tactics:trojan-horse
This is an old revision of the document!
Table of Contents
This article is about a penetration method and its associated class of software backdoors. For the wooden horse deployed by the Ancient Greeks during the Trojan War, see Trojan Horse (vehicle).
Trojan Horse
lorem ipsum
h2
lorem ipsum
h3
lorem ipsum
h4
lorem ipsum
h5
lorem ipsum
tactics/trojan-horse.1722923288.txt.gz ยท Last modified: 2024/08/06 05:48 by 127.0.0.1
Find this page online at: https://bestpoint.institute/tactics/trojan-horse
Find this page online at: https://bestpoint.institute/tactics/trojan-horse