Man In Remote

  Man In Remote Setup After presenting this talk first at RootedCon and a month later at Hackito Ergo Sum the time for releasing the code behind it has arrived. To understand the source code, you only need to have a look at the deployment diagram where the attacker is drawn in red and the […]