Latest version: v0.0.3
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Generation, targeted deployment, and scalable cleanup for files that coerce Windows authentication.
No known vulnerabilities found
Has known vulnerabilities