Skip to main content Link Expand (external link) Document Search Copy Copied Project Domain Book Reference Articles Shah, S., Mehtre, B.M. An overview of vulnerability assessment and penetration testing techniques. J Comput Virol Hack Tech 11, 27–49 (2015). https://doi.org/10.1007/s11416-014-0231-x H. M. Z. A. Shebli and B. D. Beheshti, “A study on penetration testing process and tools,” 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), May 2018, doi: https://doi.org/10.1109/lisat.2018.8378035. M. Carvalho et al., “MTC2: A command and control framework for moving target defense and cyber resilience,” Aug. 2013, doi: https://doi.org/10.1109/isrcs.2013.6623772. Additional Resources “Mythic - Mythic Documentation,” Mythic-c2.net, 2023. https://docs.mythic-c2.net/ T. Costa, “tcostam/awesome-command-control,” GitHub, Feb. 05, 2024. https://github.com/tcostam/awesome-command-control. A. Hunkeler, “Karneades/awesome-malware-persistence,” GitHub, Jan. 24, 2024. https://github.com/Karneades/awesome-malware-persistence. “Sliver Docs,” sliver.sh. https://sliver.sh/. “Veil-Framework/Veil-Evasion,” GitHub, Feb. 02, 2024. https://github.com/Veil-Framework/Veil-Evasion/. “iwantmore.pizza,” iwantmore.pizza. https://iwantmore.pizza/posts/PEzor.html (accessed Feb. 06, 2024).