example 2
Completion requirements
This is a technical description of an attacker
Click webshellbackdoorFrancia.pdf link to view the file.