- Joined
- Jan 8, 2019
- Messages
- 56,623
- Solutions
- 2
- Reputation
- 32
- Reaction score
- 100,455
- Points
- 2,313
- Credits
- 32,750
6 Years of Service
76%

Learn how to write phishing malware and harvest credentials for gaining initial access into your target's environment. This course is recommended for students with an intermediate knowledge of programming.
Course: Initial Access Operations by FortyNorth (PDF + video):
01 - Introduction
02 - Dev Environment Goals
03 - Cred Harvesting
04 - Docx Remote Template Injection
05 - Code Execution
06 - Code Execution Deep Dive
07 - XLM Macros
08 - Code Protections
Code:
https://www.fortynorthsecurity.com/initial-access-operations-syllabus
To see this hidden content, you must like this content.