Phishing

MalRDP: Implementing Rouge RDP Manually

Weaponizing RDP files for phishing and initial access. Based on the work of Mike Felch on Rouge RDP technique.

Get informed of the latest news in cyber security

Enter your email address to receive cyber security tips, techniques, and updates

powered by nextbracket.io