Pełny tytuł: Microsoft Windows Silent Process Exit Persistence Exploit Kategoria: remote exploits Platforma: windows This Metasploit module uploads a payload and declares that it is the debug process to launch when a specified process exits. # 0day.today @ http://0day.today/