Introduction

What?

Notes on tools used for data exfiltration, and experimenting with new tools.

Why?

[opying and transferring data from a compromised to an attacker’s machine.

How?