right
Last updated
3 years ago
sun-bright
desktop
moon
sun-bright
desktop
moon