A tool or set of tools used by an attacker in order to compromise a system, gain the highest level of privilege, and then hide their activity.
A tool or set of tools used by an attacker in order to compromise a system, gain the highest level of privilege, and then hide their activity.