Guide to Data Exfiltration Tools: Post-Exploitation Techniques for Security Professionals
Post-Exploitation Privilege Escalation Tools