tactics:trojan-horse
This is an old revision of the document!
This article is about a penetration method and its associated class of software backdoors. For the wooden horse deployed by the Ancient Greeks during the Trojan War, see Trojan Horse (vehicle).
Trojan Horse
This namespace stub has been identified as priority content for the Anonymous Military Institute, and should be expanded upon as soon as possible.
tactics/trojan-horse.1726811624.txt.gz ยท Last modified: 2024/09/20 05:53 by Humphrey Boa-Gart
Find this page online at: https://bestpoint.institute/tactics/trojan-horse
Find this page online at: https://bestpoint.institute/tactics/trojan-horse