Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked FortyNorth - Initial Access Operations


itsMe

Recommended Posts

This is the hidden content, please

Learn how to write phishing malware and harvest credentials for gaining initial access into your target's environment. This course is recommended for students with an intermediate knowledge of programming.

Course: Initial Access Operations by FortyNorth (PDF + video):

01 - Introduction
02 - Dev Environment Goals
03 - Cred Harvesting
04 - Docx Remote Template Injection
05 - Code Execution
06 - Code Execution Deep Dive
07 - XLM Macros
08 - Code Protections

This is the hidden content, please

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.