Gaining access with reverse-shell-over-tor

1. Hidden Service and handler
2. Victim connects to the Hidden Service
3. The handler receives the shell
Last updated